Archives
-
Bring Your Own Device (BYOD) – New Windows Server 2012 R2 Device Access and Information Protection
As you will have seen at Microsoft TechEd North America and Europe, we have just delivered the Preview Release of Windows Server 2012 R2 with a stunning amount of new capability that is Cloud First.
-
Unique in the Crowd – False sense of Privacy
This morning, I was reading a very interesting article called Unique in the Crowd: The privacy bounds of human mobility. This is the abstract:
-
Transforming your Datacenter with Software-Defined Networking (SDN): Part II
A couple of weeks ago, we addressed how Microsoft’s Software-Defined Networking solutions can help you transform your datacenter. For those of us who prefer to learn visually, the video below illustrates our approach.
-
Storage Transformation for your Datacenter
A few weeks ago, we addressed storage transformation in this blog – and how onsite storage, cloud storage, and recovery options are evolving. Below is a brief video overview of some of our key storage solutions. In this post, we will explore how storage is changing inside your datacenter, and how we transform industry standard disks into reliable, high-performance onsite storage for you datacenter.
-
Microsoft Windows Server 2012 R2 Preview is Now Available for Download
Today at TechEd Europe 2013 we announced availability of the System Center 2012 R2 and Windows Server 2012 R2 previews. You can download these products right now from the evaluation center.
-
Updates: Mark's TechEd Sessions, Autoruns v11.61, Strings v2.52, ZoomIt v4.5
Mark’s TechEd Sessions Available On-Demand: Mark delivered four top-rated sessions at Microsoft’s TechEd US conference two weeks ago, and the recordings are available now for on-demand viewing. In Windows Azure Infrastructure Services, he gives an overview of the deployment and operation of Virtual Machines and Virtual Networks; in Windows Azure Internals Mark goes under the hood of Windows Azure to show its physical and logical datacenter architecture and operation; in Case of the Unexplained you’ll see how to use the Sysinternals tools to solve impossible problems; and in Malware Hunting with the Sysinternals Tools you’ll learn how to use Sysinternals tools to identify and clean malware infestations.
-
Targeted Attacks – a Video Series
Trustworthy Computing in partnership with Microsoft IT, Microsoft Consulting and the product groups just released a series of videos on targeted attacked and how to defend.
-
Hyper-V Surge! June 30 Deadline is Coming Fast – Microsoft Partners Act Now!
We wanted to make sure and remind the Microsoft Partner community that the Hyper-V Surge! program is happening right now. This incentive program is for a limited time so don’t be late. If you are wondering what the “Hyper-V Surge!” promotion is, here’s a great description:
-
GP MVP Activity
We already talked about Darren's tool to investigate Group Policy performance, so here's what some other GP MVPs are up to:
-
Transforming your Datacenter with Software-Defined Networking (SDN): Part I
With server virtualization, you are able to decouple a compute instance from the underlying hardware. That enables you to pool compute resources for greater flexibility. However, to truly transform your datacenter, you’ve also got to deliver your storage, compute, and networking resources as a shared, elastic resource pool for on-demand delivery of datacenter capacity. Indeed, this datacenter-level abstraction is a critical part of Microsoft’s Cloud OS vision.
-
Storage Transformation
Organizations face many challenges when it comes to storage. Data volumes are exploding, increasing the cost of storage and the headaches of storage management. The rise of Big Data analytics means more data is being collected and mined than ever before – 90% of the world’s data has been created in the last two years. Enterprise data is expanding at 20% per year or more.
-
Updates: Autoruns v11.6, Procexp v15.31, Procmon v3.05, Sigcheck v1.92
Autoruns v11.6: Autoruns is a utility for enumerating and disabling executables and DLLs configured to activate in dozens of autostart registration points. This update fixes some minor bugs and adds Authenticode SHA1 and SHA256 hash reporting to Autorunsc output.
-
Are we sitting on a time bomb?
I just read another of these studies: Enterprises sitting on security time bomb as office workers compromise company data. Let's briefly look at the findings first:
-
The Moscow Rules in the Cyberspace
Doing your basics is a natural given, when you defend your assets. Basics like updating your computers, staying on latest versions, dynamic network zones, incident response, identity management, monitoring etc. etc. – last but not least (or probably first J) is to know your assets and have your data classified so that you understand, which part of your business needs which level of protection.