Wednesday, September 29, 2010

window search service and remote query to a index on the server

Well, finally I figure out the last piece of the puzzle...It works fast with Windows 7 and with "word wheel" feature that google.com just had. Somehow the search return take longer on Windows XP machine installed the WDS 4.0.

see this ..http://biztechmagazine.com/article.asp?item_id=416

Most important piece of this WSS remote query is here.

One final note: Remote Search works well in Vista but there’s one limitation. When you open a remote share that you want to search, be sure to open it either by browsing Network in Windows Explorer or by typing a UNC path of the form \\servername\sharename, where servername must be the NetBIOS name of the server, not the server’s IP address or fully qualified domain name (FQDN). For some reason, if you specify a FQDN in your UNC path and then try to search a share, grep is used instead of the remote index.

Friday, July 9, 2010

Voice VLAN provision

Back in 2007, I have used Cisco Switch to provision Mitel Voip phone, and phone will use a different VLAN than PC and share the same data drop. However, I forge the technical detail how the hell the Phone is smart enough to get a different VLAN.

Now, I know it is because CDP. Actually, the there are other options, such as DHCP VLAN provision. Polycom SIP phone support CDP as well. Here is the link.

Automatic Configuration of VLAN ID
In the Network Settings menu, there is another field called “CDP”; this controls whether the phone
supports the Cisco Discovery Protocol. Among many other things, CDP allows the Ethernet switch to
inform an IP phone what VLAN ID it should use without requiring manual configuration of each
phone.
4
If CDP is enabled and a VLAN ID is also manually configured, any value received via CDP will
override the manual configuration. If no VLAN ID is received via CDP, the phone will fall back to the
configured value, if present, or to the native VLAN.
QoS Configuration
By default, the phone sends all audio packets with 802.1p tag and IP Precedence values of 5, which
is the highest priority level available for user traffic. This can be adjusted via the
qos.ethernet.rtp.user_priority and qos.ip.rtp.precedence values in the configuration files. Marking
audio packets with DSCP values is currently not supported.

More infomation avaiable at voip-info.org and this link

http://wiki.voiceroute.org/wiki/Overview_of_Auto-provisioning_Phones

Friday, June 25, 2010

iPhone Apps and Google mobile

Apparently,iPhone app is the major factor of why iPhone is smarter than other smart phone, like Blackberry. I have used Blackberry for so many years for email only, until this year I have to ditch blackbery.

Google created the Android mobile OS because it wants its search engine to remain relevant as the world migrates more toward mobile computing. But Google’s biggest challenge in mobile search is not other search engines or platforms, it’s apps — particularly iPhone apps.

——————————————————————————————————————————————————

When I filled up the iPhone with mobile apps as part of my recent experiment, one of the first apps that I downloaded and put on the iPhone home screen was the Google app. Since Google is the home page on all the PCs and laptops that I work on, I assumed my behavior on the iPhone would be similar to the computer. I was wrong.

Once I downloaded a fleet of useful iPhone apps, I quickly discovered that I used Google far less on the iPhone than I do on a computer - even over Wi-Fi, and even when doing many of the same activities. That is partly due to the fact that mobile search needs to improve, but it is also do to the nature of the smartphone itself.

When I’m sitting at a computer, I typically use Google at least 2-3 times per hour. It’s usually the first place I go to get information. Google is not as much of a sleuth as it is a concierge. For example, when I’m pulling up a site, I often don’t use a bookmark or type the URL into the address bar. It’s just quicker to open my home page (Google) and type in the company name. This behavior is a bit lazy, but it’s effective because it’s the path of least resistance.

However, the opposite is true on smartphones — especially the iPhone with so many specialized apps and no qwerty keyboard. In my tests with the iPhone, I discovered that Google is usually my last resort for finding information. In fact, I typically only use Google search 2-3 times per day from the iPhone.

