Comments Feed

PKI: Public Key Infrastructure – The Bane of Many Systems Administrators Commented on: 2 years ago (October 17, 2012) Article is not really geared towards system administrators ....more geared towards savvy end-users.
Using Personal File-Sharing Sites for Corporate Data Commented on: 2 years ago (September 18, 2012) The article has overlooked the fact that intellectual property owned by the organization, is now stored on a web site that is outside of the control of the organization. Specifically the...
Will "Death to Outlook" follow "Death to Word"? Commented on: 2 years ago (May 6, 2012) The same challenges also face Outlook add-ins, such as work-flow tools from third-parties and from Microsoft that integrate into Outlook. As the clients [users] move away from the Outlook client,...
Maybe Domain Membership Is Passé? Commented on: 2 years ago (April 24, 2012) This idea should be explored more in your columns and in Windows IT Pro. After work ends, I attend college classes. I am surprised how easily and productively I can access the university's...
Migrating PST data to Office 365 Commented on: 3 years ago (January 18, 2012) Good insights. Now do you trust Office365 enough to delete all of your remaining copies of those PST files? :-)
Get Exploited Like It's 1999 Commented on: 3 years ago (November 8, 2011) To re-state what you said above: We are all just "one click away" from causing a "meltdown" whether at home or in the office. It shouldn't be that easy.
Office 365 plans for small companies: E or P? Commented on: 3 years ago (October 14, 2011) In the article you mentioned the "migration from public folders to Office 365." If you open thethe linked Microsoft document, the in the document properties the title is actually, "...
That blasted BCC Commented on: 3 years ago (September 16, 2011) Although this may not be the intention, I find that using "BCC" can be underhanded and sneaky (at least the way some people employ the feature). For me, a more forthcoming way to...
Symantec: Facebook Revealing User Data to Third Parties Commented on: 3 years ago (May 12, 2011) Ah, the irony in your last statement... :-)

Does this news make you more concerned about security issues with social media platforms like Facebook, Twitter, and Linkedin...

Personal computers on the corporate network Commented on: 4 years ago (January 12, 2011) Is this the whole article?

Near the end of the article the paragraph starts with, "The first step..." Are there any other steps? It seems like the article has been truncated or overly...

John Savill's PowerShell Master Class

Join John Savill for 9 hours of comprehensive PowerShell training. This course will start from the ground up, walking through the basics of PowerShell, how to create basic scripts, and building toward creating custom modules to achieve amazing results in your environment, in non-Microsoft environments, and in Azure.

Invest a few hours each week and become the #1 PowerShell expert in your organization.

Sessions meet Thursdays, March 5th through March 19th

Topics covered will include:

  • Remote management with PowerShell
  • Connecting commands and mastering objects
  • Creating PowerShell scripts and best practices to aid in code reuse
  • Parsing data and working with objects
  • Desired State Configuration
  • Building PowerShell workflows using Orchestrator SMA and Azure Automation
  • PLUS new capabilities in PowerShell 4.0 and 5.0


Windows Forums

The Windows IT Pro forums are moving to! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×