In a period of radical change in Redmond, don't be surprised to see Microsoft making moves (and partnering with rivals) in ways it never would have done in the past.
- By Mary Jo Foley
- 02/07/2014
Instead of lamenting over the loss of the subscription service, Microsoft IT pros should focus on making software development easier in a post-TechNet world.
- By Greg Shields
- 02/07/2014
Kaspersky Labs, the firm who disclosed the flaw to Adobe, said one of the vulnerabilities is being used to steal user credentials.
Along with the figures, Microsoft slams Obama's NSA surveillance reform plans for not going far enough to ensure transparency.
When evaluating current or possibly new staff members, look to see who utilize automation for repetitive time sinks.
Knowing exactly what in-memory OLTP tables are used for will help you make the most of one of SQL Server's newest features.
- By Denny Cherry
- 01/31/2014
Brien walks you through how to repair a failed drive within a storage pool to quickly get you up and running after an error occurs.
If Microsoft wants its next OS to be a success, it should look to what made Windows XP so popular.
Wondering how manufacturers can continue to release larger storage drives every year? Here's some of the tech that makes it possible.
- By Scott D. Lowe
- 01/29/2014
Here's how to determine which SharePoint version is right for individual machines and how to make sure they play nicely with different versions.
- By Spike Xavier
- 01/27/2014
Here's how to differentiate between OS virtual disks and virtual machine virtual disks.
While malware moving from mobile devices to PCs have become the norm, malware moving in the opposite direction looks to be a new attacker trick.
Choosing the right fit for your organization comes down to balancing cost with performance.
Cisco found that 76 percent of all Web-based attacks were targeted at Java.
The hacker collective Syrian Electronic Army took credit for the hacks and posted fake messages warning that Microsoft is spying on users' e-mail accounts.
Besides using replicas as protective backups, they can be used for testing purposes.
After April 8, option to download Microsoft's free antimalware software for XP systems won't be available.
Plus: The security agency is actively researching encryption-breaking quantum computing technology.
From not embracing change to segmenting groups, here are some ways in which IT leaders are setting up their teams for failure.
Even the most experienced System Center pros can fall victim to these common installation goofs.
- By Greg Shields
- 01/06/2014