Brien chronicles what went right and wrong during his Office 2013 migration.
Using carefully configured archive mailboxes can help youwork around Exchange storage limits and corporate retention policies.
An April Microsoft security update has been re-released after being pulled due to compatibility issues for Windows 7 users.
The Dow Jones took a tumble after a fake alert about a White House attack was posted on the news organization's Twitter feed.
Scott Lowe outlines the three top things IT should keep an eye on when monitoring storage usage.
- By Scott D. Lowe
There are a variety of features and settings for securing your Microsoft Windows Server infrastructure, so be sure you make the right choice.
An independent study found that Microsoft's search results included much more malware than Google's.
Bulletin MS13-036 was pulled after incompatibility issues arose with a popular third-party antivirus program.
Will adding a second step when logging in lower the amount of hijacked accounts?
The recent explosion of the storage market has provided a huge amount of choice for your enterprise. Here are five options that are vying to be your data storage solution.
- By Scott D. Lowe
An Internet Explorer fix should be the top priority for IT on Tuesday.
Can Microsoft's sandbox protect applications from the attacks of yesterday?
Your guide to using System Center Virtual Machine Manager to configure your VMs and hosts.
According to Mary Jo Foley, it's not jut Xbox consoles and tablets -- Microsoft also has it's eye on PPI displays (and they'll play into Redmond's services aspirations, as well).
- By Mary Jo Foley
Help Greg Shields settle an ongoing debate regarding app virtualization with Don Jones by "voting" in the comments!
- By Greg Shields
System Center has morphed into a true private cloud platform. Here's a quick overview of what this means and how your IT infrastructure can take advantage of it.
Readers' thoughts on whether the Start button should return.
- By Jeffrey Schwartz
Being bogged down by application messages can disrupt anybody's productivity. Brien discusses how you can cut down on these nagging (and sometimes harmful) messages.
Brien discusses his process of replacing a backup battery and gives some insight on how to avoid this issue in the future.
And one security expert unravels the tangled web of related attacks.