Typing is just not as fast on a smartphone (even with the full qwerty keyboard on BlackBerry). Pointing, scrolling, and selecting are all much easier and quicker. As a result, many of the things that I would usually do with a Google search from my computer, I do through an app on the iPhone. For example:

* Instead of looking up a business address on Google, I use the universal White Pages app on the iPhone
* Instead of looking up a local business category (e.g. “Computer recycling”) in Google, I use the Yellow Pages app, which will even automatically calculate my location via GPS, if I allow it
* Instead of looking up a local taxi company when I’m traveling, I can use the Taxi Magic app on the iPhone (again, it will automatically get my location from GPS if I allow it)
* Instead of looking up local restaurants in Google, I can use the Yelp iPhone app
* Instead of searching for the professional credentials of a business associate on Google and being unsure if the results will have pages that might not work well on a smartphone, I can use the Linkedin or Facebook iPhone apps to do a quick people search.
* Instead of using news aggregators like Google News and Techmeme - which I tend to use on my PC - on the iPhone I usually go straight to news sites with strong iPhone apps or pages, such as AP News, Reuters, New York Times, Wall Street Journal, and MoneyWatch (a CBS sister site to TechRepublic).

The last example points to one of the reasons why mobile apps trump mobile search. With mobile search you don’t always know whether the stuff you click on in the search results will be viewable or functional on your smartphone. But if you have a mobile app or site that’s designed for that smartphone then you can be relatively confident that a search using that app will quickly return results (and links) that are optimized for a smartphone.

There’s also another factor. The limited screen size and computing capacity of smartphones force developers to make their apps laser-focused on a specific task. This automatically guards against feature-creep and makes most apps simpler and faster to use. As a matter of fact, there are some sites and services where I prefer their iPhone apps or pages to their Web sites because the smartphone version is much more focused, easier to navigate, and faster.

For more insights on Google, iPhone, and other tech topics, follow my Twitter stream at twitter.com/jasonhiner

As I’ve been conducting my iPhone apps experiment I’ve also noticed that I’m starting to reach for the smartphone instead of the laptop more often, even when I’m in fixed locations such as conference rooms or even at home. The instant-on access, portability, and growing library of quality iPhone apps are all factors driving this behavior.

No matter how you look at it, these trends add up to bad news for Google in mobile search because it translates into fewer people needing its search engine. And the mobile trends are accelerating. According to comScore, U.S. users who access the mobile Web from a smartphone on a daily basis jumped from 10.8 million in January 2008 to 22.4 million in January 2009.

“This underscores the growing importance of the mobile medium as consumers become more reliant on their mobile devices to access time-sensitive and utilitarian information,” said Matt Donovan, senior vice president of mobile at comScore.

There’s also big business associated with mobile search. ABI Research sees mobile advertising ramping up at a time when most other advertising mediums are declining. In terms of mobile search specifically, ABI Research sees the market expanding from $813 million in 2008 to $5 billion by 2013.

“While mobile search incorporates more contextually relevant information such as location,” said ABI Research director Michael Wolf, “consumers will increasingly look to search as a way to discover content and pertinent information that could drive purchasing behavior. Providers that can supply the most applicable solutions tailored toward mobile users will ultimately win in the marketplace.”

Right now, specialized apps are providing a much more tailored experience than mobile search portals like Google and Yahoo. I believe Google realizes what’s at stake and the trends that are working against it - at least partially - and that’s why it has developed its own mobile platform with the Android OS.

Nevertheless, Android is fighting an uphill battle against the iPhone and its growing momentum in mobile applications. Plus, Android will have to battle RIM’s BlackBerry platform and Palm’s new webOS platform Both RIM and Palm already have a strong legacy of building a platform ecosystem for developers, an area where Android has struggled so far, even with its open source appeal.

The bottom line is that I fully expect smartphones to become the most widespread global computing platform in the next five years, driven heavily by the developing world, where the smartphone will be the primary PC for the majority of users. And as smartphones become more dominant, it is going to naturally migrate some power and influence away from search (and Google) and toward mobile computing applications.
IT consultants usually want to say yes to all client requests, but some challenges, such as running cable, are better left to qualified professionals with specialized skills.

