Windows IT Pro Guest Blogs

Jun 10, 2016
Sponsored

Are Your Backups Application-Aware?

Have you heard of VSS (Volume Shadow Copy Service), a Windows-native technology for making application snapshots? Is this feature good enough to back up your virtualized server? Let’s find out....More
Apr 28, 2016
blog

The Microsoft Enterprise Mobility Suite: Getting Better with Age

This just in: Last week we saw yet another quiet refresh to Microsoft’s Enterprise Mobility Suite bundle. Specifically, the Azure Remote App functionality was officially added to the suite along with Cloud App Security, and the Microsoft Identity Manager license became a first-class citizen. With Advanced Threat Analytics joining the bundle several months ago, the EMS suite is no longer just Azure AD Premium, Intune and Azure RMS....More
Apr 27, 2016
blog

Sponsor's blog: IT Megatrends You Need to Know and Share

Regardless of which subject matters experts you subscribe to, most agree that there are certain undeniable trends that are impacting the way client computing is going to exist in the future....More
Apr 21, 2016
blog

Securing Your Wi-Fi Is Crucial--Here’s Why

More and more organizations are implementing wireless networks in the workplace to take advantage of the benefits they offer. Such is their popularity that it is projected wireless connectivity will supersede wired connectivity within the next five years....More
Apr 6, 2016
blog

The Future of Human-to-Technology Interaction Is Here

I had the pleasure of being one of the lucky individuals who attended Microsoft Build 2016. I use the term "lucky" because the conference sold out in less than 2 minutes. Build routinely sells out, but selling out in less than 2 minutes makes the event seem more like a rock concert than a Microsoft developer conference. Don’t get me wrong, we “Microsoft guys” are pretty cool, but selling out at the speed of a rock concert is certainly rare....More
Apr 4, 2016
Sponsored

ESG Analyzes the Value of the Converged Architecture 700 for Virtualization (Video)

An ESG senior analyst explains the results of their economic value validation analysis and the net value and benefits of HPE's offering....More
Mar 29, 2016
blog

Sponsor's Blog: The Rise of Teleworkers – and the Tools That Enable Them

Organizations need to plan for the visible shift in the office-going culture that technological disruptions and new generations in the workforce are contributing to....More
Mar 23, 2016
blog

Sponsor's Blog: The Case to Examine Your Display Technology Strategy

When mapping or implementing your device acquisition and maintenance plans, don't forget about the importance of display as a factor in the end user experience....More
Mar 21, 2016
blog

Ransomware, Backups and Offline Storage--Oh My!

I’ve always taken a very serious approach to keeping the data center available, and there are always options for getting the availability levels where you want them--including a very old practice that seems like an excellent idea in the face of ransomware....More
Mar 10, 2016
Sponsored

From the Sponsor: Get a Sneak Peek into HPE’s New Hyper-Converged Solution

Get a sneak peek and register to learn about HPE’s new hyper-converged system March 15, 2016....More
Mar 8, 2016
blog

The Ultimate Network Security Checklist

One of the most popular posts on the GFI Software blog has always been The Ultimate Network Security Checklist from back in February 2012. Many readers asked us to give this a bit of an update to reflect better the current security world, so this month we launched a new version of the checklist....More
Mar 8, 2016
blog

Delve Analytics: Big Brother or Fitbit for the Enterprise?

Let's face it--we all are presented with challenges within the workplace to maintain effectiveness and efficiency. Within a typical work week, it can become extremely difficult to carve out enough time free of meetings or distractions to focus on key deliverables. It seems like an important text message, phone call or email always arrives to distract us, and then we are left trying to remember what it was we were working on in the first place!...More
Feb 22, 2016
Sponsored

The Security Imperative: Protecting Your PCs, Your Data, and Your Business

If you have a mobile workforce, you probably also have genuine concerns over how best to secure your data and devices. This white paper can help you navigate the security minefield and provide the answers you're looking for....More
Feb 11, 2016
blog

On-Premises Data Center: Your Apps and Devs Are Cheating on You

Gabriel is a lead developer for Halo Corp. Halo follows an agile development cycle, and thus he was notified that the business had given the OK and that he should now begin preparing development for v6 of the company's upcoming software release. Traditionally, Gabriel would make a service request for a new round of development virtual machines. Unfortunately, the service level agreement (SLA) for IT to respond to this request is 14 days. Gabriel made a quick decision: He created a Microsoft Azure subscription and was able to spin up the entire development environment in an afternoon!...More
Nov 30, 2015
blog

Are Office 365 Groups Finally Ready for Prime Time?

A few months ago I wrote about a great new feature called Office 365 Groups that has been introduced into the Microsoft cloud platform; I even had the opportunity to talk about Groups at the Connections conference this fall and with Paul Cunningham on the ExchangeServerPro podcast. There has been a lot of interest generated in Groups within the IT Pro community during the last several months as administrators start to educate end users on how they can be leveraged to solve business problems....More
Nov 4, 2015
Article

The Endpoint Is Back on the Agenda (and It’s a Huge Security Threat)

There was a time when IT security conversations were all about the network, with a focus on monitoring and controlling incoming and outgoing network traffic based on pre-defined security rules. By adding more walls and watching everything that entered and left the network, IT could safeguard corporate infrastructure and data. The endpoint was an afterthought.Throw in some anti-virus and maybe some encryption, and call it a day....More
Oct 17, 2015
Sponsored

Is There Any Option Other than the Cloud?

With the current release of Office 365, products are written for the cloud first. We now find ourselves waiting for features to make it to on-premises versions of Microsoft products. And while the same paradigm exists where only one of the offerings is full featured, its now the cloud that is full featured....More
Sep 11, 2015
Sponsored

IT admins guide to gaining more resources Pt. 2: making a pitch

Last time we talked about a few areas where an admin can bring a lot of value to the table such as revenue, business intelligence, and more. It’s easy to overlook a lot of these areas, but they’re important to think about as you determine exactly what you’ll say to get the resources you need, whether its headcount, budget, or approval on new hardware or software purchases. Once you’ve thought about where you provide value, it’s time to put together a knock-their-socks-off pitch. Here’s how....More
Sep 8, 2015
Sponsored

Planning to Avoid the Office 365 "Uh-Oh" Moment

Don’t let migration problems be the first time that you take a hard look at your on-premises Active Directory environment. Follow these steps and you will position yourself well to avoid the moment during your migration project when all you can say is “uh-oh.”...More
Aug 31, 2015
blog

VMWorld 2015: New VMware NSX SDN OEM, Nvidia Virtual Graphics Partnership

Users benefit as key players partner and innovate....More
What's Windows IT Pro Guest Blogs?

Timely insights from our Platinum Sponsors

Blog Archive

Sponsored Introduction Continue on to (or wait seconds) ×