374 Results for:MVP

  • Sort by: 

WMI tools make the perfect crime 'malware-free'

By Robert Richardson 01 Dec 2015

Security researchers claim that attackers are abusing a longstanding administrative tool in the Windows operating system. With no telltale signs of malware, how can you stop it? Read More

Avoid Docker host backup issues on Hyper-V virtual machines

By Brien Posey 27 Apr 2015

Learn about common issues associated with Docker host backup on Hyper-V and how to avoid them. Read More

Tesco.com uses agile development offshore to roll out internationally

By Cliff Saran 09 Oct 2013

Tesco used agile methodology, co-ordinating a team of 100 offshore developers, to roll out the Tesco.com website internationally Read More

Four tips to maximize the lifespan of your flash memory storage

By Brien Posey 16 Mar 2015

The lifespan of flash memory storage is not the hot-button issue it once was, but you should perform these tasks to prolong the life of your drives. Read More

Check your hybrid Outlook Autodiscover performance

By Neil Hobson 22 Sep 2015

IT shops with hybrid Office 365 and on-premises Exchange mailboxes need to know how Outlook Autodiscover works when mailboxes haven't migrated. Read More

Advanced threat protection add-on comes to Microsoft EOP

By J. Peter Bruzzese 03 Jun 2015

The ATP add-on for Exchange Online Protection gives on-premises Exchange Server and Office 365 customers another layer of security. Read More

How to enable Windows 8.1 kiosk mode for Modern apps

By Nirmal Sharma 30 Sep 2014

It's possible to control user application access on startup with Assigned Access, but note that Windows 8.1 kiosk mode works only for Modern apps. Read More

Customize Exchange ActiveSync settings for virtual directories

By Brien Posey 20 Jan 2014

Knowing the settings for the mailbox server and the Client Access server role is the key to customizing ActiveSync virtual directories. Read More

What a hybrid setup means for Exchange's future

By Michael Van Horenbeeck 09 Feb 2015

Organizations that don't want to move entire workloads to the cloud have another option that's gaining popularity. Read More

Switch authentication modes during a disaster recovery

By Steve Goodman 21 Apr 2015

Converting authentication modes is a rare thing admins need to address, but it must be fixed right away when it happens -- and Microsoft's documentation on it is incorrect. Read More