Columns


Windows Phones Are Everywhere!

Here's a look at some of the extreme environments that Microsoft's mobile devices are being put to the test.

XP Support Death: One Week Later

So far, it's been quiet out there. But don't take the lack of news as an indication that the attackers have moved on.

When Should You Create New SQL Server Indexes?

Here's how to spot when new indexes are needed to improve performance.

What To Do in the Wake of the Heartbleed Bug

While Web sites scramble to patch the vulnerability, it's time to change your online passwords.

How To Upgrade Hyper-V to Windows Server 2012 R2

This three-step process will get your virtual machines running on Microsoft's latest Windows Server version.

The Cloud's Role in Enterprise Data Storage Architecture

Here's some of the options IT has in tying their on-premise data storage with the cloud.

Microsoft Issues Last XP Security Fixes in Small April Patch

Microsoft's April Security Update features only two "critical" bulletins.

What To Expect from TechEd 2014

While Microsoft has had a very strong cloud focus in the past few years, look for a deeper on-premise enterprise theme at this year's event.

Citrix Products Evolve, but Name Changes Obscure Unification

It's done it again. Citrix Systems, the company of two dozen products and 200 names, has announced yet another honorific for its flagship solution, Citrix XenApp 7.5.

Bing Seeps Deeper into the Microsoft Core

As Microsoft continues to find more places where it can integrate Bing , it's becoming less and less likely the company can -- or will -- sell off Bing.

How IT Can Operate as Outsourcing Providers

Microsoft is increasingly assuming that IT departments everywhere will move to a services provider model, which essentially means you'll be outsourcing your infrastructures.

Leaked Documents Allege NSA Is Targeting Foreign System Admins

A series of internal message board posts detail how system admis are being targeted to gain access to the networks they control.

Microsoft Warns of Office RTF 0-Day Attacks

It's recommended that IT disable Rich Text Files from being opened through Microsoft Office.

Antivirus Maker Blasts Microsoft for Ending Windows XP Support

Avast said that once April 8 rolls around, a quarter of its users will be left vulnerable to higher risk of attack.

What's Next for Windows?

It's no secret Microsoft Windows 8.x hasn't lit the world on fire at a time when Redmond's needed a big hit.

Scaling Up vs. Scaling Out: What's the Right Storage Decision?

Choosing what's right for your company comes down to scaling and workload needs.

Firefox, Safari and IE Brought Down in Annual Pwn2Own Hacking Contest

The HP-sponsored event proved that while today's software is more secure than ever, vulnerabilities will be found once money is on the line.

Running PowerShell's Best Practices Analyzer

Use PowerShell's baked-in analyzer to set up best practice scans.

It's Time for Microsoft Application Unification

While Redmond has gone to lengths to provide the same OS experiences on the PC, tablet and phone, universal applications over all devices would help to further the "One Microsoft" focus.

How to Use Data Deduplication in Windows Server 2012 R2

Brien Posey shows you how to take advantage of one of Windows Server's newest tricks.

Redmond Tech Watch

Sign up for our newsletter.

I agree to this site's Privacy Policy.