Share via

February2008February 2008

SharePoint:A Smart Approach to Gathering Data in the Enterprise

Information is one of the most important assets in an enterprise. But it can be a challenge to manage the mountain of data being gathered through e-mail, Web-based forms, surveys, and other mechanisms. Here's a look at how the Microsoft Office system can help you integrate systems and make data more accessible. Keith Deshaies

SharePoint:Building a Powerful Survey Infrastructure

Gathering and analyzing data is an essential part of business, but you need tools that will allow independent teams to collect the data they need, when they need it. Find out how you can use WSS 3.0, MOSS 2007, and InfoPath 2007 to build a complete and flexible survey solution that can be used throughout the enterprise. Jim Bradley

SharePoint:Standardize Data Management with Custom Content Types

The vast number of disparate documents and other content items stored throughout a large organization can make it difficult to manage documents, their associated metadata, and their behaviors in a centralized and reusable way. Take a look at how you can use content types in SharePoint 2007 to simplify content management across the enterprise. Pav Cherny

Office Communications Server:How Presence Powers OCS 2007

Office Communications Server 2007 uses information about user availability to route communications to the most appropriate place—whether it's sending a voice call, a video conference, an e-mail message, or an IM. See how the OCS 2007 system uses presence to connect endpoints. Rajesh Ramanathan

Office Communications Server:Plan Your OCS 2007 Voice Deployment

Integrating Office Communications Server 2007 with an existing PBX system can be a challenging task. You need to select an integration scenario, understand call routing, know how to configure user settings, deal with number plans, and more. But don't worry. This overview will show you what you need to know. Jochen Kunert and Rui Maximo

High Performance Computing:An Introduction to Windows Compute Cluster Server

Rather than relying on large specialized systems, high performance computing uses clusters of smaller, standard systems. Spreading the workload in this fashion offers an economical solution for solving complex problems quickly. Explore the compute cluster functionality and support provided by Windows Compute Cluster Server 2003. John Kelbley and Doug Lindsey

Online Extra:Deploy the 2007 Office System with Terminal Services

The 2007 Microsoft Office system includes design changes you must be aware of before deploying it in your Terminal Services server farm. This article gives you an overview of the changes. James D. Silliman


From the Editor:Dealing with Information Overload
Joshua Hoffman
Letters:Readers Speak Out
Toolbox:New Products for IT Pros
Greg Steen
SQL Q&A:Non-Clustered Indexes and Retaining Permissions
Saleem Hakani and Dan Carollo
Utility Spotlight:ADMX Migrator
With Windows Vista, the format for Group Policy templates has changed to an XML-based structure. The ADMX Migrator utility can convert your legacy ADM files into the new ADMX format, as well as help you easily create your own custom ADMX files.Lance Whitney
The Cable Guy:IEEE 802.1X Wired Authentication
IEEE 802.1X authentication provides an additional security barrier for access to your intranet. See how Windows Vista and Windows Server 2008 make it a snap to implement IEEE 802.1X authentication for your wired network.Joseph Davies
Windows PowerShell:Shell Permissions
Permissions in Windows are, unfortunately, innately complicated. But Windows PowerShell can help. Get a quick overview of how permissions in Windows work and find out how you can simplify the task of working with them.Don Jones
Hey, Scripting Guy!:The Games Are Afoot! Oh, and Some XML, Too
The Microsoft Scripting Guys go on and on about the 2008 Scripting Games, and they also show you how to create, append, and modify XML documents. By the way, have you heard about the 2008 Scripting Games?The Microsoft Scripting Guys
Security Watch:Island Hopping: Mitigating Undesirable Dependencies
Unwanted security dependencies can expose your entire network to attacks. Find out how security dependencies work so you can analyze dependencies in your environment and resolve potential problems.Jesper M. Johansson
The Desktop Files:Dual Booting with Windows XP and Windows PE 2.0
There are a number of advantages to booting Windows PE 2.0 from the same partition as Windows. Learn how to dual-boot Windows XP and Windows PE 2.0 from the same partition and explore the problems this can solve.Wes Miller
Field Notes:Donate Your PC
When you donate and reuse old hardware, you keep old hardware out of landfills-and that helps to preserve our environment. These tips can help you effectively delete personal data from your old computer equipment so it will be ready for reuse.Jim Lynch
Windows Confidential:Scrapping the Scraps
Here's some history about how a couple of not so incredibly popular features disappeared.Raymond Chen