Last Updated on 19 July 2011, Total: 361 Knowledge Base Tips
| 37 | Active Directory |
| 76 | Admin |
| 9 | Applications |
| 4 | Exchange |
| 11 | Migration |
| 66 | Miscellaneous |
| 62 | Network |
| 77 | Security |
| 12 | Terminal Servers and Thin Clients |
| 7 | Virtual Platforms |
106 minutes - you will learn how to fully leverage the new reliability and management features in IIS 6.0. We’ll also explore IIS 5.0 compatibility mode and configure a poorly behaved unmanaged C++ ISAPI web application to automatically recycle to maintain availability while it is rewritten in managed code. We’ll learn how to programmatically modify the XML Metabase or recover... Read More
86 minutes - In this intermediate session, you will learn how UDDI is used as a directory and discovery service for XML Web Services. We’ll dig into how XML web services can be published and located through both the UDDI Web interface, and through the UDDI API in Windows Server 2003. We’ll explore some more advanced features of UDDI by... Read More
83 mins - In this advanced session, we will learn how to leverage the Authorization Manager API that’s built into Windows Server 2003 to control access to resources and limit the tasks that a user can perform. We’ll write code to perform dynamic access checks on specific tasks. We’ll compare and contrast controlling authorization via a custom-built SQL scheme and... Read More
92 minutes - This overview session will introduce you to the new developer features of the server and provide you with an overview of what they can do for you and your organization. Topics covered include UDDI, COM+ 1.5, MSMQ 3.0, enhancements in IIS 6.0, and Active Directory Application Mode (ADAM). We will also touch on the Windows Server 2003... Read More
36 minutes - look at the changes made to Internet Explorer in Windows Server 2003 and how these changes will affect the ISV or developer when developing applications. This short webcast will cover the background of why the default settings for Internet Explorer will be set at the highest level of security, how the user's experience will be affected and... Read More