• Disable Delayed ACK in VMware ESXi for iSCSI: A lot of system administrators I encounter are faced with various levels of performance issues most of them are related to host resources over commitment and some are because of poor I/O performance. If you are using iSCSI protocol for your main storage communication then you might have […]

    Read More
  • You are logged in to your RDP session but cannot copy and paste between your physical machine and your remote session or within the session itself. This can manifest itself with file copy or simply text values such as URL’s, excel spreadsheet data or any any other form of text data you are just simply […]

    Read More
  • While utilizing the microsoft exchange powershell to export the message tracking logs your Reciepents and RecipienStatus  fields come up with “System.String[]” instead of the actual value. This occurs because both the Reciepents and RecipienStatus values are  a collection of objects and inorder to properly view them we will need to expand them into a string value. […]

    Read More
  • When a user logs in from a windows 7 machine and starts working suddenly the server CPU, RAM or both spikes up. the rdpclip.exe is used to manage the in-memory copy functions during RDP sessions. the rdpclip.exe high cpu or memory on terminal server issue is caused rare occasions because of memory leak or a function loop. […]

    Read More
  • Microsoft has released  RDP 8.1 support for windows 7 service pack 1 (SP1) this new release addes new features and improvments such as: Support for faster reconnction times Fixed connection reliability issues. RemoteApp impvroments Remote desktop gateway pluggable authentication and authorization Provides better error messages for connection failures. Resolves a time-out issue in which a […]

    Read More
  • While Message Tracking is enabled by default I have noticed that this is not always the case or that sometimes system administrators disable it because of the high data storage consumption of the log files without fully realizingthey are doing more harm then good. For those of you who do not know what tracking logs are, […]

    Read More
  • As anyone who has ever called DELL for technical support regarding a server DELL tech support will always 100% of the time will ask you for DSET logs, now while this is very easily accomplished on a physical server since you can simply run the DSET collector and send them the logs in a virtual […]

    Read More
  • Thin provisioning an OK idea for test a terrible idea in production: I see more and more system administrators utilize thin provisioning in their production environment(s), some use it as a means to conserve storage utilization, some use it for storage over commitment. But most simply do not understand how thin provisioning works and why […]

    Read More
  • Configure a custom sendto shortcut with Microsoft Outlook / Windows photo viewer send to email: When you try to email an image file from the windows photo viewer it will automaticlly convert and adjust your image for you. This isn’t the optimal solution esspcially if you want to email lets say a TIFF file what […]

    Read More
  • Granting full access premissions to Microsoft Exchange 2010: First thing I have to point out that giving full mailbox access to all mailboxes is a bad idea. It should be done on demand with the appropriate approvals and paper/email trails due to the obvious legel reasons of this matter.  But there are times when this may be required […]

    Read More