Comments Feed

PKI: Public Key Infrastructure – The Bane of Many Systems Administrators Commented on: 1 year ago (October 17, 2012) Article is not really geared towards system administrators ....more geared towards savvy end-users.
Using Personal File-Sharing Sites for Corporate Data Commented on: 1 year ago (September 18, 2012) The article has overlooked the fact that intellectual property owned by the organization, is now stored on a web site that is outside of the control of the organization. Specifically the...
Will "Death to Outlook" follow "Death to Word"? Commented on: 1 year ago (May 6, 2012) The same challenges also face Outlook add-ins, such as work-flow tools from third-parties and from Microsoft that integrate into Outlook. As the clients [users] move away from the Outlook client,...
Maybe Domain Membership Is Passé? Commented on: 1 year ago (April 24, 2012) This idea should be explored more in your columns and in Windows IT Pro. After work ends, I attend college classes. I am surprised how easily and productively I can access the university's...
Migrating PST data to Office 365 Commented on: 2 years ago (January 18, 2012) Good insights. Now do you trust Office365 enough to delete all of your remaining copies of those PST files? :-)
Get Exploited Like It's 1999 Commented on: 2 years ago (November 8, 2011) To re-state what you said above: We are all just "one click away" from causing a "meltdown" whether at home or in the office. It shouldn't be that easy.
Office 365 plans for small companies: E or P? Commented on: 2 years ago (October 14, 2011) In the article you mentioned the "migration from public folders to Office 365." If you open thethe linked Microsoft document, the in the document properties the title is actually, "...
That blasted BCC Commented on: 2 years ago (September 16, 2011) Although this may not be the intention, I find that using "BCC" can be underhanded and sneaky (at least the way some people employ the feature). For me, a more forthcoming way to...
Symantec: Facebook Revealing User Data to Third Parties Commented on: 2 years ago (May 12, 2011) Ah, the irony in your last statement... :-)

Does this news make you more concerned about security issues with social media platforms like Facebook, Twitter, and Linkedin...

Personal computers on the corporate network Commented on: 3 years ago (January 12, 2011) Is this the whole article?

Near the end of the article the paragraph starts with, "The first step..." Are there any other steps? It seems like the article has been truncated or overly...

NEW: Microsoft Hyper-V Master Class with John Savill

A new Master Class with John Savill! Get 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment.

During this training attendees will learn how to:

-- Architect a Hyper-V based virtualization solution.
-- Migrate from physical and other virtualization environments.
-- Implement a private cloud solution.

Thursdays, April 17th through May 8th

Upcoming Training

Deploying Windows 7 and Windows 8.1 with System Center Configuration Manager 2012 R2

Tuesday, May 6th @ 11am, 1pm, 3pm ET

In a single day you will learn to deploy Windows 7 and Windows 8.1 using System Center Configuration Manager 2012 R2 and MDT 2013. Johan Arwidmark guides you through the entire build process. You will learn about reference images, deployment of images, drivers injection, adding updates and applications and a great deal of real-world tips and tricks.

Enroll by April 29th and SAVE 15%
View All Online Training

IT/Dev Connections

Register now to get the best rates available!

Current Issue

April 2014 - The architectural components related to Hyper-V networking in System Center Virtual Machine Manager 2012 R2 can be confusing. Walk through all the VMM networking architectural components and how to use them.


Windows Forums

The Windows IT Pro forums are moving to! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×