search this blogs

Wednesday, August 18, 2010

Java Virtual Machine

http://www.particle.kth.se/~lindsey/JavaCourse/Book/Part1/Supplements/Chapter01/JVM.html

Tuesday, August 17, 2010

programming language

concept of programming language
http://www.answers.com/topic/programming-language

What is a Debug Monitor and How Can it Benefit Me?

A debug monitor is very powerful graphical or console mode tool that monitors all the activities that are handled by the WinDriver Kernel. You can use the debug monitor to see how each command that is sent to the kernel is executed.


A WinDriver Kernel is a driver development toolkit inside ones computer that simplifies the creation of drivers. A driver is used in a computer so that the computer can read the devices that are in the computer or that get attached to the computer. If you were to hook up a printer to your computer, you would first need to install its driver so that the computer could create graphics or a console so that you could control your printer through the computer. The same thing goes for audio devices, internet devices, video devices.

A debug monitor, simply put, is a tool that helps to find and reduce the number of bugs and defects in a computer program or any electrical device within or attached to the computer in order to make it act the way it should. While the driver is being created and downloaded, the debug monitor helps it work properly. For example, when an armored car drives up to a bank and the guards have to transfer money from the truck to the bank, there are special guards that stand watch to make sure no one tries to rob them thus making the transaction go smoothly. Those guards could be the debug monitors in the computer industry.

If the debugging monitor locates a bug or defect in any of the equipment, it will first try to reproduce the problem which will allow a programmer to view each string that was within the bug or defect range and try to fix it. A programmer is a technician who has learned the basic format of computers that make them run. These are strings of technical information that most people using computers will never see. For example, using a clock. The general public will plug in the clock and use it to tell time but will not open it up to see how it works. That is saved for the people who fix clocks. They are the programmers of clocks in the computer industry.

The programmer will delete strings or add new ones and then use the debug monitor to re-create the driver download to see if he fixed the problem. This can be a tedious task with all the processes that run in the computer, but the debug monitor helps to make it a lot easier.

More details about LINUX

3. Understanding users and permissions


Linux is based on the idea that everyone using a system has their own username and password.



Every file belongs to a user and a group, and has a set of given attributes (read, write and executable) for users, groups and all (everybody).



A file or folder can have permissions that only allows the user it belongs to to read and write to it, allowing the group it belongs to to read it and at the same time all other users can't even read the file.



4. Who and what is root

Linux has one special user called root (this is the user name). Root is the "system administrator" and has access to all files and folders. This special user has the right to do anything.



You should never log on as this user unless you actually need to do something that requires it!



Use su - to temporary become root and do the things you need, again: never log into your sytem as root!



Root is only for system maintenance, this is not a regular user (LindowsOS don't have any user management at all and uses root for everything, this is a very bad idea!).



You can execute a command as root with:



su -c 'command done as root'



Gentoo Linux: Note that on Gentoo Linux only users that are member of the wheel group are allowed to su to root.



5. Opening a command shell / terminal

To learn Linux, you need to learn the shell command line in a terminal emulator.



In KDE: K -> System -> Konsoll to get a command shell)



Pressing CTRL-ALT-F1 to CTRL-ALT-F6 gives you the console command shell windows, while CTRL-ALT-F7 gives you XFree86 (the graphical interface).



xterm (manual page) is the standard XFree console installed on all boxes, run it with xterm (press ALT F2 in KDE and Gnome to run commands).



Terminals you probably have installed:



xterm http://dickey.his.com/xterm/

konsole (KDEs terminal)

gnome-terminal (Gnomes terminal)

Non-standard terminals should install:



rxvt http://www.rxvt.org/

aterm http://aterm.sourceforge.net

6. Your first Linux commands

Now you should have managed to open a terminal shell and are ready to try your first Linux commands. Simply ask the computer to do the tasks you want it to using it's language and press the enter key (the big one with an arrow). You can add a & after the command to make it run in the background (your terminal will be available while the job is done). It can be practical to do things like moving big divx movies as a background process: cp movie.avi /pub &. Jobs - the basics of job control



6.1. ls - short for list

ls lists the files in the current working folder. This is probably the first command to try out. It as a number of options described on the ls manpage.



