Columns


Does Your Company Rate?

Many more companies are beginning to understand what it takes to develop and retain skilled IT workers.

Managing with Profiles and Policies

Are your users out of control? Try using profiles and system policies to manipulate the Windows NT Registry and regain control of your network.

Separated at Birth? MCSE and MBA

Beyond the obvious differences, these two designations have uncanny similarities. Harry ponders the MCSE vs. MBA question and asks, “Why not get both?”

Geeks with Guns

Knowing how secure the most secure operations are—and what products those organizations use to achieve it—can help you establish your own criteria.

Trial by Ordeal

What will the Microsoft trial mean to those whose livelihoods depend on Microsoft products?

Delay Away

Perhaps the delay of Windows 2000 is not such a bad thing, after all.

Good Gravy!

While the din of giggles following the NT 5.0 name change distracts everyone, Em remembers to ask, "Where's the product?"

Y2K: Setting the Standard for Care

As a developer, do you understand the legal meaning behind this concept? If you don't, it simply means you haven't been sued yet.

System Policies and the Windows NT Registry

Before building system policies within Windows NT—especially if you’re going to migrate to Windows 2000—you must first understand the Registry’s structure and how it can be modified.

Secrets of Successful Help Desks

As eyes are the windows of the soul, so help desks are the windows of IS. Here’s how to keep your help desk in top condition.

Safe Messaging with Exchange

You know in the back of your mind that not every message you send or receive is absolutely safe. Isn’t it time you figured out how to protect your enterprise e-mail system?

Get Ready for SQL Server 7.0

Prove your credentials with the new MCDBA premium title.

Windows NT Best Practices

From disk subsystems to file formats and permissions, here are some best practices to follow when implementing Windows NT.

Alphabet Soup

This secret document uncovers the new titles we can expect from Microsoft in coming months.

Survive Your Own Audit

A well-designed internal security audit can help you uncover soft spots in your system before an outsider points them out. Put on a trench coat, grab a clipboard, and start roaming the halls.

Making MCTs

To supply IT’s demand for qualified professionals, Microsoft is committed to improving its training program for trainers.

Complex Countdown

The challenges facing IT professionals in today's market are formidable. Heightened security concerns and looming Y2K issues top the list.

Y2K and the Law

Consulting on Y2K issues can be profitable, but it also exposes you to tremendous risks if you don’t have the proper legal protection behind you.

High-Tech Head Start

This Microsoft program helps students begin careers in network management, systems administration, and programming.

Why2K?

Welcome to Auntie Em’s Y2K kickoff celebration.

Most   Popular