As the Internet of Things (IoT) phenomenon continues to grow, Microsoft has responded by contributing two new editions of Windows 10 – Core and Enterprise – that are aimed at radically different parts of the devices and systems market.Here's how Windows 10 IoT is used today, and where it might be going in the future.Windows 10 IoT Core
The Core edition is a barebones Windows kernel that has been stripped down significantly in order to run on low-power hardware. It is not a full version of Windows, but it is enough to light up the hardware and run whatever application is being designed for that board. This version of Windows 10 has no shell and essentially supports only universal apps – those coded to run in the managed environment of the Universal Windows Platform (UWP) and NOT traditional x86 or x64 apps. This OS version supports a maximum of 256MB of RAM and 2GB of device storage and can run on the x86 chip platform or the ARM platform for low-power devices.To read this article in full, please click here
The cloud revolution began in the Linux and Unix world, and for a long time the cloud wasn’t a welcoming environment for workloads that run on Windows Server.To read this article in full or to leave a comment, please click here(Insider Story)
The cloud revolution began in the Linux and Unix world, and for a long time the cloud wasn’t a welcoming environment for workloads that run on Windows Server.To read this article in full or to leave a comment, please click here(Insider Story)
The Internet of Things – a vast network of connected microdevices, sensors, and small computers generating vast amounts of data – is all around us. In fact, it's hard to find an industry that remains untouched by IoT.To read this article in full or to leave a comment, please click here(Insider Story)
Ah, Windows Embedded. The Microsoft operating system that millions of devices and machines are running, typically with a custom application or skin running on top of it so that users don't automatically notice the OS. The operating system that underpins hundreds of thousands of medical devices, automatic teller machines, kiosks at airports and other crowded public places, industrial machinery and control planes, set top boxes, game consoles.Windows Embedded is a relatively unheralded version of Windows whose existence might surprise you. But it seems like Windows Embedded's existence might also surprise a lot of folks up in Redmond. Here, at the Microsoft campus, despite all of the hullabaloo about Windows 10 and device updates -- and the new Creators Update and Redstone versions that will be coming down the pike at an almost breakneck speed -- Windows Embedded suffers from an opposite problem. It appears unfortunately stuck in a place where no future has clearly been laid out for it.To read this article in full or to leave a comment, please click here
This should be the year your organization looks to dump its consumer file-sharing software. Don't get me wrong -- many of those services are great for individuals, but they're not really suitable for enterprises. There are other products, however, that offer the file sync that Dropbox and Box and others do so well and so seamlessly, while also providing enterprise-level controls around access, encryption, identity, and more.To read this article in full or to leave a comment, please click here(Insider Story)
I think it's time to talk in depth about some of the most important features of PowerShell: Providers and modules. (Snap-ins have also been important, but they are being gradually phased out.) These are really the core of the universe when it comes to all of the commands available for use within PowerShell, so I want to teach you what they are, how they work and how to use them in your daily activities. Let's dive in!Introducing modules and snap-insTo read this article in full or to leave a comment, please click here(Insider Story)
I think it's time to talk in depth about some of the most important features of PowerShell: Providers and modules. (Snap-ins have also been important, but they are being gradually phased out.) These are really the core of the universe when it comes to all of the commands available for use within PowerShell, so I want to teach you what they are, how they work and how to use them in your daily activities. Let's dive in!Introducing modules and snap-insTo read this article in full or to leave a comment, please click here(Insider Story)
Ransomware is evil, and it continues to prey upon thousands of businesses every year. Most infections are fairly quiet affairs: A small business gets infected, almost always by some employee opening an email attachment he or she mistakes as legitimate but that really contains the payload of a virus. Then several undetected hours later, all of the business' files -- at least those the employee had access to, which in a lot of businesses without good security and permissions policies is all of the files -- are encrypted, and demands for payment of a ransom in Bitcoin are made in exchange for the decryption key.Of course, secure email use and employee behavior is a problem in businesses of all sizes, and there have been some high-profile ransomware infections. Most recently in the news was the attack on the San Francisco Municipal Transportation Agency (SFMTA), or Muni as it is known by Bay Area residents. Muni had to give free trips to all comers over the Thanksgiving weekend while it worked to restore access to its machines. The hacker who infected the utility also claims to have access to 30GB of stolen Muni data; the utility disputes this claim, Continue reading
