Some boats searching the flood waters left by Hurricane Katrina were crowded with survivors. Others had plenty of room. And whenever a packed boat came upon a rooftop with more stranded people, there was no way to radio one of the empty boats to come help.
- By The Associated Press
- 08/24/2006
Microsoft and Citrix Systems announced this week they are collaborating to jointly produce and market a so-called "appliance" aimed at serving branch offices.
- By Stuart J. Johnston
- 08/24/2006
Keep your Taskbar tooltips visible with this batch file.
The good news for hardware vendors is that growth in revenues for so-called "volume servers" -- servers that cost $25,000 or less -- continued to grow in the second quarter.
- By Stuart J. Johnston
- 08/23/2006
Setting the visual effects options in Windows Explorer per user
Bob Jones has a lofty idea for improving communications around the world: Strategically float robotic airships above the Earth as an alternative to unsightly telecom towers on the ground and expensive satellites in space.
- By The Associated Press
- 08/21/2006
Simplify administration of your virtual machines through scripting.
Prepare for Longhorn's arrival by cleaning out unnecessary software and services.
Here’s a script that can locate unauthorized files in a user’s home folder.
DCDIAG comes to the rescue, as usual, when diagnosing some strange ForestPrep problems occurring during an upward migration.
- By Zubair Alexander
- 08/14/2006
As the competition for information management and control platforms heats up, IBM announced late this week that it will acquire content management vendor FileNet in a deal valued at $1.6 billion in cash.
- By Stuart J. Johnston
- 08/10/2006
What's really in that access token?
Running scripts while logged on as a domain user: Can it be done?
In hopes of complimenting its suite of remote access and support services, LogMeIn has purchased Applied Networking, Inc., a small developer of “instant” virtual private networking (VPN) services.
Some computers with wireless Internet capabilities are vulnerable to attacks that could expose passwords, bank account details and other sensitive information even if the machines aren't actually online, researchers said in Las Vegas Wednesday.
- By The Associated Press
- 08/03/2006
Enabling permissions inheritance after cacls takes it away.
If your goal as an admin is to become more efficient by automating more of your environment, the answer is yes.
- By Mike Gunderloy
- 08/01/2006
Consumer versions of McAfee Inc.'s leading software for securing PCs is susceptible to a flaw that can expose passwords and other sensitive information stored on personal computers, researchers said Monday.
- By The Associated Press
- 08/01/2006
Microsoft releases exam for business process management experts after a successful beta test last month.
- By Michael Domingo
- 07/27/2006
Microsoft quietly announced this week that it will distribute Internet Explorer 7 for Windows XP as a high priority update via Automatic Updates when the new browser version is complete.
- By Stuart J. Johnston
- 07/27/2006