Top Eight Features in Windows Server 8 - Slide 8

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Top Eight Features in Windows Server 8-8 Next

Microsoft has vastly expanded the number of PowerShell cmdlets in Windows Server 8 to provide comprehensive coverage of the various capabilities in Windows Server — including Hyper-V 3. In effect, the new GUI tools can be likened to a thin shell over the PowerShell scripting engine, whose purpose is to create the underlying PowerShell scripts that are executed to perform the actual task. Indeed, the new Active Directory Administrative Center will show PowerShell commands that have been executed, which will be useful for troubleshooting or learning. A PowerShell script can be executed locally, or remotely to manage a Windows Server 8 cloud.

Microsoft's upcoming Windows Server 8 has started gaining some prominence since the software giant previewed it at the BUILD conference. Its cloud-based paradigm and focus on large-scale deployments is self-evident, and at least one executive from Microsoft has called Windows Server 8 "the most cloud-optimized OS" developed by the Redmond-based company.

For now, its availability as a developer preview on MSDN means that various in-depth assessments of its capabilities are starting to roll in. It is clear even at this early stage that the next server operating system from Microsoft is a technically sophisticated one, and crammed with capabilities that bring many previously enterprise-only capabilities to small and mid-sized businesses.

This slideshow highlights some of the top features businesses can expect from Windows Server 8.

More Slideshows:


Password Misuse Could be the Root Cause of Hacking SpikePassword chaos amongst IT staff and apathy about password security amongst their senior management is creating a security nightmare.

The Six Dumbest Hacks of All Time While hackers can be dangerous, not every hacker is a Kevin Mitnick.

Seven Tips to Protect Your Google WalletEven with Google Wallet's built-in identity theft protections, you still need to be wary of hackers.

 

Related Topics : Server Operating Systems, Apache, Linux Kernel, Solaris, UNIX

 
More Slideshows

IIoT IIoT Gaining Momentum in Adoption and Results

Cost reduction has been the main driver of IIoT adoption. Other contributors are the emergence of ancillary and complementary technologies, including low-power hardware devices, the cloud, Big Data analytics, robotics and automation and smart sensors. ...  More >>

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.