The Industry Insiders

Insight from the heart of the IT industry

The Industry Insiders

  • Powershell Installation

    By Adrian Beasley Document Changes The original version of this article was based on PowerShell RC1. Since then RC2 and the final v1.0 have been released. As a consequence, the article had become inaccurate in a few details, which would certainly...
  • Representation of data in Sharepoint

    Let’s be honest - it can be frustrating and difficult to have conversations with users over things like report colour, graphics and so on. For some very bright technically-focused people, a real pain point is the ‘soft stuff’ regarding the presentation...
  • Sharepoint Interview questions

    Adoption of the SharePoint platofrm is growing rapidly and for every new deployment there is a requirement for staff to support and maintain it. Identifying the necessary skills in potential new recruits for individuals who have not had sufficient experience...
  • Securing the network using Microsoft ISA Server 2004

    Several months ago, I attended a Microsoft TechNet UK event where the topic was ISA Server 2004 network design/troubleshooting and inside application layer firewalling and filtering . It's taken me a while to get around to writing up the notes, but finally...
  • Who do you think you are?

    By Craig Murphy Actually, that's the wrong question, I really need to know who you are, who you really are, please confirm your identity. How are you going to tell me who you are? I've got an e-mail address, send me an e-mail and I'll reply, then you...
  • Time and Relative Dates in SQL Server 2008 (TARDIS)

    Martin Bell , MVP and time lord has been getting to the bottom of the new date and time data types in SQL Server 2008 in this practical and useful article .
  • Is it easy to install Exchange 2007 UM?

    Paul Stringfellow The answer is surprisingly so!!! This document outlines our experiences in implementing Exchange 2007 UM in under a couple of hours, including a from-scratch build of Exchange 2007. The Kit In Use: IBM X336 Server...
  • ActiveSynching Between Exchange Server 2007 and Windows Mobile 6

    Adrian Beasley General Inspired by recent TechNet sessions and User Group meetings, where I heard expounded the wonders of Windows Mobile 6, and its close integration with Exchange Server 2007, I bought a top-of-the range mobile phone, an HTC TyTN11...
  • Martin Bell on SQL Nuggets

    Martin Bell MVP and SQL Bits Organiser, wants to promote the idea of SQL Nuggets. Basically these are 5-10 minute slots on something byte sized (ouch!) at community events where anyone can grab the mike and share their knowledge. Martin has a good example...
  • Public Key Infrastructure (PKI) Benefits - Why PKI?

    Adrian has written a short article enumerating many of the security threats that can be mitigated using asymmetric encryption. Click here to read Adrian's overview of the benefits of PKI As Adrian goes on to explain, Public Key Infrastructure technologies...
  • Adrian J. Beasley

    37 years in IT, I have worked as a contractor for the last 25. I have reinvented myself several times over my career, as my interests have changed. I first learned Microsoft technologies by studying for the MCSE, which I gained in 1997 (NT3.51!) and have...
  • Mark Wilson, Senior Customer Solution Architect, Fujitsu Services

    Mark Wilson is a Senior Customer Solution Architect at Fujitsu Services . Since 1994, Mark has been designing and implementing IT infrastructure solutions within the United Kingdom, continental Europe and Australia, operating both in-house and as a consultant...
  • Speaking at SQL Bits

    In this unusual Industry post I have got the industry insider on camera to discuss why you should get involved in the premier SQL community event, SQL Bits . Take it away Chris Testa O’Neill   SQL Bits goes fourth is on  28th march this time...
  • Treat all input as Evil until proved otherwise - how to prevent code injection

    Adrian J. Beasley has provided us with another excellent article titled A General Defence Against Injection Attacks on Websites written in his inimitable fashion tackling the challenging subject of how to validate user input.
  • Time for a Date?

    As a DBA I wear many hats! If I had to choose a hat for my data architect role it would probably be a nice white panama, the sort you see in the Agatha Christie re-runs on ITV3, but I digress!. As a data architect you extol the virtues of “correctly...
  • The wonders of Software Restriction Policies and PowerShell Code Signing

    Thanks to Adrian J. Beasley for providing yet another excellent article, this one's titled Software Restriction Policies and PowerShell Code Signing - Adrian provides a wealth of practical advice how to make the most of one of the most powerful yet under...
  • How to create a Mailbox Quota report

    I just spent nearly an hour searching for a quick and dirty report of non-default quota limits placed on mailboxes on my Exchange cluster. I didn't need to know how much was in each mailbox, just what the quota limits were on each account. I found several...
  • ID: Who do you think you are?

    Thanks to Craig Murphy for contributing his article titled Who Do You Think You Are? - it's well worth a read. He talks about identity from the perspective of a variety of vendors and applications.
  • SQL Nuggets

    It’s been a while since my last entry for Technet Insiders, one reason for the delay is that I’ve been very busy writing and presenting at SQL Server User Groups and organising our forth SQLBits Community Conference on March 28 th at the Manchester Metropolitan...
  • Upgrading from SPS 2003 to MOSS 2003

    Upgrading from SPS 2003 to MOSS 2003 Recently I have been involved in upgrading our intranet from SPS 2003 to MOSS 2007 and I know this is something that is going to be increasingly important as more and more companies look to take advantage of the...
  • How to extend your Cryptographic Service Provider infrastructure

    Adrian has written another enlightening article tackling the often confusing subject of Installing New Cryptographic Service Providers with aplomb. His article explains in some detail how CSPs work to integrate devices such as smart cards with the underlying...
  • Chris Testa O-Neill

    Chris Testa-O'Neill is the Database Product Manager at Remarc Group Ltd. He specialises in SQL Server Business Intelligence Solutions and teaches all Microsoft courses in the SQL 2000, 2005 and 2008 product range. He also conducts closed company sessions...
  • The Dilemma of Presenting SQL Server 2008

    Martin Bell runs the Scottish Area meetings of the UK SQL Server User Group , discusses the problems of deciding what to present on SQL Server 2008 to a bunch of developers in this entertaining article .
  • A General Defence Against Injection Attacks on Websites

    By Adrian J. Beasley The usual range of IT Security techniques is of little use against injection attacks. They can mitigate some of the effects of such attacks by, for example, setting proper permissions on resources, and ensuring that access from...
  • Business Intelligence and the importance of users

    It's about time there were a few business intelligence posts on Industry Insiders so I am pleased to get an article about the Microsoft BI and the importance of users in form Jennifer Stirrup from Aspective - a Vodafone company. Jennifer has over ten...