This article discusses more issues that can arise when trying to customize the default user profile in Windows 7 and describes some possible workarounds.
This article discusses the history of building out test labs and how virtualization has made it much easier to create valid test labs that allow us to test software and services in a controlled environment.
In this article the author discusses Intel's new 1000 core processor.
This article continues the series on securing wireless network traffic by discussing some more of the security mechanisms that are typically built into wireless hardware.
This article considers Bandwidth, Service provisioning and ownership, Information Security, Data Integration and IT processes in the cloud computing age.