Examples:



ls



ls -al --color=yes



6.2. pwd - print name of current/working directory

pwd prints the fully resolved name of the current (working) directory. pwd manpage.



6.3. cd - Change directory

cd stands for change (working) directory and that's what it does. The folder below you (unless you are in /, where there is no lower directory) is called "..".



To go one folder down:



cd ..



Change into the folder Documents in your current working directory:



cd Documents



Change into a folder somewhere else:



cd /pub/video



The / in front of pub means that the folder pub is located in the / (lowest folder).



7. The basic commands

7.1. chmod - Make a file executable

To make a file executable and runnable by any user:



chmod a+x myfile



Refer to the chmod manual page for more information.



7.2. df - view filesystem disk space usage

df -h



Filesystem Size Used Avail Use% Mounted on

/dev/hda3 73G 67G 2.2G 97% /

tmpfs 2.0M 24K 2.0M 2% /mnt/.init.d

tmpfs 252M 0 252M 0% /dev/shm





The flags: -h, --human-readable Appends a size letter such as M for megabytes to each size.



df manpage



7.3. du - View the space used by files and folders

Use du (Disk Usage) to view how much space files and folders occupy. Read the du manual page for flags and usage.



du is a part of fileutils.



Example du usage:



du -sh Documents/

409M Documents





7.4. mkdir - makes folders

Folders are created with the command mkdir:



mkdir folder



To make a long path, use mkdir -p :



mkdir -p /use/one/command/to/make/a/long/path/



Like most programs mkdir supports -v (verbose). Practical when used in scripts.



You can make multiple folders in bash and other shells with {folder1,folder2} :



mkdir /usr/local/src/bash/{old,new,dist,bugs}



mkdir manual page



The command rmdir removes folders.



7.5. passwd - changes your login password

To change your password in Linux, type:



passwd



The root user can change the password of any user by running passwd with the user name as argument:



passwd jonny



will change jonnys password. Running passwd without arguments as root changes the root password.



If you need to add several new users and give them password you can use a handy program like Another Password Generator to generate a large set of "random" passwords.



7.5.1. KDE

From KDE you can change your password by going:



K -> Settings -> Change Password

K -> Settings -> Control Center -> System Administration -> User Account

7.6. rm - delete files and folders, short for remove

Files are deleted with the command rm:



rm /home/you/youfile.txt





To delete folders, use rm together with -f (Do not prompt for confirmation) and -r (Recursively remove directory trees):



rm -rf /home/you/foo/





Like most programs rm supports -v (verbose).



rm manual page



7.7. ln - make symbolic links

A symbolic link is a "file" pointing to another file.



To make a symbolic link :



ln /original/file /new/link





This makes /original/file and /new/link the same file - edit one and the other will change. The file will not be gone until both /original/file and /new/link are deleted.



You can only do this with files. For folders, you must make a "soft" link.



To make a soft symbolic link :



ln -s /original/file /new/link





Example:



ln -s /usr/src/linux-2.4.20 /usr/src/linux





Note that -s makes an "empty" file pointing to the original file/folder. So if you delete the folder a symlink points to, you will be stuck with a dead symlink (just rm it).



ln manual page



7.8. tar archiving utility - tar.bz2 and tar.gz

tar (manual page) is a very handle little program to store files and folders in archives, originally made for tapestreamer backups. Tar is usually used together with gzip (manual page) or bzip2 (manual page), comprepssion programs that make your .tar archive a much smaller .tar.gz or .tar.bz2 archive.



kde



You can use the program ark (K -> Utilities -> Ark) to handle archives in KDE. Konqueror treats file archives like normal folders, simply click on the archive to open it. The archive becomes a virtual folder that can be used to open, add or remove files just as if you were working with a normal folder.



7.8.1. tar files (.tar.gz)

To untar files:



tar xvzf file.tar.gz





To tar files:



tar cvzf file.tar.gz filedir1 filedir2 filedir2...





