Columns


5 Futuristic Microsoft Technologies

From Codebook to XAX, here's five upcoming Microsoft technologies Mary-Jo Foley says to watch out for.

Hackers Know It's All In the Timing

Patch Tuesday reminds us once again that hackers will always be a step ahead. Plus: Outlook issue to be fixed out of band; Intel's intentions with McAfee buy seem questionable.

Why Role-Based Access Management Is Hard

Role-based access management is the all the rage, but you'll need third-party software support to make it work in Windows.

January Letters: Readers Debate One-Time Passwords and More

Should IT support token-generated, one-time passwords for users on a network?

A Cloud Doofus: Backup Lessons From Life

Cloud backup is simple, if you remember to set it up in the first place.

Messing With Web Components

Hackers go after your browsing sessions. Plus: Conficker worm is gone, but not forgotten; unrest in Egypt worries Microsoft, Cisco.

It's Time To Lose the Passwords!

Token-based login technology has improved significantly, so what are you waiting for?

Whither -- or Wither -- the Winpad?

Mary Jo Foley weighs in on whether Microsoft actually has a shot in the tablet space.

SQL Server 2008 R2: Unlock the Locks

Resolving locking issues with SQL Server 2008 R2 can be troublesome -- but it can also be surprisingly straightforward.

Optimizing SharePoint Workspace Storage

You can still work with SharePoint even when you're working offline if you optimize your SharePoint Workspace storage architecture.

3 Reasons to Dump Your Exchange Server

Now may be the time to outsource your Exchange server -- here's why.

Google's Biggest Blunders

Why can't Google's executives live up to their "do no evil" motto?

January Reader Letters: VMware Beware

Readers weigh in on Doug's recent column regarding the future of VMware.

Microsoft's Holiday Present Includes 17 Patches

Plus: Hackers compromise Gawker media sites; Google and Redmond ad malware investigated; Symantec takes a look at the problems you'll be facing in 2011.

Still No Fix from Microsoft for Growing Number of IE Exploits

Plus: An eighth of malware attacks come from USB devices, scareware instances are growing.

Top 10 Secrets of a SQL Server Expert

Maintaining a SQL Server environment is a potentially complex endeavor. Here are 10 tips for ways you can minimize complexity and reduce stress.

A Modern Guide to Windows 7 Desktop Deployment: Enterprise Automation Tools

There are a handful of specialized tools that make large-scale Windows 7 deployment much easier than with previous versions. Here's how to use them.

Microsoft's Biggest Moments of 2010

It's December, and that means one thing for us pundits: It's time for our annual look-back and look-ahead columns.

Backup 2.0: The Way Forward

Old habits can die hard, but is the current way you're doing backup really the way it should be done?

Why Your Business Fears the Windows 7 Upgrade

It's more than the legitimate concerns about cost, compatibility and execution -- it comes down to the role of the operating system itself.

Redmond Tech Watch

Sign up for our newsletter.

I agree to this site's Privacy Policy.