- My heart goes out to all those in Oklahoma affected by the May 20 tornado. If you can help, please do.
- Microsoft releases lots of documentation on how they do things for their internal network. Here’s an example: two papers on best practices for securing Active Directory.
- I am delighted to report that a whole bunch of my students from the Navy school I helped run in Pensacola have been promoted to IT2. Well done.
- You could pay $817 for this book on Amazon, or you could read the PDF for free: Introduction to Machine Code for Beginners. Very well worth a look if you’re at all curious about programming. (Old guy note: I learned to program in Z80 assembly about… well, a long time ago.) It’s less than 50 pages.
- Speaking of programming: this guy got a lot of press by writing a Wall Street Journal editorial saying that he’ll only hire people with some fundamental knowledge of programming: “Sorry, College Grads, I Probably Won’t Hire You.”
- The boys and I saw Star Trek Into Darkness the other day. It was good, but I preferred the 2009 Star Trek better. I have high hopes for Man of Steel, though.
- TechEd North America starts in less than two weeks! I’m putting the finishing touches on my slide deck and demos. If you’re there, stop by my session or the Ask the Experts booth and say “hi”.
Thursday trivia #94
Filed under General Stuff
Gun collecting, state by state
From my homeboy Pat Richard on Facebook, original source unknown:
You may have heard on the news about a southern California man put under 72-hour psychiatric observation when it was found he owned 100 guns and allegedly had (by rough estimate) 100,000 rounds of ammunition stored in his home. The house also featured a secret escape tunnel.
My favorite quote from the dimwit television reporter: “Wow! He has about a quarter million machine gun bullets.” The headline referred to it as a “massive weapons cache!”
By southern California standards someone owning 100,000 rounds would be called “mentally unstable.” Just imagine if he lived elsewhere:
In Arizona, he’d be called “an avid gun collector.”
In Arkansas, he’d be called “a novice gun collector.”
In Utah, he’d be called “moderately well prepared,” but they’d probably reserve judgment until they made sure that he had a corresponding quantity of stored food.
In Texas and Montana, he’d be called “the neighborhood ‘Go-To’ guy.”
In Alabama, he’d be called “a likely gubernatorial candidate.”
In Louisiana, he’d be called “an eligible bachelor.”
In North Carolina, Mississippi and South Carolina he would be called “a deer hunting buddy.”
And, in Georgia, he’s just “Bubba” who’s a little short on ammo.
Filed under General Stuff
Exchange 2013 Inside Out enters “early release” period
![]() |
Lately I have been busy working on Exchange 2013 Inside Out: Clients, Connectivity, and Unified Messaging. More precisely, I’ve been dividing my time between performing technical review on Tony’s book, Exchange 2013 Inside Out: Mailbox and High Availability, and writing new content for my book. It’s all Exchange, all the time! To be more precise, right now I am about 55% done with the book: the chapters on unified messaging, Lync integration, message hygiene, client management, and mobile device management are done, and I’m working on the transport chapter now. That leaves me with chapters on CAS, load balancing, and Office 365 yet to do– certainly enough to keep me busy! |
Microsoft Press is offering an early access program for these books (and a number of others). If you buy the ebook now, you get immediate access to the parts of the book that have been completed (meaning they’ve been through at least the first part of the editorial pipeline), with access to the remaining chapters as they’re finished. When the entire book is released in its final form, you get an electronic copy of it as well. I’m excited to see Microsoft Press offering early access to the book, because all signs point to gathering interest in the practical aspects of deploying Exchange 2013– something both books talk about quite a bit. We are targeting the final version to cover SP1 when it’s released, so there will be updates to the early access versions as well.
Now, back to writing!
Filed under General Stuff, UC&C
Thursday trivia #93
Wow, lots of catching up to do. I’ve been writing a weekly set of notes for students at Acuitus’ school for veterans, and that’s taken all my Thursday material for the most part. It just dawned on me that I could have been posting those notes here too. Oops.
- If you’re feeling handy, why not build your own working digital computer out of paperclips? That’s how they did it back in 1967.
