Nobody likes to be lectured about security. When it comes to enforcing e-mail security practices among end users, some benevolent trickery is sometimes needed.
Microsoft is said to be planning a new "Life" edition of Office 365 for spring 2020, but Brien is most intrigued by the password manager that's reportedly coming with the bundle.
A new feature in Microsoft's Office 365 Advanced Threat Protection service promises to fill in the gaps of traditional anti-phishing defenses.
For better or worse, the next 10 years will bring more intelligent devices to more areas of our daily lives. From the proliferation of AI to what that means for user privacy, here are Brien's tech predictions for 2020 and beyond.
From Google Glass to the Microsoft HoloLens, the past decade has dramatically changed the face of the tech landscape. Here's a year-by-year look at the biggest game-changers of the decade.
After the Windows 8 fiasco, Microsoft has mostly succeeded in cleaning up the GUI with Windows 10, with one exception: The administrative tools are still scattered all over the place.
Though handy, Hyper-V guest clusters can extra complexity to your workloads that can cause problems with backups. Here are the four most common error messages and how to fix them.
When the touchscreen on your Windows 10 laptop goes bad, there's no reason to throw that baby out with the bath water.
Brien answers two thought-provoking reader questions. First, do Hyper-V VMs have direct hardware access? And second, how is it possible to monitor VM resource consumption from the host operating system?
The differences between these two Hyper-V versions are pretty significant, depending on what you plan to use them for. Here's a quick rundown of each platform, from their features to licensing quirks to intended use cases.
Microsoft is testing out a new technology called "Fluid Framework." It could mean that Brien's dream of one Office app to rule them all might soon become reality.
Microsoft threw Office 365 admins a bone when it gave them the ability to block users from purchasing Power Platform tools without IT approval. Here's how to prevent total anarchy.
Admins, take note: Hackers are increasingly targeting Office 365 with new and more sophisticated phishing schemes. Here's a snapshot of the most common methods.
Brien walks you through one of Hyper-V's best features: its ability to copy a file directly from a host server to a virtual machine without leveraging the network stack.
Microsoft meant well with Windows 10's Action Center, but the constant pop-up notifications are often more annoying than helpful. Here's how to get rid of them.