Note: A .tgz file is the same as a .tar.gz file. Both are also often refered to as tarballs.



The flags: z is for gzip, v is for verbose, c is for create, x is for extract, f is for file (default is to use a tape device).



7.8.2. bzip2 files (.tar.bz2)

To unpack files:



tar xjvf file.tar.bz2





To pack files:



tar cvjf file.tar.bz2 filedir1 filedir2 filedir2...





The flags: Same as above, but with j for for bzip2



You can also use bunzip2 file.tar.bz2 , will turn it into a tar.



For older versions of tar, try tar -xjvf or -xYvf or -xkvf to unpack.There's a few other options it could be, they couldn't decide which switch to use for bzip2 for a while.



How to untar an entire directory full or archives?



.tar:



for i in `ls *.tar`; do tar xvf $i; done



.tar.gz: for i in `ls *.tar.gz`; do tar xvfz $i; done



.tar.bz2: for i in `ls *.tar.bz2`; do tar xvfj $i; done

2. Understanding files and folders

Linux is made with one thought in mind: Everything is a file.



A blank piece of paper is called a file in the world of computers. You can use this piece of paper to write a text or make a drawing. Your text or drawing is called information. A computer file is another way of storing your information.



If you make many drawings then you will eventually want to sort them in different piles or make some other system that allows you to easily locate a given drawing. Computers use folders to sort your files in a hieratic system.



A file is an element of data storage in a file system (file systems manual page). Files are usually stored on harddrives, cdroms and other media, but may also be information stored in RAM or links to devices.



To organize our files into a system we use folders. The lowest possible folder is root / where you will find the user homes called /home/.



/

/home/

/home/mom/

/home/dad/





Behind every configurable option there is a simple human-readable text file you can hand-edit to suit your needs. These days most programs come with nice GUI (graphical user interface) like Mandrakes Control Center and Suses YAST that can smoothly guide you through most configuration. Those who choose can gain full control of their system by manually adjusting the configuration files from foo=yes to foo=no in an editor.



Almost everything you do on a computer involves one or more files stored locally or on a network.



Your filesystems lowest folder root / contains the following folders:



/bin Essential user command binaries (for use by all users)

/boot Static files of the boot loader, only used at system startup

/dev Device files, links to your hardware devices like /dev/sound, /dev/input/js0 (joystick)

/etc Host-specific system configuration

/home User home directories. This is where you save your personal files

/lib Essential shared libraries and kernel modules

/mnt Mount point for a temporarily mounted filesystem like /mnt/cdrom

/opt Add-on application software packages

/usr /usr is the second major section of the filesystem. /usr is shareable, read-only data. That means that /usr should be shareable between various FHS-compliant hosts and must not be written to. Any information that is host-specific or varies with time is stored elsewhere.

/var /var contains variable data files. This includes spool directories and files, administrative and logging data, and transient and temporary files.

/proc System information stored in memory mirrored as files.





The only folder a normal user needs to use is /home/you/ - this is where you will be keeping all your documents.



/home/elvis/Documents

/home/elvis/Music

/home/elvis/Music/60s
linux desktop

1. What is Linux?

Linux is a free Unix-type operating system for computer devices. The operating system is what makes the hardware work together with the software. The OS is the interface that allows you to do the things you want with your computer. Linux is freely available to everyone. OS X and Windows are other widely used OS.

Linux gives you a graphical interface that makes it easy to use your computer, yet it still allows those with know-how to change settings by adjusting 0 to 1.

It is only the kernel that is named Linux, the rest of the OS are GNU tools. A package with the kernel and the needed tools make up a Linux distribution. Mandrake , SUSE Linux, Gentoo and Redhat are some of the many variants. GNU/Linux OS can be used on a large number of boxes, including i386+ , Alpha, PowerPC and Sparc.

