The final part of Brien's Hyper-V upgrade involves using a 10GbE connection for replication traffic -- without having access to enterprise-class hardware.
The first half of Brien's project to replace his outdated Hyper-V servers took nearly 10 days and multiple replication failures. Here's what went wrong and how he fixed it.
In a move that will be well-received by many users, Microsoft has lifted some key restrictions on how companies can brand their Office 365 environments.
The new Sandbox feature in Windows 10 lets organizations run potentially risky executables in isolation, without having to set up a virtual machine.
For power users of Microsoft's various Office services, life just got a little bit easier.
Now that he's had a few months to test drive Microsoft's new browser, Brien shares his thoughts on what makes Edge tick.
Of the many security improvements Microsoft made to the latest Windows 10 release, the ability to wall-off the Edge browser against malware attacks is one of the most critical.
Microsoft's newest Office 365 addition seems like a solid business app, but does it bring any functionality that isn't already scattered throughout the rest of the suite?
Few things are more frustrating that being interrupted by an unwanted reboot. Here's how to make Microsoft's Windows 10 updates work around your schedule.
Windows Server has a built-in iSCSI initiator that it can use to connect to an iSCSI target. Before it can do so, however, you'll need to enable and configure the initiator. Here's how.
If the hardware behind your domain controllers has become outdated, here's a step-by-step guide to performing a hardware refresh.
So you want to know whether a Hyper-V virtual machine built on a legacy host will be supported by a newer server? There's a PowerShell command for that.
It's time again for Brien to perform a major storage upgrade on his Hyper-V hosts. But this time, he's taking a new approach.
While the overall look and feel of Office 365 is pretty standard across organizations, there are several ways to personalize it and make it fit better with your company's specific needs.
For decades, group policies have been the go-to method for securing devices on a Windows network. In this age of BYOD, however, that may not be enough.