——————————————————————————————–

Clients develop new ways of challenging IT consultants every year. My consulting firm has been asked to install and configure VoIP phone systems; we’ve been charged with physically moving server racks and equipment between facilities; I’ve even found myself installing and terminating Ethernet cabling in new buildings. But just because IT consultants are asked to complete ancillary projects doesn’t mean they should.

It’s a hard lesson to learn. Not many IT consultants want to tell a client no, even when the client requests services outside the consultant’s area of expertise. Not all consultancies specialize in building Web sites, developing proprietary applications, installing or configuring VoIP systems, moving server rooms, installing associated electrical and HVAC systems, or running cabling; however, many consultancies are still tempted to say, “yes, we can do that for you” in response to almost any client request.
Do what you do

The trouble is many of the ancillary tasks clients request require specialized skills and expertise. Cabling is a perfect example. While a well-meaning consultant might agree to run three or four new cable drops for a long-time client to save delays and the hassle of identifying a qualified cable installer, such favors can prove troublesome. I know because I’ve run my share of cabling.

Some cabling adventures remind me of lessons I learned from installing drywall myself during a home remodel. Hanging four or five sheets of drywall took me an entire Saturday. First I had to get the drywall from the home improvement warehouse to my home, and I didn’t have the right truck, which complicated the effort. Then I struggled to maneuver the drywall, hang it in place, and secure it properly. Taping and mudding consumed another day. Later I watched a home improvement show in which professional drywall installers completed the same work in approximately one hour.

The lesson is simple: Different professions require different skills, tools, and expertise. That’s why I don’t think most IT consultants should install cabling. IT consultants who are used to wearing business dress clothing and not to carrying a toolbox are probably not well suited to hefting rolls of cabling up stairs, running plenum-grade wiring in tight spaces, or fishing Ethernet through finished walls. It’s a dirty job that requires specialized tools and a solid understanding of industry standards and even building codes.
Establish a value-added partnership

This doesn’t mean that you need to leave clients who require cabling assistance out in the cold. Instead, consider establishing a tight partnership with a cabling contractor. By working closely with a qualified contractor, your office can assist clients in addressing all their cabling needs, going so far as to serve as the centralized contact and invoicing party. If you cut a fair deal with the contractor, you can even make some extra money in the process.

Have you ever run cabling for any of your clients? What other ancillary projects or dirty jobs have you worked on for clients? Do you partner with contractors for any type of work that falls outside your area of expertise? Let us know in the discussion.

First Day at Consultant

An IT consultant’s first day on a new site is often like a new employee’s — you do almost nothing. Neither you nor your client can afford to waste time, but it happens just the same.

The main problem is communication (or lack thereof). You don’t know the company’s routine and personnel, and the client and users don’t know what you need from them. Realistically, you can’t expect to walk through the door and go straight to work on the first day. But with a little planning and cooperation from your client, that first day can be productive.
How to prepare for a successful first day

The project and the industry will dictate many unique requirements, but you can accomplish a lot on your first day if you go in well-informed and prepared. Here are seven tips for making sure your first day onsite isn’t a waste:

#1: Learn about the company
Your client may think that, as “the expert,” you already have all the answers, but you can’t do your best work in a vacuum. To avoid creating solutions that create more problems and to provide the best service possible, you need a view of the big picture. To that end, request a copy of the client’s mission statement and goals. If possible, procure a copy of the employee manual. You’ll also want the company to make full disclosure of all IT manuals and policies that impact your project.

#2: Set clear and realistic expectations
Make sure your new client understands that you’ll spend the first few days of your contract exploring the company’s facility, getting to know key personnel, and researching the project. Clients often expect consultants to have immediate answers and that’s unrealistic. You need time to assess the project and explore possible solutions.

It’s also helpful to provide the client with feedback at the end of your first day. A simple list of who you met with that day and what you plan to do the next day or two can prevent unrealistic expectations and instill confidence on the part of your client.