Tuesday, August 10, 2010

WINDOWS 2000 practical

WINDOWS 2000
https://mail.google.com/mail/?ui=1&view=att&th=12a5b12a3a519ae0&attid=0.1&disp=vah&realattid=f_gcnrbld8
Client/server computing
Client/Server definitions
Client/Server logical layering
Client/Server physical layering
The J2EE Platform
The J2EE APIs
The J2EE architecture
The J2EE application development
The J2EE application server
http://www.gogis.nl/en/tutorial/docs/J2EE/body.html
Client/Server logical layering


To understand client/server computing it is important to understand that software can be divided in logical layers. All logical layers together form the application. Each layer in the software is responsible for a specific task in the application. The logical layering of an application does not need to be the same as the physical layering of an application ( see for the physical layering the next paragraph).



In theory we distinguish 6 layers in sofware, as shown in figure below. The layering as shown here is a reference model: in practise the layering will not be so clear as shown here.





Figure 2: Software layering

Presentation manager

A presentation manager displays the user interface. The presentation manager is responsible for the look and feel of an application: it defines how something is displayed to the user. It is also responsible for the infrastructure of user interface elements that are possible in an application. The user interface elements are not limited to text and controls , but also include things as grafics, sound, animation and movies. A presentation manager is not application dependent. All applications can use the same presentation manager.



In some operating systems there is a clean distinction between a presentation manager and the operating system itself (e.g. Linux/Unix with X-Windows) and a user can choose which presentation manager (s)he will use for the application (this choice is of course limited by the required user interface elements). Other operating systems only offer one presentation manager which is integrated with the operating system (e.g. Microsoft Windows).



Presentation logic

The presentation logic layer is responsible for what is displayed to the user. It defines which screens are displayed, when they are displayed, which navigation paths exist between screens, which fields to display etc.. The presentation logic layer is application dependent.



Application logic

The application logic layer contains the actual application logic. This is the layer where the application functionality is defined. The application logic layer is application dependent.



In praktice, this layer is the least recognizable of all layers. This layer is typically spread over all other layers whith most of its logic ending up in the presentation logic layer.

Business logic

The business logic layer contains the business rules of an organization. All the business rules should be shared between all the applications of the organization. This will ensure that changes in business rules will propagate through all the organization's applications. This layer is not application dependent but organization dependent.



Database logic

The database logic layer contains the data dictionary of the application (or even organization). It describes the tables, their columns, datatypes, primary and secondary keys. This layer is application (or even organization) dependent.



Database manager

This layer is responsible for the actual storage of data. This layer can be application/organization dependent but most of the time it is not. Most of the time the database manager is a commercial off-the-shelve application, which is able to manage many applications. For very simple applications the database manager and the operating file system are the same (persistence).



In practice, the database logic layer and the database manager layer are almost always one layer. Most database managers generate the physical storage facilities of the data on the basis of a database logic written in SQL. Whenever we speak of "database" in this tutorial we mean the integrated database logic / database manager layer.

Client/server computing & Client/Server definitions

Client/server computing


The J2EE platform is an implementation of the concept of client/server computing. So before we go into detail about the J2EE platform first an introduction to client/server computing in general.



There are many ways to create advanced distributed applications. This tutorial is about one such technology: the J2EE Platform. Other technologies that can do the same, like CORBA, DCOM or .NET, are beyond the scope of this tutorial.



Client/Server definitions

Client/server computing is an area in which there are as many definitions of terms as there are people working in that area. This tutorial also has its own definitions. In discussing client/server computing we have the following starting-points:





Client/server is a distributed software architecture in which systems are divided into autonomous processes [TODO: we need a distinction between a business process and an OS process], where a client sends requests to a server and that server sends responses as an answer to the request to that client.

Client/server is a concept that will distribute the autonomous processes over clients and servers, based on the suitability for the task of those clients and servers.



Figure 1: Client/Server roles

As can be seen clearly from the figure above, it is possible that a server can be the client of another server. In general there is no clear distinction between clients and server besides a concrete request. In a large distributed system almost every client is a server and every server is also a client.

