Windows store apps tend to be more resource-efficient than their traditional counterparts, and Russell Smith serves up even more reasons why you should embrace modern apps.
How can I change the volume licensing product key on a Windows XP SP1-Based Computer? Because of changes in Windows XP Service Pack 1 (SP1), Windows XP-based computers that use a leaked product key that is known to be available to the general public may not be able to install SP1 or automatically obtain updates…
Image 1 Expand Those who listened to Microsoft’s virtual Ignite session on Supporting Mergers, Acquisitions, and Divestitures in Microsoft 365 might have concluded that Office 365 tenant restructuring was about to become possible. It’s not. What’s really happening is that Microsoft is taking on the easiest parts of tenant to tenant migrations: cross-tenant mailbox migration (now…
While the jury may still be out on Windows 8 in the enterprise, there are plenty of useful features in Windows Server 2012 for IT admins.
Using BitLocker Drive Encryption is one of the best ways to protect portable systems such as laptops from loss of data and information when the laptops themselves are lost or stolen. In this article, Jason Zandri provides an overview of the functionality and security features of this tool as it applies to Windows 7.
Want to know what Microsoft Ignite 2015 was like, but couldn’t make the trip? Editorial Director Jeff James has you covered with his Microsoft Ignite 2015 event wrap-up.
Just what is Server 2012 Hyper-V Live Migration, anyway? Discover Live Migration’s capabilities, flexibility, and more in this introduction.
vSphere based backup solutions such as VMware Data Recovery and Veeam Backup and Replication v5 rely on vSphere’s snapshot technology to backup live VMs, which excludes Fault Tolerant VMs as they do not allow snapshots. In this article, Tom Finnis explains how to use custom scripts to work around these restrictions and enable regular scheduled backups of Fault Tolerance protected Virtual Machines.
In this article I will show you in details the Steps that are necessary to create an Exchange Virtual Server for Exchange Server Clustering with Windows Server 2003. This article goes beyond my first article about clustering. In this article I gave you only the basic Steps that were necessary to create an Exchange 2003…
Aidan Finn explains how JIT access to Azure virtual machines enables you to further secure virtual network deployments and enable on-demand access to the machines.