General

Last Updated on 23 June 2014, Total: 152 Blog Posts

  1. MS Exchange Webinar: Myths and Best Practices of Email Archiving

    What archiving features are coming in MS Exchange 2013? What are the top myths and misconceptions when it comes to MS Exchange and email archiving? Why is email archiving considered the "Swiss Army Knife" of the IT world because it solves so many groups' problems in one solution? Read more and Register here!... Read More

  2. VirtualizationAdmin.com monthly newsletter

    The below extract is taken from September's VirtualizationAdmin.com monthly newsletter authored by Scott Lowe. 'I'll start by saying that I'm a fan of both vSphere and Hyper-V. Both have a place in the world. With the release of Windows Server 2012 has come Hyper-V Server 2012 along with a whole lot of incorrect information making its way around the Internet... Read More

  3. Windows Azure AD Rights Management tools

    Windows Azure AD Rights Management provides the ability to enable the use of digital rights management technology in organizations that subscribe to the Office 365 preview services. Office 365 Preview customers can enable rights management capabilities within the Preview versions of Exchange Online, SharePoint and Office. These downloads enable an administrator to manage Windows Azure AD rights management features and... Read More

  4. Creating an Office 365 Hybrid Deployment without a Lab Server

    Extract taken from September's MSExchange.org newsletter authored by Henrik Walther, MCM: Exchange Okay so there's quite a few of you that would like to test a migration from an on-premise Exchange environment to Office 365 in order to get some hands on experience prior to doing this as an administrator within your enterprise organization or maybe as a partner consultant... Read More

  5. Eulogy for TMG – Monthly Newsletter

    This year we celebrated the 15th birthday of Microsoft's proxy/firewall solution that has gone through a couple of name changes to get where it is today. Sadly, on September 12, Microsoft announced that the company is discontinuing TMG, along with FPE, FPSP, FSOCS and TMG Web Protection Services… Microsoft will continue to support the products through 2015, with extended support... Read More

  6. Set the desired level of IOPS with Amazon RDS

    Amazon's Cloud computing now includes new high performance provisioned IOPS storage for its Relational Database Service. Now, you can provision new RDS database instances with 1,000 to 10,000 IOPS, and with 100GB to 1 TB of storage for MySQL and Oracle databases. If you are using SQL Server, the maximum IOPS you can provision is 7,000 IOPS. The creation of... Read More

  7. IT Pros and Technology Consumers – Monthly Newsletter

    We often think about the IT professional and the technology consumer as two very different and always separate entities. Tech vendors target their products to one market or the other. Tech publications write to one audience or the other. But whereas Grandma might not ever buy a Cisco Catalyst 6509 switch or understand a word of the articles published on... Read More

  8. The European Cloud Computing Strategy

    The European Commission aims at enabling and facilitating faster adoption of cloud computing throughout all sectors of the economy in order to boost the productivity, growth and jobs in Europe. The strategy includes three key actions which are Standards & Certification, Contract terms & Conditions, and European Cloud Partnership Read more here - http://ec.europa.eu/information_society/activities/cloudcomputing/cloud_strategy/index_en.htm... Read More

  9. There is Too Much Cooling in Data Centers

    According to an assistant professor of computer science at the University of Toronto Scarborough, server environments can easily operate at warmer temperatures thus saving costs on air conditioning without endangering the health and performance of the hardware. Read more here – http://www.tomsitpro.com/articles/datacente-cooling-science_research-UTSC,1-549.html... Read More

  10. HTTPS sessions can be hijacked!

    Security researchers discovered that even HTTPS encryption that is used for secure connections throughout the Internet can allow attackers to hijack web browser sessions that support SPDY or TLS compression. SPDY is an open networking protocol used by Google and Twitter. This security weakness can be exploited when web sessions are protected by SSL or TLS and are using one... Read More

Featured Links