Ransomware is evil, and it continues to prey upon thousands of businesses every year. Most infections are fairly quiet affairs: A small business gets infected, almost always by some employee opening an email attachment he or she mistakes as legitimate but that really contains the payload of a virus. Then several undetected hours later, all of the business' files -- at least those the employee had access to, which in a lot of businesses without good security and permissions policies is all of the files -- are encrypted, and demands for payment of a ransom in Bitcoin are made in exchange for the decryption key.To read this article in full or to leave a comment, please click here(Insider Story)
Ransomware is evil, and it continues to prey upon thousands of businesses every year. Most infections are fairly quiet affairs: A small business gets infected, almost always by some employee opening an email attachment he or she mistakes as legitimate but that really contains the payload of a virus. Then several undetected hours later, all of the business' files -- at least those the employee had access to, which in a lot of businesses without good security and permissions policies is all of the files -- are encrypted, and demands for payment of a ransom in Bitcoin are made in exchange for the decryption key.To read this article in full or to leave a comment, please click here(Insider Story)
Although many organizations are making their way to SharePoint 2016, a large number are still using SharePoint 2013 as their major corporate collaboration tool. This story is for you.Uploading and interacting with documentsIntegrating SharePoint content with OutlookFive advanced SharePoint 2013 tipsTo read this article in full or to leave a comment, please click here(Insider Story)
The war against spam has been a long one. Just as we get better filtering, spammers and phishers turn to more sophisticated techniques. We are even seeing ransomware attacks like Cryptolocker and Cryptowall become commonly spread over email. There must be a technical way to stop some of this, right?There is an Internet authentication system -- DomainKeys, and its successor, DKIM -- that tries to mitigate some of the risk of trusting that emails are actually from who they say they are from. Strangely, though, this technology has not made its way into Microsoft Exchange. In this piece, I want to open the curtains on DomainKeys and DKIM, show how they work and why what they do is important, and then demonstrate how to use a free utility to set up DKIM on your on-premises Exchange servers.To read this article in full or to leave a comment, please click here(Insider Story)
The war against spam has been a long one. Just as we get better filtering, spammers and phishers turn to more sophisticated techniques. We are even seeing ransomware attacks like Cryptolocker and Cryptowall become commonly spread over email. There must be a technical way to stop some of this, right?Getting DKIM set up with Microsoft Exchange ServerTo read this article in full or to leave a comment, please click here(Insider Story)
The war against spam has been a long one. Just as we get better filtering, spammers and phishers turn to more sophisticated techniques. We are even seeing ransomware attacks like Cryptolocker and Cryptowall become commonly spread over email. There must be a technical way to stop some of this, right?Getting DKIM set up with Microsoft Exchange ServerTo read this article in full or to leave a comment, please click here(Insider Story)
Today, Microsoft announced the release to manufacturing of Windows Server 2016. In this piece, I'll comb through the product and offer my thoughts on this new operating system.The verdict on Nano ServerSecurity improvements with SDNShielded virtual machinesTo read this article in full or to leave a comment, please click here(Insider Story)
Today, Microsoft announced the release to manufacturing of Windows Server 2016. In this piece, I'll comb through the product and offer my thoughts on this new operating system.The verdict on Nano ServerSecurity improvements with SDNShielded virtual machinesTo read this article in full or to leave a comment, please click here(Insider Story)
It has not been a good few months for the health and consistency of airline information technology. Two huge outages within a couple of weeks of each other -- caused by simple component failures -- resulted in massive passenger disruptions and cost two U.S. airlines millions of dollars in lost revenue and customer compensation.To read this article in full or to leave a comment, please click here(Insider Story)