In-Depth Features


Kerberos Authentication 101: Understanding the Essentials of the Kerberos Security Protocol

Knowing the basics of this pervasive protocol can be critical in troubleshooting and solving Windows security problems.

Keeping Dead Products Alive: Tips for Supporting Legacy Software

Software companies rely on regular customer upgrades and decommissioning old titles. But what is good for vendors isn't so great for IT, which often has to support unsupported software.

ANALYSIS: Happy Data Privacy Day, Punk!

Data Privacy Day starts on January 28, but the parties behind it might not be its best advocates, nor even take the concept seriously.

Top 6 Microsoft 'Mulligans': A Do-Over Wish List for Redmond

Here's six decisions we think Microsoft would most love to take a mulligan on.

12 Worst Tech Industry Flip Flops

From Google to Microsoft to HP (and Microsoft a few more times), here's 12 tech flip-flops that continue to resonate.

CES 2012 Tech Wrap Up: The Good, The Bad and the Weird

With CES in the books for 2012, we present you with some of the winners, losers and head scratchers of the show.

Top 9 Candidates To Succeed Steve Ballmer

If Microsoft did replace Steve Ballmer, here's who we predict would be on the company's short list.

13 Most Important Microsoft Product Lines

Microsoft has its hands in many areas -- here's the 13 most important products to keep an eye on in 2012.

Top 14 Products that Changed IT in the PC Era

Here's our picks for some of the most important computing releases ever. Be sure to share your take in the comments!

6 Most High-Profile Tech Spats of 2011

You already know Oracle's Ellison is going to be on this list -- find out who else just couldn't seem to hold back last year.

Fixing Active Directory Disasters: A How-To Guide

Spotting Active Directory problems isn't necessarily simple, but it can help avoid a catastrophe. These tales of AD disasters come from real-life situations and should serve as instruction -- and perhaps a warning -- to IT pros.

Top 5 Security Incidents of 2011 (and Their Impacts Going Forward)

We run down the top security concerns of the year and speculate what their meanings will be for the future.

The Great Cloud Bottleneck: How Capacity Issues Can Kill Your Cloud Project

Cloud computing vendors promise the world, but if your network isn't up to the task, the resulting speed, bandwidth and latency issues may doom your project from the start.

11 Quick Tips for a Successful Cloud Deployment

From the SLA to WAN optimization, here's 11 steps you don't want to skip.

Cloud vs. WAN Costs: A Breakdown

Researchers show the trend for cloud computing vs. on-premise costs.

Transitioning to the Cloud: A Preparation Guide

From architecture to management to cost to possible latency issues, here's what you need to consider before you make the move.

Cross-Platform Wish List: 5 Windows Applications Microsoft Should Port (or Port Better) for Macs

Microsoft has made great strides over the years in bringing its software to the Apple platform, but there are a few applications that still need to make the move -- or need some work before they can really hum on a Mac.

Q&A: Mark Russinovich on 'Zero Day' and Beyond

The Microsoft technical fellow discusses his new novel about dangerous malware a security expert must eliminate.

Portable Devices: Security Best Practices for Preventing Data Leakage

Every company has precious data it needs to protect. While every organization's needs are unique, some best practices can go a long way toward preventing data leakage.

Inside Windows 8: What You Need To Know

Redmond doubles down on its emerging client OS, which promises to support legacy and "Metro style" applications on two different hardware platforms.

Subscribe on YouTube