#3: Know your inside contacts
Ideally, you’ll have at least a few days after signing the contract before you actually put your services into action. Use that time to meet with or call the person you’ll work with the most in-house. If it’s the head honcho, you’ve got your work cut out for you, as they can be rather impatient once the deal is made, and “talk to my assistant about that…” might not get you the information you need. One way or another, you’ve got to make contact with someone inside who can help you organize that first day — you can’t do it alone. You’ll also need a list of all users, their contact information, their functions within the company, and their relationship to your project.

The key to a successful first day with a new client isn’t just your preparation, but helping the client plan for your arrival. You must work in tandem to get the most out of that first day.

#4: Meet personnel ahead of time
If possible, don’t wait until the first day to meet the client’s personnel; try to arrange a good time to drop in and say hello to everyone. That’s not always possible, but knowing your way around ahead of time can take the edge off that first morning. Not every client will want to accommodate you on this request, so defer to his or her wishes.

#5: Make sure key personnel will be available
Determine who you want to meet with on that first day and ask them to arrange their schedules accordingly. Work directly with your in-house contact or contact individuals directly. If you run into obstacles, such as key personnel being on vacation, consider postponing your start day. Remember, you client won’t think to check on these details. Postponing your start date because key personnel aren’t available is preferable to billing a client for wasted time.

#6: Conduct a technical equipment check ahead of time
Check on meeting rooms, telephone lines, and other equipment you might need, such as a computer, projector, video or audio conferencing, and so on. For instance, if you want to make a short presentation to a group of users, you’ll need a conference room and perhaps some video equipment. Not every client will have everything you need, so once you know what’s available, you can adapt or bring your own equipment.

You’ll need the cooperation of your in-house contact to schedule meeting rooms and equipment so there are no surprises. Arrive early if necessary to arrange the room and equipment. Even if someone in-house agrees to do this for you, arrive early enough to make sure everything is in place and that all the equipment works. In fact, you might have to set up everything yourself, but knowing what to expect will help you avoid delays.

#7: Have a backup plan
Remember all that documentation you requested the client provide — mission statements, manuals, and so on? Take those with you that first day. Despite your best efforts, if your plans fall through, you can spend the day perusing those documents.

Tuesday, June 15, 2010

Logon Script

Logon Script FAQ

Frequently Asked Questions About Logon Scripts:

1. How do I setup Logon scripts in a domain with Active Directory?
2. Why would I choose one method over another?
3. Can I use both methods to assign Logon scripts?
4. How do I setup Logon scripts so they support all of my clients?
5. How do I configure a Logon script for a user on the "Profile" tab in AD Users & Computers?
6. What languages can I use for Logon scripts?
7. Can I use a VBScript program for a Logon script on all clients in my domain?
8. How do I configure a Logon script with Group Policy?
9. What about Logoff, Startup, and Shutdown scripts in Group Policy?
10. What permissions are required for Logon scripts to run?
11. What can be done with a batch file Logon script, besides launch a VBScript program?
12. What about Logon scripts in an NT domain?

1. How do I setup Logon scripts in a domain with Active Directory?

There are two ways to assign Logon scripts. First, you can specify the Logon script on the "Profile" tab of the user properties dialog in the Active Directory Users and Computers MMC. Second, you can specify a Logon script in Group Policy.

2. Why would I choose one method over another?

You would assign a Logon script on the "Profile" tab of the user properties if you have client computers with Windows 95, Windows 98, Windows ME, or Windows NT. Group Policy is not applied on computers with these operating systems. If all of your clients have at least Windows 2000, you could use Group Policy to assign Logon scripts.

3. Can I use both methods to assign Logon scripts?

You can, but if a user logs on to a computer with Windows 2000 or above, both Logon scripts will run.

4. How do I setup Logon scripts so they support all of my clients?

If your users can Logon to both older clients (like Windows 95, Windows 98, Windows ME, or Windows NT) and the newer clients (like Windows 2000 and Windows XP), you should assign a batch file as the Logon script on the "Profile" tab for each user in the Active Directory Users and Computers MMC. The batch file can launch a VBScript program, as explained below. Once all of your clients are at least Windows 2000, you can use a VBScript program as the Logon script, and use Group Policy to assign Logon scripts to all users in a domain, site, or organizational unit.