Tuesday, August 3, 2010

International Features of Windows 2000

http://www.ficorp.com/intl_2000.html

Windows 2000 Server Features

Windows 2000 Server Features
Internet Information Services 5.0 (IIS)Integrated Web services enable users to easily host and manage Web sites to share information, create Web-based business applications, and extend file, print, media and communication services to the Web.
Active Server Pages (ASP) Programming EnvironmentActive Server Pages is consistently rated the easiest, highest performance web server-scripting environment available.
XML ParserCreate applications that enable the Web server to exchange XML-formatted data with both Microsoft Internet Explorer and any server capable of parsing XML.
Windows DNA 2000With the Windows Distributed interNet Applications Architecture (Windows DNA 2000) - the application development model for the Windows platform - you can build secure, reliable, highly scalable solutions that ease the integration of heterogeneous systems and applications.
Component Object Model + (COM+)COM+ builds on COM's integrated services and features, making it easier for developers to create and use software components in any language, using any tool. COM+ includes Transaction Services and Message Queuing Services for reliable distributed applications.
Multimedia PlatformWith integrated Windows MediaTM Services, configure and manage high-quality digital media content across the Internet and intranets--delivering live and on-demand content to the maximum number of users.
Directory-Enabled ApplicationsDevelopers can use a number of standard interfaces to write applications that utilize information stored in the Active DirectoryTM service about users, other application and devices. This enables rich, dynamic applications that are simpler to develop and easier to manage. All Active Directory functions are available through LDAP, ADSI and MAPI for extending and integrating with other applications, directories, and devices.
Web FoldersWeb Folders bring the richness of Windows to the Web, by using Web Document Authoring and Versioning (WebDAV) to enable drag and drop Web publishing.
Internet PrintingSend print jobs across the Internet to a URL.
8-way Symmetric Multi-Processor SupportScale up by utilizing the latest 8-way SMP servers for more processing power. Windows 2000 Server delivers support for up to 4-way SMP servers.
8 GB Memory Support (advanced)Take advantage of larger amounts of memory to improve performance and handle the most demanding applications, with support for up to 8 gigabytes (GB) of RAM with Intel's Physical Address Extension (PAE). Windows 2000 Server delivers support for up to 4 GB of RAM.Network Load Balancing (advanced)Scale out quickly and easily by distributing incoming IP traffic across a farm of load-balanced servers. Incrementally expand capacity by adding additional servers to the farm using Network Load Balancing (NLB).
Terminal ServicesRun Windows-based applications on the server, and access from a remote PC, Windows-based Terminal or non-Windows device over LANs, WANs or low-bandwidth connections, through terminal emulation software. In Windows 2000, Terminal Services are up to 20 percent more scalable and have dramatically improved performance for both high and low-bandwidth connections.
Enhanced ASP PerformanceMore scalable Active Server Page (ASP) processing, improved ASP flow control, and ASP Fast Path for scriptless ASP files enable faster Web page processing.
Multi site HostingInternet Information Services (IIS) 5.0 allows you to host more Web sites per server with high performance.
IIS CPU ThrottlingLimit the amount of CPU time a Web application or site can use to ensure that processor time--and therefore better performance--is available to other Web sites or to non-Web applications.
High throughput and bandwidth utilizationWith support for up to 1 GB networks, Windows 2000 Server delivers high performance processing on high performance networks. Increased throughput increases performance without having too increase network bandwidth.
Support for the Latest Security StandardsBuild secure intranet, extranet and Internet sites using the latest standards, including: 56-bit and 128-bit SSL/TLS, IPSec, Server Gated Cryptography; Digest Authentication, Kerberos v5 authentication, and Fortezza.
Active Directory IntegrationActive Directory integration with the underlying security infrastructure provides a focal point of security management of users, computers and devices making Windows 2000 easier to manage.
Kerberos AuthenticationFull support for Kerberos version 5 protocol provides fast, single sign-on to Windows resources, as well as other environments that support this protocol.
Public Key Infrastructure (PKI)The Certificate Server is a critical part of a public key infrastructure that allows customers to issue their own x.509 certificates to their users for PKI functionality such as certificate-based authentication, IPSec, secure email, etc. Integration with Active Directory simplifies user enrollment.
Smart card supportSupports logon via Smart cards "out-of-the-box" for strong authentication to sensitive resources.
