The Industry Insiders

Insight from the heart of the IT industry

Browse by Tags

Related Posts
  • Blog Post: Testing for Database Null Values from PowerShell

    PowerShell is super, but its documentation is still lousy. You might think that how to test a database field for a null value would be straightforward, and indeed it is, but it ain’t documented anywhere. I’ve just spent the afternoon searching and eventually had to work it out for myself. So here it...
  • Blog Post: Dan Lewis, MCT

    Dan is an independent MCT (Microsoft Certified Trainer) in the UK. He spends the majority of his time running a variety of technical training courses for Microsoft Partners and academic institutions, primarily focusing on Windows Server, Active Directory and network security. He is a regular presenter...
  • Blog Post: Nathan Winters

    Nathan Winters is a Unified Communications Consultant for Dimension Data; a Microsoft Gold Partner on five continents whose clients include over 70% of the Global Fortune 100. Nathan has been working in I.T. for four years and specialises in Exchange, Active Directory and Virtualisation. Recent work...
  • Blog Post: Adrian J. Beasley

    37 years in IT, I have worked as a contractor for the last 25. I have reinvented myself several times over my career, as my interests have changed. I first learned Microsoft technologies by studying for the MCSE, which I gained in 1997 (NT3.51!) and have upgraded with each subsequent OS version. My current...
  • Blog Post: NDS Migrations

    So, you have finally decided to bite the bullet and embark on an NDS to AD migration. Whilst such as decision is not to be taken lightly the release of Windows 2003 and Exchange 2003 Microsoft has provided a number of very compelling reasons to go through this pain and a growing number of Enterprises...
  • Blog Post: Kim Berggren, Messaging Engineer

    I have been working as a messaging engineer for a US-based international hospitality and travel company for the past nine years. I spend a good deal of my time in a test lab working out the details of the next messaging project. I work with Exchange, anti-virus and anti-spam solutions, BlackBerry, Lotus...
  • Blog Post: Brian Reid – Director & Consultant, C7 Solutions Ltd

    Brian is a messaging and security specialist with over ten years experience in providing training and consulting on Microsoft technologies for a very wide range of customers, small businesses to large enterprises including the Microsoft support and consulting groups for whom he specialises in Exchange...
  • Blog Post: Certificate Server Enterprise Edition and Smart Cards

    The following article was kindly written by Adrian Beasley General I have recently installed Certificate Services on a Windows Server 2003 R2 Enterprise Edition machine, in order to make available version 2 certificate templates, which are configurable, and I have been investigating these, and the...
  • Blog Post: An Overview of the Active Directory Design Process

    Goals and Gathering Information The first thing to do is ask yourself why you are about to install Active Directory. You will need to research the various features and evaluate exactly how some of these features will benefit your business in some way. You may be looking to simplify your current Windows...
  • Blog Post: Practical Exchange Service Delivery Reporting

    David Sengupta, Exchange MVP With e-mail at the core of corporate communications today, gaining deeper and broader reporting insight into the operations and usage of your corporate Exchange environment is becoming critical for effective Exchange management. Understanding Microsoft Exchange usage...
  • Blog Post: Microsoft BI and the importance of users

    Recently, I took part in a discussion, where a number of people were debating the need to have a business representative or business-focused Project Manager involved in the design stages of a data warehouse. My own view is that business users should have input at every stage of the development. User...
  • Blog Post: Information Security; The Business Enabler

    By Paul Vincent Don’t get me wrong, I’m a tecchie. There was a time (and it wasn’t that long ago!) when I could name and identify the function of pretty much every Group Policy Object setting in Windows XP. However, Information Security is more than setting every security related configuration...
  • Blog Post: The Pro’s and Con’s of System Lockdown

    The Pro’s and Con’s of System Lockdown By Rodney Buike Locking down desktops is becoming more and more prevalent in today’s corporate environment. Malware, viruses, malicious users and laws like SarbOx are putting the pressure on IT staff to remove users as local admin’s and lockdown systems. In...
  • Blog Post: When Writing Software, Security Counts

