IT Management


10 Years of Trustworthy Computing: The Current State of Windows Security

A decade after launching its Trustworthy Computing initiative, Microsoft has come a long way but faces new challenges.

A United Microsoft: How Real Is It?

Mary Jo Foley on how Microsoft is trying to unite itself, and whether it's actually working.

Server Message Block 3.0: Microsoft's New Storage Model

Considering buying a SAN? Stop what you're doing. The world of storage is about to change and its future lies in a surprisingly familiar protocol: the Server Message Block (SMB).

Proper Employee Monitoring: Best Practices for Doing It Right

Some companies demand that IT track Web use or go even deeper into user behavior. Here are some tips on how to do it right and what tools to use.

Don Jones: Why I Use a Mac

Yes, Redmond magazine columnist and Windows author and expert Don Jones uses a Mac -- and not just occasionally. Read on to find out why.

10 Common IT Security Blunders (and How To Avoid Them)

While IT managers are trained early on to avoid obvious threats, many still fail to watch out for the basics. From password issues to excessive auditing to not using Group Policy, here's a list of 10 things to make sure your shop is taking care of.

What To Expect in SharePoint 2013

A new version of the Microsoft collaboration and enterprise content management platform is in the works, and it will offer improved social networking, client and mobile UI enhancements, an app marketplace, and better cloud support. And that just scratches the surface.

Think of Yourself as an Outsourced Services Provider

Your clients aren't customers; part of doing your job right will be saying "no."

Report: Office 365 Not Always the Lowest Cost Option

An industry-sponsored report released this month questions whether Microsoft's hosted offerings always represent the lowest cost option vs. other Microsoft-stack approaches.

Report: User Passwords Not Sophisticated Enough

Trustwave's 2012 Global Security Report includes a section on passwords that delves into weaknesses in user behavior, administrative policy and the technologies used to manage passwords.

First Look: Inside SQL Server 2012

SQL Server 2012 will offer a variety of new features centered on big data, business intelligence and cloud computing.

Calculating Cost: What's Your Time Worth?

When considering a new tool for your IT team, taking only the product cost into considering is about the most short-sighted thing you can do.

Report: Most Security Breaches Not Discovered Until Months After

Almost 60 percent of company breaches go unnoticed for months to years, according to a security report by Verizon.

Survey: PowerShell Skills Matter

Want a job in Windows IT? Get your scripting skills down.

System Center Key for 'Mature' Windows IT

To get the most out of System Center, you can't just implement it -- you have to dedicate your shop to automation.

Keeping Dead Products Alive: Tips for Supporting Legacy Software

Software companies rely on regular customer upgrades and decommissioning old titles. But what is good for vendors isn't so great for IT, which often has to support unsupported software.

Oracle Earnings Spark Fears of IT Downturn; Analyst Says Concerns Are Premature

Oracle stunned analysts late Tuesday with news that its latest earnings report fell far short of projections.

The Great Cloud Bottleneck: How Capacity Issues Can Kill Your Cloud Project

Cloud computing vendors promise the world, but if your network isn't up to the task, the resulting speed, bandwidth and latency issues may doom your project from the start.

Report: Close to 4,000 IT Jobs Lost in November

November ended with a net loss of 3,900 U.S. employees in the IT sector, according to analysis of U.S. government-compiled employment stats by Janco Associates.

11 Quick Tips for a Successful Cloud Deployment

From the SLA to WAN optimization, here's 11 steps you don't want to skip.

Upcoming Events

Redmond Tech Watch

Sign up for our newsletter.

I agree to this site's Privacy Policy.