Encrypting File SystemIncrease security of data on the hard disk by encrypting it. This data remains encrypted even when backed up or archived.
Secure network communicationsEnd-to-end encrypted communications across your company network using the IPSec standard. Great for protecting sensitive internal communications from intentional or accidental viewing. Active Directory provides central policy control for its use to make it deployable.
Routing and Remote Access ServiceConnects remote workers, telecommuters, and branch offices to the corporate network through dial-up, leased line and Internet links.
Virtual private networking (VPN)A full-featured gateway that encrypts communications to securely connect remote users and satellite offices over the Internet. Now with an updated PPTP support and advanced security with Layer 2 Tunneling Protocol
Kernel-Mode Write ProtectionHelps prevent errant code from interfering with system operations.
Windows File ProtectionPrevents new software installations from replacing essential system files.
Driver CertificationIdentifies device drivers that have passed the Windows Hardware Quality Labs test and warns users if they are about to install an uncertified driver.
IIS Application ProtectionApplication protection keeps Web applications running separately from the Web server itself, preventing an application from crashing the Web server.
Cluster service (advanced)2-node Cluster service supports fail-over, caused by hardware or software failure, of critical applications, including databases, knowledge management, ERP, and file & print services.
Network Load Balancing (advanced)On Web or Terminal Services server farms, re-distribute workload among remaining servers in the event of a server hardware or software failure in less than 10 seconds.
Job Object APIThe Job Object API, with its ability to setup processor affinity, establish time limits, control process priorities, and limit memory utilization for a group of related processes, allows an application to manage and control dependent system resources. This additional level of control means the Job Object API can prevent an application from negatively impacting overall system scalability.
Application Certification & DLL ProtectionApplications certified to run on Windows 2000 Server are tested by Microsoft to ensure high quality and reliability. Protects DLLs installed by applications from conflicts that can cause application failure.
Multi-master ReplicationActive Directory uses multi-master replication to ensure high scalability and availability in distributed network configurations. "Multi-master" means that each directory replica in the network is a peer of all other replicas; changes can be made to any replica and will be reflected across all of them.
Distributed File System (Dfs)Build a single, hierarchical view of multiple file servers and file server shares on a network. Dfs makes files easier for users to locate, and increases availability by maintaining multiple file copies across distributed servers.
Disk QuotasSet quotas on disk space usage per user and per volume to provide increased availability of disk space and help capacity planning efforts.
Hierarchical Storage ManagementAutomatically migrate data that hasn't been recently accessed to less expensive storage media, maximizing disk space for the most heavily accessed data on the disk.
Dynamic system configurationAdd new volumes, extend existing volumes, break or add a mirror, or repair a RAID 5 array, while the server is online, without impacting the end-user.
Rolling Upgrade Support (advanced)Using Cluster service and NLB, avoid downtime caused by planned maintenance or upgrades using rolling upgrades. Migrate your applications or IP workload to one node, upgrading the first node, and then migrating them back. You can roll out hardware, software, and even operating systems upgrades without taking the application offline. Both Windows Clustering technologies are backwards compatible with their Windows NT Server 4.0 predecessors.
Dynamic Volume ManagementAdd new volumes, extend existing volumes, break or add a mirror, or repair a RAID 5 array, while the server is online, without impacting the end-user.
Disk DefragmentationOver time, fragmentation can have a severe impact on the performance of a busy file or Web server. These tools increase disks availability and performance.
Safe Mode BootBooting in Safe Mode allows users to troubleshoot the system during start up by changing the default settings or removing a newly installed driver that is causing a problem.
Backup and RecoveryBackup and recovery features make it easier to backup data and then recover data in the event of a hard disk failure. Windows 2000 allows back up to a single file on a hard disk and tape media.
Automatic RestartConfigure services across the operating system, including IIS, to restart automatically if they fail.
Kill Process TreeStop all processes related to an errant process or application without rebooting the system.
Cluster Administrator (advanced)Run Cluster Administrator from any Windows NT or Windows 2000 system to remotely control multiple clusters from a single location.
