Many more companies are beginning to understand what it takes to develop and retain skilled IT workers.
- By Linda Briggs
- 04/01/1999
Are your users out of control? Try using profiles and system policies to manipulate the Windows NT Registry and regain control of your network.
- By Michael Chacon
- 04/01/1999
Beyond the obvious differences, these two designations have uncanny similarities. Harry ponders the MCSE vs. MBA question and asks, “Why not get both?”
- By Harry Brelsford
- 04/01/1999
Knowing how secure the most secure operations are—and what products those organizations use to achieve it—can help you establish your own criteria.
- By Roberta Bragg
- 04/01/1999
What will the Microsoft trial mean to those whose livelihoods depend on Microsoft products?
Perhaps the delay of Windows 2000 is not such a bad thing,
after all.
- By Linda Briggs
- 03/01/1999
While the din of giggles following the NT 5.0 name change
distracts everyone, Em remembers to ask, "Where's
the product?"
As a developer, do you understand the legal meaning behind
this concept? If you don't, it simply means you haven't
been sued yet.
- By John Ellsworth
- 03/01/1999
Before building system policies within Windows NT—especially if you’re going to migrate to Windows 2000—you must first understand the Registry’s structure and how it can be modified.
- By Michael Chacon
- 03/01/1999
As eyes are the windows of the soul, so help desks are the windows of IS. Here’s how to keep your help desk in top condition.
You know in the back of your mind that not every message you send or receive is absolutely safe. Isn’t it time you figured out how to protect your enterprise e-mail system?
- By Roberta Bragg
- 03/01/1999
Prove your credentials with the new MCDBA premium title.
From disk subsystems to file formats and permissions,
here are some best practices to follow when implementing
Windows NT.
- By Michael Chacon
- 02/01/1999
This secret document uncovers the new titles we can expect
from Microsoft in coming months.
A well-designed internal security audit can help you uncover soft spots in your system before an outsider points them out. Put on a trench coat, grab a clipboard, and start roaming the halls.
- By Roberta Bragg
- 02/01/1999
To supply IT’s demand for qualified professionals, Microsoft is committed to improving its training program for trainers.
- By Steve Willett
- 02/01/1999
The challenges facing IT professionals in today's market
are formidable. Heightened security concerns and looming
Y2K issues top the list.
- By Linda Briggs
- 02/01/1999
Consulting on Y2K issues can be profitable, but it also
exposes you to tremendous risks if you don’t have
the proper legal protection behind you.
- By Harry Brelsford
- 02/01/1999
This Microsoft program helps students begin careers in network management, systems administration, and programming.
Welcome to Auntie Em’s Y2K kickoff celebration.