- Steve Sinofsky ran the Office and Windows divisions at Microsoft. Every article he writes is worth reading carefully, but especially this one: Using meetings to be more effective.
- If you don’t have two-factor authentication enabled, you really should. Why? It can save your bacon. Here’s how to do it for Microsoft accounts, Google accounts, and Facebook.
- Really interesting paper, “Marching Towards the Sweet Spot: Options for the US Marine Corps in a Time of Austerity“
- I now have my FAA high-performance endorsement (which doesn’t mean what you probably think it does) and am checked out in the flying club’s Cessna 182. Time for some more flying!
Filed under General Stuff
PC reliability: Apple, Dell, and lessons for servers?
Via Ed Bott, a fascinating article on real-world robustness from Windows 7 and Windows 8 PCs: Want the most reliable Windows PC? Buy a Mac (or maybe a Dell). You should read the article, which outlines a report issued by Soluto, a cloud-based PC health and service monitoring company. Their report analyzes data reported to their service by customers to attempt to answer the question of which manufacturer’s PCs are the most reliable. Apple’s 13″ MacBook Pro comes out on top, with Acer’s Aspire E1-571 coming in second and Dell’s XPS 13 in third. In fact, out of the top 10, Apple has two spots, Acer has two spots, and Dell has five. Ed points out that it’s odd that Hewlett-Packard doesn’t have any entries in the list, and that Lenovo (which I have long considered the gold standard for laptops not made by Apple) only has one.
The report, and Ed’s column, speculate on why the results came out this way. I don’t know enough about the PC laptop world to have a good feel for how many of the models on their list are consumer-targeted versus business-targeted, although they do include cost figures that help provide some clues. There’s no doubt that the amount of random crap that PC vendors shovel on to their machines makes a big difference in the results, although I have to suspect that the quality of vendor-provided drivers makes a bigger difference. Graphics drivers are especially critical, since they run in kernel mode and can easily crash the entire machine; the bundled crapware included by many vendors strikes me as more of an annoyance than a reliability hazard (at least in terms of unwanted reboots or crashes.)
The results raise the interesting question of whether there are similar results for servers. Given that servers from major vendors such as Dell and H-P come with very clean Windows installs, I wouldn’t expect to see driver issues play a major part in server reliability. My intuition is that the basic hardware designs from tier 1 vendors are all roughly equal in reliability, and that components such as SAN HBAs or RAID controllers probably have a bigger negative impact on overall reliability than the servers themselves– but I don’t have data to back that up. I’m sure that server vendors do, and equally sure that they guard it jealously.
More broadly, it’s fascinating that we can even have this discussion.
First of all, the rise of cloud-based services like Soluto (and Microsoft’s own Windows Intune) means that now we have data that can tell us fascinating things. I remember that during the development period of Windows 2003, Microsoft spent a great deal of effort persuading customers to send them crash dumps for analysis. The analysis revealed that the top two causes of server failures were badly behaving drivers and administrator errors. There’s not much we can do about problem #2, but Microsoft attacked the first problem in a number of ways, including restructuring how drivers are loaded and introducing driver signing as a means of weeding out unstable or buggy drivers. But that was a huge engineering effort led by a single vendor, using data that only they had– and Microsoft certainly didn’t embarrass or praise any particular OEM based on the number of crashes their hardware and drivers had.
Second, Microsoft’s ongoing effort to turn itself into a software + services + devices company (or whatever they’re calling it this week) means that they are able to gather a huge wealth of data about usage and behavior. We’ve seen them use that data to design the Office fluent interface, redesign the Xbox 360 dashboard multiple times, and push a consistent visual design language across Windows 8, Windows Phone 8, Xbox 360, and apps for other platforms such as Xbox SmartGlass. It’s interesting to think about the kind of data they are gathering from operating Office 365, and what kind of patterns that might reveal. I can imagine that Microsoft would like to encourage Exchange 2013 customers to share data gathered by Managed Availability, but there are challenges in persuading customers to allow that data collection, so we’ll have to see what happens.