5. How do I configure a Logon script for a user on the "Profile" tab in AD Users & Computers?

The field labeled "Logon script" on the "Profile" tab of the user properties dialog in the Active Directory Users and Computers MMC corresponds to the "scriptPath" attribute of the user object. The default location for Logon scripts specified by this attribute is the NetLogon share. By default, all users have read access to this share. The NetLogon share on the Domain Controller is located in the following folder:

%SystemRoot%\sysvol\sysvol\\scripts

where %SystemRoot% is usually "c:\winnt" and is the DNS name of the domain, similar to "MyDomain.com". This folder is replicated to all Domain Controllers in the domain. The usual practice is to enter the name of the Logon script, for example "NetLogon.bat", in the field labeled "Logon script" on the "Profile" tab for the user and place this file in the NetLogon share. The Logon script will run for the user when they Logon to any computer that is joined to the domain. You can also enter a UNC path in the "Logon script" field and place the file in another location. However, this location should be one that is replicated to all Domain Controllers. Alternatively, you can use a script or utility to assign the Logon script to the "scriptPath" attribute of the user object in Active Directory. A VBScript program to assign a value to this attribute for many users in bulk would be much faster than manually entering values for users one at a time in the MMC.

GPO loopback, and apply user setting a group of computer account

Ever have an instance where you needed to apply a consistent user experience on a specific computer no matter who logs in... but also allow their individual user settings to come through to map drives or favorites?

user setting Group Policy Loopback mode to the rescue.

The default behavior of Group Policy application goes like this: If a user account that resides in an OU falls under the scope of a Group Policy, it will apply all settings that are defined in the User Configuration-node in the Group Policy Editor. They just apply the user portion of the policy. So do computers. They just apply the Computer Configuration settings from all Group Policies under whose scope they fall. Quite simple logic: User logs in -> user account in Active Directory -> User Configuration applies; Machines boots up -> computer account in Active Directory -> Computer Configuration applies.

Given the problems above, people sometimes need to have certain User Configuration policies applied รข€“ on all workstations. That can be useful if you run a Terminal Server environment where people need to get certain User Configuration settings like screen savers or something. You might also need that if you want to run machines with a predefined user environment, no matter who logs in. Locked down kiosk computers for example. This all are points where Group Policy’s Loopback processing mode can help. By linking a Group Policy object with the loopback processing setting enabled to an OU, you force the computer (~computer accounts) to look at and apply the user configuration settings of all Group Policies as well:
Computer Configuration\Administrative Templates\System\Group Policy\

How does Group Policy application work, if you have enabled loopback? Well, let’s create a scenario. Bob wants to log on to the domain using his machine machine1. Machine1 lies in the scope of a Group Policy that enables loopback processing. When booting the computer, Bob will not notice any changes to the computer. It simply boots up - in the background, all computer configuration settings that machine1 should get applied, will be applied. Until now, normal behavior. Bob can now log in. After he logged in, machine1 will process the following policies depending on what loopback mode was configured on machine1.

If Merge Mode was selected, machine1 will first pull and apply all user configuration settings from the Group Policies of Bob’s Active Directory user account. That is, what would also happen if loopback wasn’t configured. After having applied Bob’s policies, machine1 applies all user configuration settings that are configured for the machine1 computer account in Active Directory. The fact that machine1’s user configuration settings get applied after Bob’s ones means, that machine1’s settings will win if there is a setting-contradiction. Last policy wins, or last writer win? if we want to say so.

If Replace Mode was selected, machine1 simply applies all user configuration settings of the Group Policies given for machine1’s Active Directory user account - nothing more. With Replace Mode enabled, the machine doesn’t even look at the settings Bob would normally get applied.

Not that, when machine1 looks at the user configuration settings it shall apply, it actually impersonates the user logged in. In our scenario, if Bob was logging in, machine1 will look at all policies it should apply according loopback, but with Bob’s permissions on every policy.