Below are the top 10 most-watched questions, so peruse and see if there’s anything down there that interests you. See something you can add insight to? Don’t hesitate; you’ll be helping out the inquirer and all your fellow IT Knowledge Exchangers keeping an eye on the question. What questions have you been watching? Let us know in the comments section!
1. The age-old question continues:Exchange 64 bit: Is it worth it compared to 32 bit Exchange? Mr. Denny provided an approved answer.
2. Rmb1981 was having a SQL Server view column conversion problem and Mr. Denny and Carlosdl tried to help him out.
3. We wanted to get more people involved in the discussion and we succeeded: See what Mr. Denny, Carlosdl, Batye, Radyair and R3boot see as the additional benefits of having a 64-bit OS over a 32-bit. It’s not too late to share your own!
4. KarlG helped out a user who can’t VPN using Vista to Windows 7 OS using SonicWall Global VPN.
Radyair, or Randy Dyck, hails from Calgary in Canada, like one of our recently featured members. He’s been in IT since 1981, spending 17 years of that as an owner and manager of an Information Systems support company. Thriving on “finding innovative solutions to challenging business opportunities,” Randy’s been helping IT Knowledge Exchange thrive with his answers on topics ranging from WAN to SQL Server to Windows 7 in 2010.
He specializes in accounting software integration, remotely managed network and support services, network and WAN design, provisioning, hardware/software procurement and testing, Novell Netware, Exchange, Pervasive and SQL. Have a question on one of Randy-of-all-trades’ expertise? Ask away and see how he can help!
We really value our featured members, but why? Because they’re always asking and answering great questions at IT Answers. In return we give them Knowledge Points that count toward our latest contest and free IT Knowledge Exchange swag. Want to be eligible? Get involved in the community, provide quality answers, give us honest feedback, upload a photo and update your profile so we can properly strut your stuff!
We’ve been busy around IT Knowledge Exchange this past week, and we assume you have been as well, so we’ve compiled some of the cool things going on around the community for your one-stop-consumption pleasure. Enjoy:
It’s not too late to join some of the great discussions going on around the community. Here’s one:
Mr. Denny, Carlosdl, Batye and Radyair outlined some of the additional benefits of having a 64-bit OS over a 32-bit.
- Mr. Denny says that 64-bits can get you more memory, CPUs and higher possibility that your server level software will run on it (some are not available in 32-bits, such as Exchange 2010 and most likely the next SQL Server).
- Batye doesn’t think Windows XP 64-bit is worth it, but if you’re considering Windows 7 32-bit versus 64-bit, you can expect faster loading and some program speeds with the latter.
- Radyair highlights how data encryption software benefits from 64-bits, sometimes running from three to five times faster than 32-bit.
Share what you see as the best reasons to go with a 64-bit OS rather than 32-bit.
Didn’t have time to read through the IT Knowledge Exchange blogs this week? Don’t worry, here are a couple highlights:
Nathan, from The Real (and Virtual) Adventures of Nathan the IT Guy, shared how to script backups with Syinternals Disk2vhd. (Kevin Beaver’s also a fan of Sysinternals for Windows 7.) Nathan also celebrated the release of VMware vSphere 4.1.
Looks like Dave Bateman of Can you hear me now? found free remote PC access, no installation required.
Welcome, New Members
We’re also updating the Community Blog with pointers and tips on how to get the most out of your community. Have something you want cleared up? We’ll cover it for you, just post a question in the forum, comments section or send me an email.
Also, take a moment to visit our new IT Knowledge Exchange Community Feedback Page 2010 for community-related discussions.
You work hard, and we’re working hard to show our appreciation: We’ve got some great giveaways going on right now. Want a free IT book? Want to win an Xbox 360 Slim or $50 Amazon gift card? We’re also handing out IT Knowledge Exchange t-shirts and Knowledge Points galore! So get to getting because you deserve it.