Integrated Directory ServicesWindows 2000 introduces Active Directory, a scalable, standard-compliant directory service that makes Windows 2000 easier to manage, more secure, and more interoperable with existing investments. Active Directory centrally manages Windows-based clients, and servers through a single consistent management interface, reducing redundancy and maintenance costs.
Windows Management InstrumentationA uniform model through which management data from any source can be managed in a standard way. Windows Management Instrumentation (WMI) provides this for software, such as applications, while WMI extensions for the Windows Driver Model (WDM) provide this for hardware or hardware device drivers. WMI in Windows 2000 enables management of even more functions.
Delegated AdministrationActive Directory enables administrators to delegate a selected set of administrative privileges to appropriate individuals within the organization to distribute the management and improve accuracy of administration. Delegation also helps companies reduce the number of domains they need to support a large organization with multiple geographical locations.
Microsoft Management ConsoleUnify and simplify system management tasks through a central, customizable console that allows control, monitoring, and administration of widespread network resources. All management functions in Windows 2000 are available through the Microsoft Management Console (MMC).
Remote Management with Terminal ServicesSafely enable Terminal Services for remote administration purposes. Up to two concurrent sessions are supported, with no impact on performance or application compatibility.
Windows Script Host (WSH)Administer the server and automate tasks via the command line instead of graphical user interface tools with scripts.
Group PolicyGroup policy allows central management of collections of users, computers, applications, and network resources instead of managing entities on a one-by-one basis. Integration with Active Directory delivers more granular and flexible control.
Centralized Desktop ManagementManage users' desktop resources by applying policies based on the business needs and location of users. IntelliMirrorTM management technologies install and maintain software, apply correct computer and user settings, and ensure that users' data is always available.
Security Configuration Toolset (SCTS)Reduce costs associated with security configuration and analysis of Windows-based networks. In Windows 2000, use Group Policy to set and periodically update security configurations of computers.
PKI Group Policy ManagementCentrally manage Domain wide-PKI policies. Specify which Certificate Authorities a client will trust, distribute new root certificates, adjust IPSec policy or determine if a user will be required to use smart cards to long onto a particular system.
Windows NT 4.0 Domain migration toolsSimplify the upgrade process to a Windows 2000 domain.
Directory interoperabilityMeta directory technologies enable companies to use Active Directory to manage identity information stored in heterogeneous directory services.
Directory synchronization toolsMaintain and synchronize data between Active Directory and Microsoft Exchange and Novell NDS directories.
High interoperability with client computersSupports Windows NT Workstation, Windows 9x, Windows 3.x, Macintosh, and Unix operating systems. TCP/IP Appleshare support improves resource sharing for the Macintosh operating system.
Applications & Directory interoperabilityWindows 2000 compatible applications will install and upgrade onto the Windows 2000 operating system. Active Directory can interoperate or synchronize date with other directory services using Lightweight Directory Access Protocol (LDAP), Meta directory technologies, Microsoft Directory Service Synchronization, or Active Directory Connector. Integration with existing management applications and frameworkd via Windows Management Services.
Server & Mainframe interoperabilityMessage Queuing enables the exchange of information between applications running on mainframe platforms. Kerberos authentication protocol support enables interoperability with other systems using this industry standard authentication protocol. Services for NetWare is an add-on product that increases interoperability with NetWare servers and clients with Windows-based servers and clients. Services for Unix is an add-on product that makes it easier to integrate Windows NT 4.0 and Windows 2000 into a UNIX environment.
Latest server hardware (advanced)Support for the latest advanced 8-way SMP servers running Intel's Profusion chipset and architecture, and up to 8 GB of memory support with Intel's Physical Address Extension (PAE).
NetworkingWindows 2000 Server works with networking devices that support the latest networking technologies, including Plug and Play, DSL, VPN, routing, NAT, DHCP, Quality of Services switches and routers, Directory-Enabled Networking devices, IPSec, SSL, and Asynchronous Transfer Mode.
PeripheralsWindows 2000 Server works with the newest peripherals such as storage management hardware, USB printers, network adapters, keyboards and mice. It delivers advanced printer driver support, as well as support for 1394, PCMCIA, infra-red and digital devices.