By Lafe LowThe upcoming Office 2013 is a true cloud-driven productivity, collaboration and communication platform. Office 15, Lync and SharePoint are seamlessly integrated, support each other and work together through their connections in the cloud.
SharePoint 2010: Manage SharePoint AppsBy Steve Wright , and Corey ErkesEstablishing an effective governance structure takes research, planning, precise execution, and ongoing evaluation and maintenance.
Cloud Computing: Virtual ClustersBy Kai Hwang, Jack Dongarra and Geoffrey FoxVirtual clusters convey certain benefits over physical clusters in terms of speed, storage and flexibility.
Identity and Access Management: Access Is a PrivilegeBy John MutchPrivileged-access lifecycle management is a process and technology framework that can make your access controls more efficient and effective.
Windows 7: Virtualization LicensingBy Jorge OrchillesMicrosoft has a multitiered program for virtualization licensing. It can seem a bit confusing at first, but it ensures you get just what you need.
SQL Server 2012: T-SQL Code SnippetsBy Saleem HakaniThe snippets in SQL Server 2012 are essentially templates that can expedite building database statements.
IT Management: Truth, Perception and CultureBy Romi MahajanPresenting a confident face on behalf of the culture of IT would go a long way toward changing perceptions.
Microsoft System Center Data Protection Manager 2012: Protect Your DataBy Paul SchnackenburgCentralized management and a scoped console simplify administration and troubleshooting duties for running backups.
Cloud Computing: Data Privacy in the CloudBy Vic (J.R.) WinklerThere are several steps you can, and should, take to ensure the security of your corporate data when moving to the cloud.
Windows Confidential:Living and Dying by the DemoBy Raymond Chen
Sometimes it’s not user feedback or product requirements that drive which features make it into a new release.
Toolbox:New Products for IT ProfessionalsBy Greg Steen
The trio of free tools this month helps you create and test regular expressions, remove Active Directory addresses and track IP usage.
Windows PowerShell:Defining ParametersBy Don Jones
There are simple and complex ways to define parameters in Windows PowerShell, and both ways have their benefits.
Utility Spotlight:Analyze Your Software for Security HolesBy Lance Whitney
The Microsoft Attack Surface Analyzer tool can pinpoint security flaws in the software you install.
Geek of All Trades:VM-Hosted RemoteApps - New Best Practice for Virtual Desktops?By Greg Shields
Using virtual machine-hosted RemoteApps could be the necessary next step in remote application access.
Exchange Q&A:Workable Work-AroundsBy Henrik Walther
There are work-arounds in Microsoft Exchange when you need to do things such as disable SSL 2.0 or resolve sync issues.