Of course, there’s always something going on around the site. Post your favorite blog posts or questions from the week in the comments section!
Have a great weekend,
At IT Knowledge Exchange, we’re ambitious. We want to have the biggest and best IT Answers Community out there! Our plan is to provide everyone with the answers they need to be the best they can at their job.
That’s why we’ve created a new weekly contest called ‘Freebie Fridays.’ Every Friday we will be posting a freebie of the week in the Community Blog that you can win, simply by answering unanswered questions. The blog post will detail the rules for that Friday’s contest and highlight the 3 winners. You’ll see a link to the blog post on twitter as well as a link in the “What’s New” box on the homepage.
So let’s get started…
Freebie Friday, July 16, 2010:
The first 3 ITKE members before 3:00 pm ET to answer 3 unanswered questions and to either re-tweet them with the tag #itkefreebiefriday and @ITKE or post the links to those 3 questions in the comment section of this blog post will receive a t-shirt or 50 knowledge points.
Clock starts now…4:00:00
We’ve been welcoming new members to IT Knowledge Exchange by the day, so we figured maybe it was time to update some great pointers on how to get the most out of your community. One thing that new members may run into without knowing why is the mysterious missing question. To avoid getting the reputation of being a black hole, we thought we’d clear up the specific reasons this happens to keep it from happening to you or your loved ones.
To better understand why your question suddenly fell off the edge of our forums, I’ll lay out our process:
ITJoe encounters baffling IT situation.
ITJoe posts his situation on IT Answers.
Your community moderators wade through the questions, including ITJoe’s.
We look through each question that comes into the community; we correct spelling, ask for clarification when needed (for ease of answering), or assign appropriate tags (for ease of search). We also delete questions. But, why? You might ask. The answer’s pretty simple; we delete any question that falls into one of the following categories:
- Homework or exam questions
- Sales pitches
- Basic questions that can easily be answered in a search engine: “What is cloud computing?”, “What does VPN stand for?”
- Consumer questions: “How do I change the ringtones on my BlackBerry?”
- Job postings
- Questions that are not enterprise IT-specific: “How do I format my spreadsheets?”
We do this in your interest, to minimize questions that don’t apply to you, whether it’s in your email topic updates, RSS or your Watchlist, we want to make sure that you’re only receiving what you signed up for. We wade through the junk questions to deliver you the most relevant content.
This is our main objective, anyway, and like it takes a village to raise a child, to run a community you need the help of the community members. See something you don’t think belongs here? Let us know! Flag a question, post a discussion or email me directly. We’ve had some great discussions posted by some of our most active members, so check them out for some great tips on asking and tagging questions, answering questions and general uses of IT Knowledge Exchange.
Want another venue to share your feedback? Here’s your chance: Fill out the 2010 IT Knowledge Exchange member survey and let us know what we’re doing right and where we can improve. (Aside from being an integral part in your community, you’ll get 250 Knowledge Points that can get you ahead in our latest contest.)
Thanks again for being a part of this community and working with us to make it as helpful as possible!
This week’s top 10 IT blog posts are indeed awesome; Carl Brooks clears up the confusion around how confusing cloud computing is (and isn’t), Dave Raffo outlines the details of Coraid’s alleged patent infringement, and Laura Smith explains the Heaven-sent security solution straight from Back to the Future. And that’s only three of them, check them out for yourself!
1. VMware adopts per-VM licensing, pricing from the Search Server Virtualization blog by Colin Steele.
2. Coraid pulls Z-Series NAS after NetApp threatens lawsuit from Storage Soup by Dave Raffo.
3. SQL injection flaw leaves door wide-open to valuable user information on a popular file sharing site from Software Quality Insights by Dan Mondello.
4. 2010 Magic Quadrant for Enterprise LAN: Few changes for a rapidly evolving industry from The Network Hub by Shamus McGillicuddy.
