Hot off the press - Microsoft SQL Server 2005 Compact Edition has just been released and can be downloaded from this website.
Microsoft SQL Server 2005 Compact Edition is the next version of SQL Server Mobile adding the desktop platform. SQL Server Compact extends the SQL Server Mobile technology by offering a low maintenance, compact embedded database for single-user client applications for all Windows platforms including tablet PCs, pocket PCs, smart phones and desktops. Just as with SQL Server Mobile, SQL Server Compact is a free, easy-to-use, lightweight, and embeddable version of SQL Server 2005 for developing desktop and mobile applications.
System Center Operations Manager 2007 (OpsMgr) RC1 the successor product to Microsoft Operations Manger 2005 (MOM) has just been released. You can download it here.
Keep in touch with all the updates in our management products by signing up to our Management Newsletter.
Quest Software Event: Are you ready for Exchange 2007?
Quest Software is hosting an event on Exchange Server 2007 in the Guinness Storehouse from 09:00 - 13:00 on 21st February 2007.
The seminar will cover:
- Assessing your Exchange 2007 readiness- Options for migrating to Exchange 2007 (from 5.5, 2000, 2003, Notes or Groupwise)- Managing your new Exchange 2007 environment- Open lunch/questions
For more details and registration please refer to the website here.
I discovered this great article in the TechNet magazine yesterday. It outlines an approach to dealing with the Security Bulletins that Microsoft publishes every month. It does this under the headings below.
Click here to get the full report.
Microsoft Security Bulletin Summary for January, 2007
Published: January 9, 2007
View the whole bulletin here.
An end-user version of this information is available by visiting the following Web site.
Protect Your PC: Microsoft has provided information about how you can help protect your PC at the following locations:
End-users can visit the Protect Your PC Web site.
IT Professionals can visit the Security Guidance Center Web site.
Update Management Strategies: The Patch Management, Security Updates, and Downloads Web site provides additional information about Microsoft’s best practices recommendations for applying security updates.
IT Pro Security Zone Community: Learn to improve security and optimize your IT infrastructure, and participate with other IT Pros on security topics in the IT Pro Security Zone Web site.
Microsoft Security Notification Service: To receive automatic e-mail notifications whenever Microsoft security bulletins are issued, subscribe to the Microsoft Security Notification Service.
I'm delighted to announce that I'm bringing John Craddock and Sally Storey back to Dublin to host an event on End-to-End Infrastructure Security on February 15th in the new Griffith College Conference Centre.
For further details and registration please go to the registration page here. I'd advise you to register ASAP as I know from experience that this one will fill up very fast.
Like many IT professionals, you’ve probably attended security seminars and sessions over the years and gained an appreciation of the various security technologies available. But when, where and how these technologies can and should be leveraged can often be confusing.
Infrastructure security is frequently only considered once server roles and network connectivity has been implemented, a problem made worse by inadequate training. When security technologies are not deployed until late in a project, the result can be poor implementation, weak documentation and compliance testing.
08:45-09:15 Registration & Light Breakfast
09:15-09:30 TechNet Update
09:30-11:00 Is Your IT Infrastructure Secure?
11:15-12:45 Securing Your Network
13:30-14:45 Locking Down Servers and Workstations
15:00-16:15 Vista Technologies
Identifying business assets
Security policy and response planning
Deploying IPSec for domain and server isolation
Building rules and filters
Identifying protocol and port requirements
Managing server roles and lockdown policies
Patch management and compliance testing
Creating Software Restriction Policies (SRP)
Least privileged user access
Establishing client security and software policy
Client and server attack vectors
Managing through group policies
Network Access Protection (NAP)
Vista security enhancements
John Craddock has designed and implemented computing systems ranging from embedded high-speed industrial controllers through to distributed IT solutions. John works as a consultant providing services to industry leaders including Microsoft. He was a key player in the Government Gateway Project, has designed high-availability web portals and help companies build Active Directory solutions to support their business critical environments. In addition to his role as a consultant, he has written over 20 technical training courses that have been published worldwide. He co-authored 'Investigating and Managing Objects and Attributes for Microsoft Windows 2000 and Microsoft Windows Server 2003' which is part of the Active Directory Forestry series. John lectures internationally and has written and presented technical sessions at MTB, MEC, Tech•Ed, Microsoft IT Forum, JDP and deployment conferences.
Sally Storey has worked in management and consulting in the IT industry for Novell, Microsoft and now, independently. Sally works as a consultant on enterprise infrastructure projects in operations, logistics and deployment roles. Sally is ITIL qualified and specializes in building process that keep systems highly available and secure. Sally co-authored the Active Directory® Forestry series with John Craddock.
FÁS has launched its Competency Development Programme, which is a programme to promote the training and certification of the employed. Now many Microsoft Certification Courses are available under that programme.
What does this mean to you?
FÁS is providing up to 70% Discount off the cost of Microsoft Certified Training Courses at participating training centres. See all the details of the CDP and all the courses currently available under the programme in your areas on the site HERE.
This discount is currently available for MS certified courses in different regions for example -
Here is a rare but interesting look into some of the products in development in Microsoft research labs. Especially intriguing are the security products in development like 'Shield'. This is a 'software shield' which would run on a firewall or a PC and act as a content filter that searches for and blocks any network traffic that would exploit a detected vulnerability.
So instead of continually having to patch the operating system only the 'shield' would be updated leaving the operating system untouched.
The best of TechEd IT Forum is now available in IT’s Showtime! By TechNet. You now have 26 cutting edge topic sessions available on demand in high quality video. Scroll down and pick your favorite sessions. There is something for every taste: strategy, highly technical, demos, hilarious, everything!