Hashtables and PSCustomObjects may look similar in PowerShell, but they serve very different purposes. This post explores their syntax, performance, and practical use cases, helping you choose the right structure for dynamic data handling or clean output formatting.
Choosing between -match and -like depends on the complexity of your pattern matching. Use -like for simple wildcard checks, such as finding strings that contain certain characters (* and ? are your friends). When you need more power, like anchoring patterns, grouping, or advanced conditions, reach for -match, which leverages regular expressions. In short: -like is quick and simple, -match is precise and flexible.
PowerShell 7.4 introduces a subtle but impactful change: the default encoding for HTTP requests is now UTF-8 instead of ASCII. This shift can cause unexpected issues when working with the Microsoft Graph API, particularly during .intunewin file commits in Intune. In this post, I explain the root cause, share workarounds, and offer practical solutions to keep your automation workflows running smoothly.
Tired of manually downloading LEGO building instructions? This PowerShell function automates the process by fetching the instruction page, filtering valid PDF links, and saving them neatly into a folder per set. Whether you’re organizing your collection or just love scripting, this tool adds efficiency and fun to your LEGO hobby.
Measure-Command is a simple yet powerful tool to gain insight into the performance of your PowerShell code. Whether you’re optimizing scripts or just curious — to measure is to know.
PowerShell Remoting lets you run commands, gather inventory, and automate fixes across dozens—or hundreds—of systems from one console. In this guide you’ll enable remoting safely, run one‑off commands with Invoke-Command, build persistent sessions for faster workflows, push scripts, move files, and troubleshoot connectivity like a pro. If you manage Windows servers or mixed environments, mastering these patterns will cut tedious RDP hops, standardize execution, and boost reliability—while keeping security (WinRM, auth, firewall, encryption) front and center.