The temporary fix looks to get a permanent solution with this month's Microsoft patch.
Will quantum cryptography provide air-tight security?
System Center 2012 SP1's Virtual Machine Manager IP pools offer the same zero-effort IP addressing experience that desktop administrators have enjoyed for years.
- By Greg Shields
When weighing the benefits of the newest player in the storage market, enterprises need to look at the increased performance vs. the relatively small storage size.
- By Scott D. Lowe
Lync Server is a powerful communications platform, but there are several things you can do to further improve its performance.
Office 365 is working great in Don Jones' shop, but there are issues you need to be aware of. He shares what he's found out (so far).
Mary Jo Foley explains why Microsoft's next-gen Xbox console will impact more than gaming.
- By Mary Jo Foley
Brien chronicles the update process and gives his initial thoughts on the mobile OS update.
Here's a tip, don't try to make up a fake diplomat title to get out of being arrested.
Look for Microsoft to pull back the curtain on the major Windows 8 update at May's TechEd and June's BUILD conference.
- By Jeffrey Schwartz
In order to get the most out of Active Directory, you need to give a lot of thought to an efficient configuration that matches your workflow.
Brien chronicles what went right and wrong during his Office 2013 migration.
Using carefully configured archive mailboxes can help youwork around Exchange storage limits and corporate retention policies.
An April Microsoft security update has been re-released after being pulled due to compatibility issues for Windows 7 users.
The Dow Jones took a tumble after a fake alert about a White House attack was posted on the news organization's Twitter feed.
Scott Lowe outlines the three top things IT should keep an eye on when monitoring storage usage.
- By Scott D. Lowe
There are a variety of features and settings for securing your Microsoft Windows Server infrastructure, so be sure you make the right choice.
An independent study found that Microsoft's search results included much more malware than Google's.
Bulletin MS13-036 was pulled after incompatibility issues arose with a popular third-party antivirus program.
Will adding a second step when logging in lower the amount of hijacked accounts?