This was my second PowerShell session, and the second to be hosted by Jeffrey Snover (who happens to be the first person to have commented in my blog!).
Jeffrey is clearly very, very passionate about the capabilities of PowerShell, the security, the error trapping and the power. Rightly so! The PowerShell team have put a lot of thougt into how this environment works and how access to disparate information just works. Want to access a file on a drive? No problem. Want to access a registry key? No problem. Want to access a certificate? No problem. All with the same methodology.
Still got to get my head around it, though. Jeffrey does a great job of making it look easy, but I’m an IT Pro, not a developer, so it takes me a lot longer to understand how the various bits connect together.