To the cloud…
Filed under General Tech Stuff, UC&C
Blacklist blacklist blacklist: the forbidden word
I just got chapter 6 of Exchange 2013 Inside Out: Clients, Connectivity, and Unified Messaging back from Microsoft Press. Like most other major publishers, Microsoft Press has a strict process to try to catch potentially offensive, libelous, slanderous, or sensitive terms before they appear in print. In this particular chapter, the editors requested many changes because of the odd vocabulary associated with message hygiene. For example, it’s OK to say “spam” to mean “an unwanted commercial e-mail message,” but it’s not OK to say “ham” to mean “a legitimate or desired commercial e-mail message” because in some book markets, ham is either unheard of or regarded as offensive.
However, they also busted me for using “blacklist,” as in “real-time blacklist.” This is the accepted term of art for a DNS-based system that allows an e-mail server to look up IP addresses of senders in real time to decide if they appear on a list of known or suspected spammers. Apparently “blacklist” is an offensive word in some contexts, although I’m having a hard time figuring out where or why.
Imagine my surprise when I fired up my Xbox tonight and saw this:

Now, to be clear, I get it– Microsoft Press is not the same as IEB, Microsoft’s behemoth of a business unit. I’m sure they have different rules or something. And my editor, bless her heart, is only enforcing the rules forced on her by some clique of zampolits…but seriously?! Xbox LIVE has tens of millions of worldwide customers who are seeing this forbidden word. On the other hand, my book, if I am very lucky, may sell as many as 25,000 copies (that would make it a runaway hit by computer book standards), and yet I can’t use a well-known and commonly accepted term in context.
Sheesh…
Exchange OWA IM integration and Lync trusted application pools
I am a bit ashamed to say that I wasted most of a day on this, but I’m posting this in the hopes that I can help someone else avoid the same mistake I made.
I just spent about five hours troubleshooting why I couldn’t get Exchange 2013 Outlook Web App to display IM and presence data from a Lync 2013 standard edition server. I had carefully followed the integration steps in the documentation, including the part that says this:
If you have installed the Microsoft Exchange Unified Messaging Call Router service and the Microsoft Exchange Unified Messaging service on the same computer then there is no need to create a trusted application pool for Outlook Web App. (This assumes that the server in question is hosting a SipName UM dial plan.
So, having read that, I didn’t set up a trusted application pool or trusted application… and IM didn’t work.
I fussed with certificates. I read a ton of documentation. I swore. I drank too much diet Coke. I ran OCSLogger and found errors about an unknown peer. “AHA!” I thought. “There must be an error in the docs and you really do need to create a trusted application pool.”
So I created the pool and the trusted app. Two quick lines of PowerShell, a quick login to OWA, and voila:

As much as I would like to claim that it was a documentation error, this was pure fail on my part: the problem was that my Exchange 2013 server doesn’t host a SIP dial plan, so Lync doesn’t automatically add it to the Lync known servers table. It will have a SIP dial plan when I get to the next section of this chapter, but that’s a post for another day.
So, in summary: yes, you do need to create a trusted application pool and application for your Exchange servers even if they are multi-role unless they are hosting a SIP dial plan.
Now, time for another diet Coke…
MEC 2014: Austin, 31 March-2 April 2014
This is pretty darn exciting: Microsoft has announced the official date and time of the Microsoft Exchange Conference (MEC) in 2014. It will be held in Austin, home of at least one of the original MECs (the first one, maybe? I wasn’t there so I’m not sure) from 31 March to 2 April 2014.
I am sure that nothing bad will come of Microsoft’s decision to include April Fool’s Day as part of the conference. Nope, not at all.
On a personal note, I am excited that the conference will be in Austin. It’s one of my favorite cities, and I’ll be making side trips to see family (Hi, Lee Anne!) and friends while there. I also believe that we should have an Exchange-themed visit to the Salt Lick BBQ. Stay tuned for details!
Filed under UC&C







