Life in the digital crosshairs: Experience the untold story
On Saturday, July 13, 2001, Microsoft was alerted to a nasty piece of malware called “Code Red.” In just two weeks, ABC News reported that the Code Red worm had infected more than 300,000 Windows...
View ArticleWorking with Data Models created using SQL Server 2008 R2 PowerPivot for...
Guest Post by Kay Unkroth Power BI supports PowerPivot data models of any version. Users can choose between SQL Server 2008 R2 and SQL Server 2012 PowerPivot for Excel 2010 or simply use the latest...
View ArticlePowerShell connectivity to Azure, Exchange Online and Exchange on-premises...
I use the following function in my PowerShell profile so that I can use the Microsoft Online cmdlets, the Exchange cmdlets against Exchange online and the Exchange cmdlets against on-premises all in...
View ArticleWiki Life: A Picture is Worth a 1000 Words
There is a saying, "A picture is worth a 1000 words". I'm sure you've heard the idea behind this saying. A picture (of something you’re trying to describe) helps people understand (or visualise) what...
View ArticleSefnit’s Tor botnet C&C details
We have talked about the impact that resulted from the Sefnit botnet Tor hazard as well as the clean-up effort that went into that threat. In this post we’d like to introduce some of the details...
View ArticleConstraints: what they are and how they’re used
Hey everyone this is Wes Hammond from Premier Field Engineering and I wanted to share with you some info that I have gathered about setting up constraints.What are Constraints?Constraints are used to...
View ArticleZooTracer: Tracking animals and other objects made easy through video
A collaboration between the Computational Ecology and Environmental Sciences (CEES) group at Microsoft Research Cambridge introduced ZooTracer at the end of February as a downloadable, easy to use...
View ArticleTips on starting a Skype call using keyboard shortcuts
When you’re switching between instant messaging and calling friends, starting a call in Skype for Windows Desktop is easier if you can use keyboard shortcuts.In a post on Skype’s Tips & Tricks...
View ArticleThe key to a secure cyberspace: Speed and resilience
Posted by Mark WilliamsChief Security Officer, Microsoft FederalOrganizations of all types today face a daily and growing assault from nation states, lone actors and organized crime. The effects of a...
View ArticleAz új akciófilm: 200
Február hónap masszív mennyiségű újdonságot hozott az Azure életében. Mind a fejlesztőknek, mind az infrastruktúrért hódolóknak megremeg a keze ez a feature lista láttán. Szemezgetni a teljesség igénye...
View ArticleSMA Capabilities in Depth: Assets
Posted on behalf of Ravi Kiran Chintalapudi, Senior Program Manager, Automation & Integration In this blog, I will discuss why Automation Assets are available in Service Management Automation (SMA)...
View ArticleWatch your favorite SyFy, USA and Telemundo shows on your Windows device
NBC Universal delivers some of its best television programming right to your Windows PC or tablet with a trio of free apps now available in the Windows Store.USA Now brings everything from “Modern...
View ArticleGet hands-on with Windows 8.1: New virtual labs
TechNet Virtual Labs just released two new virtual labs to help you get more hands-on with Windows 8.1: Introduction to Windows 8.1 and Access and Information Protection. Read about them below and get...
View ArticleJoin Microsoft at this year’s South by Southwest (SXSW) tech, music and film...
Microsoft’s headed to Austin for the annual South by Southwest gathering in Austin, and this year the company is an official sponsor of the event, which combines tech, music and film into one...
View ArticlePart 1 of 3: Social Media and Nonprofits - Interview with Heather Mansfield
Microsoft Corporate Citizenship caught up with Heather Mansfield, Principal Blogger of Nonprofit Tech For Good in Melbourne, Australia to get her perspectives on social media and advice for nonprofits...
View ArticleStudie: Microsoft-Anwendungen weniger leicht angreifbar als Software anderer...
Der dänische IT-Sicherheitsanbieter Secunia, bekannt durch die wirklich nützliche Anwendung Secunia PSI, hat die 50 beliebtesten Anwendungen auf ihre Angreifbarkeit untersucht. Dabei wurden die...
View ArticleSCOM SQL 2008 Dashboard
Hello,After some of my customers loaded the latest MP for SQL on SCOM 2012, they noticed the great dashboard for SQL 2012 databases. This was a fantastic view as the visual impact and amount of data...
View ArticleWindows XP : Notification de la fin du support
Le support de Windows XP prend fin le 8 Avril 2014. A partir de cette date Windows XP ne sera plus supporté et aucune mise à jour de sécurité ne sera publiée.Nous vous recommandons de migrer dès que...
View ArticlePowerTip: Stop a PowerShell Job
Summary: Learn how to stop an unwanted Windows PowerShell job. How can I stop an over-running Windows PowerShell job? Even though this is not something you’d normally do, creating an infinite loop is a...
View ArticleÚvod do sideloadingu Windows 8 aplikací pomocí SC Configuration Manageru
Autorem tohoto článků je Martin Booth, Senior Technical Product Manager v produktovém týmu System Center. Protože jde o téma značně zajímavé a rezonující s informacemi, které přinášíme na českém...
View Article