Many organizations are slowly phasing out the traditional and clunky IPSec VPN for newer SSL VPNs. Here's the pros and cons.
Readers respond to a recent IT Decision Maker Blog post, "Windows Server 2012: IT Pros Will Need WS-MAN Remoting Skills (and Not Just for PowerShell)."
- By Readers of Redmond magazine
Self destruct sequence initiated.
A somewhat good idea receives a terrible execution.
A cloud-based server means a hacker can get to it from any location.
Brien discusses some of the changes Microsoft is going through with its products' latest lifecycle and provides some suggestions for what he would like to see.
If you lie on the Internet, expect to be called out quickly.
Will Microsoft's Surface help to bring in good security practices into the tablet world?
Windows 8 on mobile devices will be managed with Microsoft's cloud-based management tool. Here's why that's a bad thing.
Intune 3.0 is now available for download.
Four of the seven bulletins address RCE flaws.
Hackers could access your database in seconds.
Microsoft may finally solve a major Windows admin headache with this addition to the Microsoft Desktop Optimization package.
- By Greg Shields
Beyond the flexibility and costs savings of cloud computing are certain tactical advantages like automated provisioning and encrypted storage. This quick primer by cloud security expert Vic Winkler will give you the pros and cons of each.
Stuxnet was reportedly created by the U.S. and Israel.
Unauthentic certificates are to blame.
And your eHarmony password accounts, while you're at it.
Microsoft has a lot riding on partnerships with Yahoo!, Nokia and Barnes & Noble. Mary Jo Foley wonders why, and what the impact would be of any of these go under.
- By Mary Jo Foley
Why the one size-fits-all approach wouldn't work for you or Microsoft.
In this entry, Brien shares some knowledge and pointers on tackling the sessions and the exhibit hall of TechEd.