Learn how to use Microsoft Lync 2010 to make and receive phone calls with one-click, follow up on missed calls, and use call controls to mute and unmute your voice. This course provides examples to help you complete daily Lync 2010 activities.
Utility Spotlight: Tweak Your Keyboard
April 2012The Microsoft Keyboard Layout Creator lets you customize the keyboard layout for yourself or any of your users.
Windows Server 2008 R2: Get the Most from Server Core
April 2012Server Core is a basic, no-frills way of maintaining your Windows environment. If you’re not familiar with it yet, you soon will be.
Mobile Computing: Be On the Lookout for Mobile Malware
April 2012An ethical hacker gives his view on the dangers of mobile malware and the steps you can take to protect your mobile workforce.
Exchange Queue &A: Get the Right Message
April 2012This month, our regular Exchange Queue & A columnist is joined by a guest contributor to resolve your most vexing Exchange issues.
Microsoft Dynamics CRM: Big Data Drives Gaming Industry CRM
April 2012In the changing world of casino gaming and hospitality, a flexible, enterprise-wide CRM system helps drive effective marketing.
Windows PowerShell: Shortcut Syntax
April 2012There are usually many ways to do the same thing in Windows PowerShell. Find the one that works for you and stick with it.
SharePoint 2010: The Purpose of Governance
April 2012Establishing an effective and appropriate governance program for a broad-ranging platform like SharePoint is essential.
Steve Wright and Corey Erkes
Editors Note: Mind Your Business
April 2012A collaborative platform like SharePoint is all about sharing, but that sharing must be regulated, lest it digress into disarray.
Virtualization: Create Hyper-V Virtual Machines with Windows PowerShell
April 2012If you need to create and configure virtual machines on a regular basis, using Windows PowerShell to do so can speed up the process.
Toolbox: New Products for IT Professionals
April 2012This month’s tools cover a variety of file management tasks, from organizing your desktop and unlocking files to copying files from Linux disks.
Virtualization: Dealing with Legacy Apps
April 2012The ability to seamlessly continue to manage legacy applications is one of the many tangible benefits of virtualization technology.
Windows Confidential: Ship It
April 2012Who gets a “Ship It” award? You need to have contributed to shipping the actual product—otherwise you’re just writing code.
Microsoft Windows Server 2008 R2: Certificates Drive RDS Security
April 2012Certificates play a huge role in securing connections between RDS hosts and clients.
Geek of All Trades: Step-by-Step DirectAccess Installation
April 2012Just because you’re part of a small business doesn’t mean you can’t extend your network over the Internet with DirectAccess.
Virtualization: Physical vs. Virtual Clusters
April 2012Deploying multiple virtual machines into clusters requires some special management and configuration techniques.
Security Update for Windows Server 2003 for Itanium-based Systems (KB2641653)
A security issue has been identified that could allow an authenticated local attacker to compromise your system and gain control over it.
Security Update for Windows Server 2008 (KB2621440)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows Embedded Standard 7 (KB2665364)
A security issue has been identified that could allow an unauthenticated remote attacker to cause the affected application to stop responding.
Security Update for Windows Server 2008 x64 Edition (KB2641653)
A security issue has been identified that could allow an authenticated local attacker to compromise your system and gain control over it.