5. So what’s up with this storage array that doesn’t use any sort of RAID? from SQL Server with Mr. Denny by Mr. Denny.
6. RHEL 6 Beta 2 released from the Enterprise Linux Log by Leah Rosin.
7. Biometric fingerprints find new, mobile audience from Total CIO by Laura Smith.
8. Cloud confusion? Does not compute from The Troposphere by Carl Brooks.
9. vSphere vs. Azure: The real battle from the Search Server Virtualization blog by Colin Steele.
10. Oracle to face challenges in pushing customers to its complete stack from Eye on Oracle by Mark Fontecchio.
Is your favorite blog post not on this list? Share it with us and others via email or in the comments section!
Derek Catanzaro is a senior network administrator for a company based in Lake Forest, Illinois. His over fifteen years of IT experience—in networking, Lotus Notes/Domino, BlackBerry Enterprise Server, and VPN solutions—have turned him into a busy bee around IT Knowledge Exchange. He’s been the go-to guy for Lotus Notes for the past couple months, and we really appreciate it! Thanks again, Derek.
Join the ranks of our featured members by getting involved: ask and answer questions over at IT Answers. You’ll earn Knowledge Points that count toward our latest contest; we’re giving away three $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
Updated March 8, 2011: Permission is no longer necessary to approve answers. If you run into problems approving answers to questions you have asked, please contact us directly.
Updated July 15, 2010 5:11 PM: Permissions to approve answers must be granted.
Each day, our forums are chock full of new questions. Thanks to each of you, these questions don’t go floating off into the oblivion of the Internet, but rather they get answered, discussed and solved. But much like history, IT-related problems tend to repeat themselves and old questions can continue to help stumped IT pros long after the original inquirer has moved on.
One way to maximize the saving powers of older questions is to approve the answer that worked for you. It’s always great when multiple members get in on a discussion, offering ideas and methods, but this can cause confusion in future readings of the thread. If you’ve asked a question and you’ve received a suggestion that worked for you, approve the answer by clicking the gray check mark next to it! Not only will you pass along community love, you’ll give us a heads up to approve the answer for future users. Plus you get Knowledge Points if your answer is approved! (Knowledge Points can get you all kinds of goodies: Amazon Gift Cards, contest prizes, or good old-fashioned street cred.) Approved answers show up in the Answers Wiki with a big green check mark next to it and, in case that isn’t prominent enough, a large Approved Answer stamp.
If you have any suggestions or questions, send them over! Reach me via email at Melanie@ITKnowledgeExchange.com, in the comments section or by submitting a question in the forum. Happy answering (and approving)!
To compete in the new economy, organizations need to provide efficient and secure access to their internal applications and data for external entities, such as business partners, customers, and mobile employees.
Join Microsoft’s Senior Technical Product Manager, Brjann Brekkan, on July 20 from 11am-2pm ET for Microsoft Business Ready Security – Identity Access Management. He will discuss managing these redundant identities to avoid infrastructure complexities, inefficiencies, and increased security risks.
Get a reminder email.
This is the current—and hastily organized—state of Michael’s desk. Help him out? If you want some sweet IT books, head over to IT Answers and get to answering. See a question tagged Windows 7 in 2010 and know the answer? Give it your best shot then send me an email at Melanie@ITKnowledgeExchange.com or send us a message @ITKE with the link to the question, and you’ll get to take your pick of Michael’s deskmates. We’re giving five away, so get started!
Some titles to get you excited:
A Practical Guide to Fedora and RedHat Enterprise Linux 5th ed. (Full Fedora on DVD)
A Practical Guide to Linux Commands, Editors and Shell Programming 2nd ed.
Securing the Borderless Network: Security for the Web 2.0 World
Cisco Unified Computing (UCS)
CCIE Professional Development: Deploying and Troubleshooting Cisco Wireless LAN Controllers
Cloud Computing: Web-based Applications That Change the Way You Work and Collaborate Online
VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere