Gaining file accessibility in an integrated environment doesn’t mean you give up authentication, permissions, or accountability. These products and approaches make it happen.
- By Roberta Bragg
- 05/01/1999
You’re bound to encounter them at some point in your career. Here are some survival tips for dealing with the tough ones in a professional manner.
- By Harry Brelsford
- 05/01/1999
Hold your horses. Linux isn't an NT killer just yet.
Are your users out of control? Try using profiles and system policies to manipulate the Windows NT Registry and regain control of your network.
- By Michael Chacon
- 04/01/1999
Knowing how secure the most secure operations are—and what products those organizations use to achieve it—can help you establish your own criteria.
- By Roberta Bragg
- 04/01/1999
Many more companies are beginning to understand what it takes to develop and retain skilled IT workers.
- By Linda Briggs
- 04/01/1999
Investing in certification is a winning business proposition for employees, prospective clients, and companies as a whole.
- By Richard Sheldon
- 04/01/1999
Beyond the obvious differences, these two designations have uncanny similarities. Harry ponders the MCSE vs. MBA question and asks, “Why not get both?”
- By Harry Brelsford
- 04/01/1999
What will the Microsoft trial mean to those whose livelihoods depend on Microsoft products?
You know in the back of your mind that not every message you send or receive is absolutely safe. Isn’t it time you figured out how to protect your enterprise e-mail system?
- By Roberta Bragg
- 03/01/1999
Prove your credentials with the new MCDBA premium title.
Perhaps the delay of Windows 2000 is not such a bad thing,
after all.
- By Linda Briggs
- 03/01/1999
As eyes are the windows of the soul, so help desks are the windows of IS. Here’s how to keep your help desk in top condition.
As a developer, do you understand the legal meaning behind
this concept? If you don't, it simply means you haven't
been sued yet.
- By John Ellsworth
- 03/01/1999
Before building system policies within Windows NT—especially if you’re going to migrate to Windows 2000—you must first understand the Registry’s structure and how it can be modified.
- By Michael Chacon
- 03/01/1999
While the din of giggles following the NT 5.0 name change
distracts everyone, Em remembers to ask, "Where's
the product?"
This secret document uncovers the new titles we can expect
from Microsoft in coming months.
A well-designed internal security audit can help you uncover soft spots in your system before an outsider points them out. Put on a trench coat, grab a clipboard, and start roaming the halls.
- By Roberta Bragg
- 02/01/1999
To supply IT’s demand for qualified professionals, Microsoft is committed to improving its training program for trainers.
- By Steve Willett
- 02/01/1999
From disk subsystems to file formats and permissions,
here are some best practices to follow when implementing
Windows NT.
- By Michael Chacon
- 02/01/1999