    When Writing Software, Security Counts By Matthew Fisher The life of your average IT Security engineer is becoming more difficult every day. The tools they employ are becoming more complicated and varied, as are the threats they face. On top of that, they must fight a growing tide of hacks against...
  • Blog Post: ActiveSynching Between Exchange Server 2007 and Windows Mobile 6

    Adrian Beasley General Inspired by recent TechNet sessions and User Group meetings, where I heard expounded the wonders of Windows Mobile 6, and its close integration with Exchange Server 2007, I bought a top-of-the range mobile phone, an HTC TyTN11, (specifically because it ran WM6,) and entered...
  • Blog Post: Stephen Cummins

    Stephen Cummins, runs the blog SPSFAQ and has received the SharePoint MVP (Most Valuable Professional) award from Microsoft for the past 6 years. I live in Kildare, Ireland with his wife, daughter, dog and goldfish. He has managed in excess of thirty SharePoint implementations around the world for...
  • Blog Post: Connecting a Windows SmartPhone to Exchange Server Protected with a Private Certification Authority Digital Certificate

    Brian Reid – C7 Solutions Ltd – 25 July 2005 Having recently obtained my first Windows Mobile powered SmartPhone, I needed to connect to my Exchange Server over the internet using ActiveSync. For those of you unfamiliar with Windows Mobile SmartPhones, they let you connect, using the phones internet...
  • Blog Post: Mark Arnold, Technical Design Authority, Capita IT services

    Mark is an Infrastructure Architect working for Capita IT Services, part of the Capita Group of companies which provides Business Process and Technology Outsourcing, Consultancy, Training and other services to a range of customers in both the Commercial and Central/Local Government sectors. Mark started...
  • Blog Post: Windows Server 2008 Protection from Accidental Deletion

    By Richard Siddaway, Microsoft Practice Leader, Centiq Ltd With each new version of the Windows Server Operating System there are new possibilities for automation to help make the administrator’s job easier. Automation brings increased efficiencies but also brings the possibility of bigger mistakes...
  • Blog Post: Paul Turner, Hewlett Packard

    Paul Turner , Hewlett Packard Solution Architect and Lead Consultant .NET Results Technology Leadership Team As part of the Worldwide .NET Results Technology Leadership Team (TLT) I am responsible for evangelizing the .NET message across HP. This involves developing significant solutions and identifying...
  • Blog Post: Rhys Wilkins - Technical Consultant, ICM Computer Group

    Rhys Wilkins works as a Technical Consultant for ICM Computer Group . Rhys will provide us with a full biography in the coming days - suffice it to say that Rhys has faced many security challenges and come up with innovative solutions to many of them.
  • Blog Post: More details on Office Communicator Server 2007

    Dennis Lundtoft Thomsen It's hardly groundbreaking news that Microsoft is entering the VoIP market, the real news is that Microsoft is disclosing more and more details publicly (I'm member of the private beta for Office Communicator Server 2007, but all the information we get is covered under NDA...
  • Blog Post: Mark Wilson, Senior Customer Solution Architect, Fujitsu Services

    Mark Wilson is a Senior Customer Solution Architect at Fujitsu Services . Since 1994, Mark has been designing and implementing IT infrastructure solutions within the United Kingdom, continental Europe and Australia, operating both in-house and as a consultant, with his main focus areas being Microsoft...
  • Blog Post: A Developer’s Brief Introduction To Network Administration (part 2)

    In part one Dave McMahon looked how developers should acquire the basics of IP networking – an understanding of IP addresses, default gateways and subnet masks, here he looks at other building blocks of TCP/IP network design Command Line Utilities Command line utilities will begin to take over your...
  • Blog Post: David Harley

    David Harley CISSP has worked in computing since 1986, and first fell semi-accidentally into security and antivirus research in 1989. His background includes systems, applications and network support and administration, and includes PCs, Macs, Unix and VMS. He holds qualifications in security auditing...