November 2007
Windows Administration:Changes to Offline Files in Windows Vista
It's a common problem—how do you let users work with files stored on the network, when they have unreliable or no connectivity, and still avoid versioning issues? Such continuity is essential to providing a seamless experience. Discover how improvements in Windows Vista provide a better approach to working with offline files. Jeremy Moskowitz
Desktop Deployment:Simple, Scalable Deployment with BDD 2007
Don't have SMS 2003? Don't worry, there's another solution for creating simple desktop deployments. Here's an in-depth guide to using BDD 2007 and SQL Server to create scalable deployments that require little or no manual input. Adam Shepherd
Communications:Exchange Edge Transport Servers at Microsoft: Part 2
Exchange Edge Transport servers can help you create a more reliable and secure messaging environment. We showed you how to configure these servers in Part 1, now we'll take you through some detailed examples of how key features help improve your messaging environment. Kay Unkroth
Networking:Configure VPN Remote Access with ISA Server 2006
A virtual private network can provide improved connectivity and increased productivity—and it doesn't need to be difficult to implement and manage. Find out how you can use ISA Server 2006 to address two common VPN scenarios. Alan Maddison
SQL Server:Optimizing SQL Server Query Performance
When you optimize database performance, tuning individual queries is as important as tuning server hardware and software configurations. Even one runaway query can bring a database to its knees. Here's a guide to generating, analyzing, and tweaking execution plans to optimize the performance of your SQL Server queries. Maciej Pilecki
https://technet.microsoft.com/en-us/library/bb978519(v=msdn.10)
https://technet.microsoft.com/en-us/library/cc135917(v=msdn.10)
Columns
From the Editor:More Power to You
Joshua Hoffman
|
Toolbox:New Products for IT Pros
Greg Steen
|
Exchange Queue & A:Secure E-Mail Protocols, Mysterious Spam, and More
In this month's installment, the Exchange team discusses Transport Layer Security for SMTP, how to prevent spoofed NDRs from clogging up your queues, and how to tackle various installation challenges.Nino Bilic and Scott Landry
|
Utility Spotlight:SMS Cmdlets for Windows PowerShell
Find out how you can start using Windows PowerShell cmdlets to manage SMS 2003 clients from the command line.Don Brown
|
The Cable Guy:Wireless Single Sign-On
Single Sign On offers many advantages for both end users and administrators. Here's a look at how Single Sign On can simplify implementation of wireless authentication for your network.Joseph Davies
|
Research Notes:Using High-Performance Computing in the Fight against HIV
Take a look at how the eScience team in Microsoft Research is collaborating with medical researchers and using high performance computing to help find a cure for HIV.Kristin Firth and Mia Matusow
|
Windows PowerShell:Writing Regular Expressions
With a well-written regular expression, a Windows PowerShell script can determine whether or not data conforms to a valid format. Get an overview of how you can use Regular Expressions in Windows PowerShell.Don Jones
|
Hey, Scripting Guy!:Desktop Management from beyond the Grave
The Scripting Guys demonstrate how to use Windows Remote Management to retrieve the properties and instances of classes on a remote computer. Oh, and there's a cool puzzle too.The Microsoft Scripting Guys
|
Security Watch:Secure Access Anywhere
Explore network and security design considerations for an anywhere-access solution using Terminal Service components, and learn some practical methods and best practices for creating a solution with Windows Server 2008.John Morello
|
The Desktop Files:The Truth about Defragmentation
Myths about the pitfalls of defragmentation have prevented many an administrator from performing this important maintenance task. Find out which problems are real, which ones are unlikely, and how you can avoid them.Wes Miller
|
Field Notes:The Cod of Conduct
When community members start acting, perhaps you just need a big fish. See how social engineering helped to save Live QnA.Betsy Aoki
|
Windows Confidential:The File System Paradox
Ever wonder why you need a miniature file system driver built into those critical boot files?Raymond Chen
|