Comments Feed

PKI: Public Key Infrastructure – The Bane of Many Systems Administrators Commented on: 1 year ago (October 17, 2012) Article is not really geared towards system administrators ....more geared towards savvy end-users.
Using Personal File-Sharing Sites for Corporate Data Commented on: 2 years ago (September 18, 2012) The article has overlooked the fact that intellectual property owned by the organization, is now stored on a web site that is outside of the control of the organization. Specifically the...
Will "Death to Outlook" follow "Death to Word"? Commented on: 2 years ago (May 6, 2012) The same challenges also face Outlook add-ins, such as work-flow tools from third-parties and from Microsoft that integrate into Outlook. As the clients [users] move away from the Outlook client,...
Maybe Domain Membership Is Passé? Commented on: 2 years ago (April 24, 2012) This idea should be explored more in your columns and in Windows IT Pro. After work ends, I attend college classes. I am surprised how easily and productively I can access the university's...
Migrating PST data to Office 365 Commented on: 2 years ago (January 18, 2012) Good insights. Now do you trust Office365 enough to delete all of your remaining copies of those PST files? :-)
Get Exploited Like It's 1999 Commented on: 2 years ago (November 8, 2011) To re-state what you said above: We are all just "one click away" from causing a "meltdown" whether at home or in the office. It shouldn't be that easy.
Office 365 plans for small companies: E or P? Commented on: 2 years ago (October 14, 2011) In the article you mentioned the "migration from public folders to Office 365." If you open thethe linked Microsoft document, the in the document properties the title is actually, "...
That blasted BCC Commented on: 3 years ago (September 16, 2011) Although this may not be the intention, I find that using "BCC" can be underhanded and sneaky (at least the way some people employ the feature). For me, a more forthcoming way to...
Symantec: Facebook Revealing User Data to Third Parties Commented on: 3 years ago (May 12, 2011) Ah, the irony in your last statement... :-)

<<<
Does this news make you more concerned about security issues with social media platforms like Facebook, Twitter, and Linkedin...


Personal computers on the corporate network Commented on: 3 years ago (January 12, 2011) Is this the whole article?

Near the end of the article the paragraph starts with, "The first step..." Are there any other steps? It seems like the article has been truncated or overly...

NEW: John Savill's Microsoft Stack Master Class

Get 30 hours of detailed instruction covering the complete Microsoft solution stack. Invest a few hours each week and become THE Microsoft expert in your organization.

Thursdays, October 2nd to December 11th

John Savill will cover topics including:

* Deploying, Managing, and Maintaining Windows
* Key Features of Active Directory from Windows 2000 to Windows Server 2012
* Key elements of System Center 2012 and System Center 2012 R2
* Deploying, Migrating to and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common Tasks

Enroll by September 25th and SAVE $245!
 

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×