Virtual PC software can ease migration and give any robust machine multiple personalities. Here’s what you need to know to take full advantage.
- By Jeremy Moskowitz
- 08/01/2004
Database Programming with C# explains the essentials of database programming to those familiar already with C#. Learn to exploit the VS.NET IDE to access data, and more.
- By Joel Semeniuk
- 08/01/2004
Deploying handhelds requires understanding the sensitivity of your data, the strengths & weaknesses of your infrastructure, & the needs of your IT team. There are no easy answers.
- By Jonathan Gossels and Dick Mackey
- 08/01/2004
A roundup of five biometric products that go the extra security mile—for when passwords alone aren't enough.
- By Roberta Bragg
- 08/01/2004
If you don't have the time, money or manpower to run your own messaging environment, it may be time to consider hosted Exchange.
MCP Magazine readers get a crack at the Microsoft CEO.
Microsoft's latest version of Systems Management Server includes a bevy of new features that early users say save them time and money.
- By Stephen Swoyer
- 08/01/2004
Use Microsoft's TerraService and MapPoint Web Services to start your own VS.NET-based mapping projects.
- By Roger Jennings
- 08/01/2004
EMC's virtual machine software edges out Microsoft's in overall features.
- By Jeremy Moskowitz
- 08/01/2004
The convergence of directory management and provisioning, and how organizations can leverage their directory management investments to meet their provisioning needs.
- By Ezra Duong-Van
- 08/01/2004
This admin got a shock when he discovered that usernames and passwords for his new employer's sensitive documents were being sent in cleartext. Fortunately, he was able to see the forest for the trees.
Debugging software systems is a necessary step to creating stable, low-defect software. Comprehensive VB.NET Debugging provides a roadmap that helps you avoid common traps and achieve your software goals.
- By Joel Semeniuk
- 08/01/2004
ASP.NET developers often use a base class inherited from the root class Page as a template to make their Web sites look consistent. However, the HTML is often embedded in the base class, preventing the template from being previewed or edited. Learn to work around this problem by separating the template and the base class.
From confidentiality, integrity, and availability to authentication, authorization, and audit, find out how you can employ best practices to make Web services secure.
- By Mark O'Neill
- 07/20/2004
We can learn lessons from trading hubs and apply the data to IT integration. See how the ESB removes the distinction among internal and external networks for supply-chain apps.
- By Dave Chappell
- 07/01/2004
Get the scoop on Microsoft's series of releases and updates that will tighten security on both the latest Windows operating systems as well as most other Microsoft products.
- By Danielle Ruest and Nelson Ruest
- 07/01/2004
If you’re using Windows 2000 Server or above, chances are you’re
also using Kerberos authentication. It’s time to get to know this
three-pronged protocol and learn how to troubleshoot it.
- By David W. Tschanz
- 07/01/2004
When mobile users need to look up and edit data without direct network connections, persist DataSets of lookup information as local XML files to preserve offline updates.
- By Roger Jennings
- 07/01/2004
Migrating applications is far from easy—that’s why choosing the right tool is imperative.
- By Danielle Ruest and Nelson Ruest
- 07/01/2004
The Guru's Guide to SQL Server Architecture and Internals helps SQL Server power users manage their complex enterprise systems. This valuable reference manual goes far beyond the product's base documentation.
- By Joel Semeniuk
- 07/01/2004