Windows Phone 7's ActiveSync support leaves something to be desired -- Brien Posey walks you through what's available, what's not and why.
Read the fine print to understand Hyper-V licensing, which comes with some caveats.
- By Greg Shields
- 02/14/2011
From Codebook to XAX, here's five upcoming Microsoft technologies Mary-Jo Foley says to watch out for.
- By Mary Jo Foley
- 02/11/2011
Patch Tuesday reminds us once again that hackers will always be a step ahead. Plus: Outlook issue to be fixed out of band; Intel's intentions with McAfee buy seem questionable.
- By Jabulani Leffall
- 02/09/2011
Role-based access management is the all the rage, but you'll need third-party software support to make it work in Windows.
Should IT support token-generated, one-time passwords for users on a network?
- By Readers of Redmond magazine
- 01/31/2011
Cloud backup is simple, if you remember to set it up in the first place.
Hackers go after your browsing sessions. Plus: Conficker worm is gone, but not forgotten; unrest in Egypt worries Microsoft, Cisco.
- By Jabulani Leffall
- 01/31/2011
Token-based login technology has improved significantly, so what are you waiting for?
Mary Jo Foley weighs in on whether Microsoft actually has a shot in the tablet space.
- By Mary Jo Foley
- 01/05/2011
Resolving locking issues with SQL Server 2008 R2 can be troublesome -- but it can also be surprisingly straightforward.
- By William R. Stanek
- 01/05/2011
You can still work with SharePoint even when you're working offline if you optimize your SharePoint Workspace storage architecture.
Now may be the time to outsource your Exchange server -- here's why.
- By Greg Shields
- 01/01/2011
Readers weigh in on Doug's recent column regarding the future of VMware.
- By Readers of Redmond magazine
- 12/31/2010
Why can't Google's executives live up to their "do no evil" motto?
Plus: Hackers compromise Gawker media sites; Google and Redmond ad malware investigated; Symantec takes a look at the problems you'll be facing in 2011.
- By Jabulani Leffall
- 12/14/2010
Plus: An eighth of malware attacks come from USB devices, scareware instances are growing.
- By Jabulani Leffall
- 12/07/2010
Maintaining a SQL Server environment is a potentially complex endeavor. Here are 10 tips for ways you can minimize complexity and reduce stress.
- By Paul S. Randal
- 12/06/2010
There are a handful of specialized tools that make large-scale Windows 7 deployment much easier than with previous versions. Here's how to use them.
- By Joshua Hoffman
- 12/01/2010
It's December, and that means one thing for us pundits: It's time for our annual look-back and look-ahead columns.
- By Mary Jo Foley
- 12/01/2010