Michael Otey profile picture

Follow Michael

Michael Otey

Petri Contributor

Michael Otey is president of TECA, a technical content production, consulting and software development company in Portland, Ore. Michael is a former SQL Server MVP and was Senior Technical Director for Windows IT Pro and SQL Server Pro. He covers the topics of SQL Server, Windows Server, Hyper-V, Azure, System Center Virtual Machine Manager, VMware vSphere, PowerShell and .NET development. Michael has written hundreds of technical articles and performed numerous hardware and software product reviews. He does frequent webcasts, is a presenter at IT/Dev Connections and other technical conferences and has written several books on SQL Server and .NET development.

LATEST

Outlook – 1

Using Stellar Repair for Outlook to Recover a Corrupted PST

Last Update: May 10, 2024

This post was Sponsored by Stellar Repair, you can learn more about their PST Recovery Tool here. Email is the de facto standard for today’s business communications. Businesses rely on email for personal communications, team assignments, announcements, and notifications as well as purchasing and other intracompany communications. This has been particularly true during the recent…

View Article
Microsoft 365 hero

Top Microsoft 365 Tools for Simplified Project Management

Last Update: May 10, 2024

Effective project management is essential for businesses of all shapes and sizes. Project management can help your organization to better manage project timelines, deliverables, and budgets while giving increased visibility into the status of a project. As well as into a project’s costs, risks, and team members. This post is sponsored by Brightwork The role…

View Article
Storage

Top 5 Features to Look for in On-Premises Veeam Storage

Last Update: May 10, 2024

In this article, we’ll examine some of the main challenges of today’s backup and disaster recovery procedures. Then, we’ll dive into the top five most important features to look for in an on-premises Veeam storage solution for your backups. Data protection is one of the most critical tasks for IT administrators, and there is no…

View Article
Security

Sponsored: Protecting your Domain and Users from Phishing Attacks

Last Update: May 10, 2024

Protecting your brand and your employees from phishing attacks is a critical first step to keeping your environment secure.

View Article
Microsoft 365 Apps

Sponsored: Five Key Points for Securing Office 365

Last Update: May 10, 2024

This post is sponsored by CoreView who offer a wide variety of security solutions for Office 365 Office 365 is one of the most commonly used applications in IT today. According to Microsoft, as of Q1 2020, Office 365 had reached 200 million monthly active users. Office 365 growth has remained constant at about 3…

View Article
Office 365

Regulatory Compliance with Microsoft 365

Last Update: Apr 17, 2024

Making sure your business is in compliance with the various regulatory policies that you need to work with can be challenging. Many companies use Microsoft 365 to work with unstructured personal data that are covered by laws that require your organization to follow different compliance procedures. This includes responding to regulatory requirements, assessing compliance risks,…

View Article
Security

Ransomware Risks for Microsoft 365

Last Update: Apr 17, 2024

With the rise in remote workers the risk of ransomware is higher than it has ever been before. By now most people know that ransomware is a type of malware extortion scheme that typically encrypts files and folders preventing access to critical data or sometimes it can also be used to steal sensitive data. After…

View Article
Microsoft 365 hero

Protecting the Different Types of Microsoft 365 Data

Last Update: Apr 17, 2024

Microsoft 365 is an indispensable collection of tools for businesses. While Microsoft is responsible for the availability and ongoing functionality of all the Microsoft 365 apps, the responsibility for protecting Microsoft 365 data is the customer’s obligation. Let’s take a closer look at the different types of Microsoft 365 data and the kind of protection…

View Article
Microsoft 365

Microsoft 365 Built-in Data Protection

Last Update: Apr 17, 2024

Microsoft 365 is the most widely used cloud application for business and it has several different technologies that are designed to protect your data. Let’s take a closer look at Microsoft 365’s built-in data protection technologies and see what steps you might need to take for your own complete data protection needs. Sponsored: Afi.ai provides a modern…

View Article
Outlook – 5

How to use Stellar Repair for Exchange to Recover a Corrupted EDB File

Last Update: Apr 17, 2024

This post was Sponsored by Stellar, you can learn more about their EDB Recovery Tool here. Exchange Server is Microsoft’s enterprise email, calendaring, contact, scheduling, and collaboration platform. It is an enterprise-class server that is primarily focused on sending, receiving, and storing email messages for all of the users in the organization. The current version…

View Article
Go to page