Each month our team of expert editors addresses the changing role of IT by helping savvy technology professionals navigate both the technical and cultural challenges wrought by vendor-hype, user-demands, and technology requirements.DOWNLOAD THIS MONTH’S E-ZINE ISSUE NOW!
( Sep 20, 2013 )
The reasons you started virtualizing apps may not still hold true today. You have to migrate off Microsoft App-V 4.5 or 4.6 eventually, so now's the time to decide what you need from an app virt tool.
Shops that only need to support a few virtual desktops, have transient desktop needs or lack the in-house expertise to do VDI are all good potential DaaS customers.
VDI management has a leg up on traditional desktop management, but things get even easier when you deliver virtual desktops to users from the cloud.
There are several flaws in IIS that can jeopardize the security of Windows servers. Here are some of the top threats and how to solve them.
With DH2i's release of DxEnterprise, IT pros can manage enterprise deployments of Windows Server containers.
The preview of Windows Server contains new storage replication features, but it's not enabled by default. Here's how to get started.
SharePoint can improve the efficiency of your business, but is your implementation providing a positive ROI? Usage reporting can help you find out by tracking who is using SharePoint, how they are using it and why.
Justify the time and expense of creating a governance document by showing what SharePoint has accomplished in your organization.
How does Microsoft's SharePoint rate as a primary enterprise content management system? It's got the features if you are willing and able to build it carefully.
Office 365 Video gives enterprises a new, easy way to post and view videos while providing control over who can access them.
Password management is tricky, especially with on-premises and cloud setups. Azure's password write-back option can help with password sync problems.
Email is a treasure trove of sensitive information. Exchange administrators must frequently check five areas to ensure email security.