The Windows Enterprise Desktop blog features topics of interest to IT professionals who work with Windows on large networks. Topics are Windows OS setup and configuration, release definition, deployment, migration, virtualization, terminal services, and security.
For our monthly feature, we look at the most popular stories on SearchWindowsServer.com the previous month and share it with you.
In May, our readers were curious about the lack of containers in the second technical preview of Windows Server 2016, and how update deployment would change with the …READ MORE
In our monthly feature, we look at the most popular Exchange content from the previous month and share it with you.
For May, readers wanted to learn more about Exchange Server 2016, which is scheduled for a beta release this summer with a final release in Q4, as well as how to gain hands-on expe…READ MORE
Recently, I set about entering my expenses for a business trip. The limitations of my email outbox almost immediately thwarted me. I attempted to send myself 12 images of receipts, using my corporate email account on my iPhone’s native email app. The app capped out at a handful of images beca…READ MORE
Last week I has the pleasure of speaking with Jordan Sams from Zappos about his experience in helping the company transition to Holacracy. Jordan began working at Zappos as part of the customer service team. He worked for years with the goal of being a manager and shortly after being promoted into t…READ MORE
The New York Times is no stranger to digital initiatives. With their blossoming digital strategy they’ve had recent successes — and failures — on their road to digital glory. Marc Frons, senior vice president and CIO at The New York Times Co., discusses the company’s culture of experimentation, wh…READ MORE
Today, an application without data analytics is like a car without a steering wheel. It will go, but there’s no controlling its direction.
The cloud and big data are infiltrating company practices, and in some cases, they’re doing it together. The intersection of the two brings many challenge…READ MORE
Something old, business process management, has been made new again by the addition of a lowercase i. This three-part guide shows how and why adding cloud services and analytics to BPM will make it intelligent BPM, a must-have technology for many businesses. Why? iBPM promises to smooth business…READ MORE
A couple of years ago I wrote about the International module
I was recently asked about the availability of this module on Windows Server 2012 R2. I’ve found the module on all flavours of Windows 2012 r2 – serve…READ MORE
NetApp announced a changing of the guard at CEO and chairman of the board after the market close today, less than two weeks after another disappointing earnings report.
CEO Tom Georgens departed after nearly 10 years at NetApp, and George Kurian, the company’s vice president of product operatio…READ MORE
Contest image via Shutterstock
First off, let me congratulate Carlosdl for winning the Polaroid Cube camera in our May activity contest! Here were the final standings:
Carlosdl: 1,550 points
ToddN2000: 1,455 points
TheRealRaven: 925 points
Veretax: 790 points
LalitBhamare: 670 points
If you’ve been reading this blog lately, you’ve seen my recent discovery that duplicate or outmoded drivers in the Windows 10 DriverStore can unnecessarily bulk up the size of the RecoveryImage folder that Windows 10 builds each time an upgrade or clean install is performed (if not, check out the l…READ MORE
Internet of Things image via Shutterstock
Will Google’s new IoT operating system make waves in the market? Find out in this week’s roundup.
1. New Google IoT OS to connect Android devices – Jake O’Donnell (SearchConsumerization)
Google Project Brillo is a scrubbed-down IoT OS that could entic…READ MORE
Before I get into my thoughts on VelocityConf (Santa Clara, 2015), I thought that I’d share a quick story. I’ve been attending open source events and meetups for several years (OpenStack Summit, LinuxCon/CloudOpen, DevOps Days, Cloud Foundry Summit, etc.) and have become comfortable with the vibe an…READ MORE
I’ll be the first to admit that my knowledge of SAP security authorizations is lightweight.
I know enough to be dangerous but not enough to be even close to something like a ninja or knowledgeable person. If I am confounded by something invariably I have to read up about it or find a SME to h…READ MORE
As you may recall from a previous episode of “Politicians Behaving Badly With Email,” in March it was revealed that Hillary Clinton used her own server for email when she was Secretary of State. Due to the partisan lens through which everything she does is judged, that was either completely norm…READ MORE
When I say ‘zero budget,’ I mean working with your phone camera or a webcam. I make and edit videos for Slashdot, and a lot of them are done remotely, usually through Google Hangout. This means the video visual and sound quality are controlled by the interviewee, and it surprises me that in a world …READ MORE
In the news today is a story about how the the Winnipeg Airport had a security breach the other day and more than 400 flights were affected. It’s just the latest of a series of breaches affecting airports around the world and disrupting air travel.
From the story, the spokesperson named Talbo…READ MORE
It is true that all those companies which have no presence on the internet are reduced seventy percent as compared to a decade ago. And the thirty percent that are left will have their presence on the internet in next three years. Almost every company, large of small, offline or online, on the cloud…READ MORE
This week I’ve found some great things for you to read. These are a few of my favorites that I’ve found this week.
How to rename a column when CDC is enabled
Beware of the Native Microsoft NVMe Driver!
SQL Server DML Triggers – Tips & Tricks – Part 4 …READ MORE
In this post lets configure uRPF in Strict mode, I have created the below topology using Cisco VIRL, a great tool to test many things.
As you can see this topology comprises of three routers, R1 & R2 are directly connected using interfaces G0/1 and configured with an IP address 192.168.1….READ MORE