Studies by AIIM and Ford Motor Company estimate that knowledge workers spend 15-25% of their time on non-productive information related activities. IDC estimates that a typical knowledge worker spends about 2.5 hours per day searching for information. If you are reading this blog, you are probably an IT Pro. That means you are time-constrained all the time. To get some minutes back in your day so you can read the great content on TechNet, go download Lookout to help you manage your inbox. I use it everyday and it saves me time. Highly reccomended.
Lookout V1.2 is lightning-fast search for your e-mail, files, and desktop integrated with Microsoft Outlook. Built on top of a powerful search engine, Lookout is the only personal search engine that can search all of your e-mail from directly within Outlook - in seconds...
Full article <http://www.microsoft.com/downloads/details.aspx?FamilyID=09b835ee-16e5-4961-91b8-2200ba31ea37&displaylang=en>
I wrote this down during a training class on "Fierce Conversations" in order to remember it and reflect further on it after class: "In any situation, the person who can accurately describe reality without laying blame will emerge as the leader, whether designated or not." Edwin Friedman
An A9.com search on this phrase brings up an interesting book review of : The Four Agreements, A Practical Guide to Personal Freedom by Don Miguel Ruiz. Full article <http://www.beingjane.com/bookReview.php>
My new job on TechNet includes the opportunity to show leadership in improving TechNet. Interested in helping me accurately describe TechNet reality to upper management without laying blame? Feel free to add your comments.
Quantum cryptography has emerged from the laboratory and into the real world.
Using properties of quantum physics, the technique encrypts data with keys that reveal if they have been intercepted or tampered with. US company Magiq and Swiss firm ID Quantique have already sold hardware to several customers keen to protect data with quantum cryptography. Governments and armed forces are thought to be among the first users of the technology.
Encryption usually involves scrambling data with long numeric keys that stop other people reading it. The information inside the message is effectively kept secure because of the time it would take an eavesdropper to sort through all possible keys used to scramble the data. But quantum cryptography scrambles data in a different way by using the strange properties of the quantum world to guarantee that keys have been swapped securely.
Information about the key is encoded on to a single photon of light. Quantum physics guarantees that the properties of the photon will change if anyone intercepts it and tries to read the information off it. Once two parties have swapped a key that they know to be safe they can be sure that the messages they are sending each other are secure.
Once connected to a fibre-optic network the Magiq hardware allows companies to set up a virtual network they can use to send data encoded with quantum keys.
Although the technology is already in use, there are still some limitations to iron out. For instance there is a limit to the distance that photons can travel before they lose coherence which makes it impossible to read key information. The current record for long-distance quantum key distribution is 120km.
Read full article at <http://newsvote.bbc.co.uk/mpapps/pagetools/print/news.bbc.co.uk/1/hi/technology/3543495.stm>
Toshiba has discovered a way to make quantum-cryptographic data more stable and to transmit it at five times the current rate. “We have made the technology much more stable and easier to use,” says Andrew Shields, who is head of Toshiba’s Quantum Information Group in Cambridge, England. Shields says Toshiba is talking with financial institutions in the City of London about installing the system later this year.
Quantum cryptography allows two parties to send secret encryption keys to each other while testing to see if anyone has attempted to intercept them. The keys are sent, one photon at a time, over standard optical fibers; each photon represents a binary 1 or 0. What makes the system so secure is that any attempt by an eavesdropper to intercept the photons will alter them—alerting the sender to a security breach. The problem: the hardware used to generate the photons is extremely sensitive to temperature fluctuation and movement, so it requires continual adjustment by experts.
Toshiba’s solution is to send two signals. “Along with the single-photon pulse we send a second, brighter, guardian pulse,” Shields explains. The guardian pulse provides a reference point for the receiving hardware, which automatically adjusts to ensure that the photon paths are aligned. The result: a system that Toshiba researchers have shown is able to operate 24 hours a day, seven days a week, without any human intervention.
Read full article at http://www.technologyreview.com/articles/05/04/issue/forward_quantum.asp?trk=nl
The new Windows Server 2003 TechCenter is the place for IT Pros to find Windows Server 2003 post-sales, technical documentation including SP1 updates. It offers views into documentation by language, technology, task (or documentation category), and documentation set.
Our goals for this TechCenter are:
How are we doing on these goals? Let me know by posting a comment on this blog.
The Microsoft IT group helps protect the corporate network using domain isolation with IPsec. You can read about it here.
The Microsoft Solutions for Security (MSS) team has recently released a Server and Domain Isolation Using IPsec and Group Policy paper. This solution demonstrates how IPsec transport mode can be leveraged as one of the best means currently available to protect corporate networks and minimize losses due to information theft, compromise of credentials, and administrative costs. This solution also clearly contrasts IPsec transport mode with the more widely known IPsec tunnel mode, one of the prevalent VPN technologies today.
Full article at <http://www.microsoft.com/technet/security/topics/architectureanddesign/ipsec/default.mspx>
Improving Security with Domain Isolation: Microsoft IT implements IP Security (IPsec)
Detailed discussion on how Microsoft IT introduced Domain Isolation to the Microsoft global enterprise network, to prevent unauthorized access to trusted assets. The technology chosen for isolation is Internet Protocol Security (IPsec), a standards-based approach to authenticating network traffic, which can be deployed and managed centrally through the use of Group Policy. The result of these efforts is a secure, segmented network of trusted computers. Downloads (Technical White Paper, Technical White Paper Presentation)
Full article at <http://www.microsoft.com/technet/itsolutions/msit/default.mspx>
Using IPsec for Network Protection: Part 1 of 2 :http://www.microsoft.com/technet/community/columns/secmgmt/sm121504.mspx
TechNet Support WebCast: How to use IPSec to help secure network traffic http://support.microsoft.com/default.aspx?scid=kb;en-us;888266
TechNet Webcast: Network Isolation Using Group Policy and IPSec (Part 1 of 3): Overview of Internet Protocol Security (Level 300)
Read the Professor Windows colunn on Windows Server 2003 SP1 http://www.microsoft.com/technet/community/columns/profwin/pw0405.mspx
If you are a server admin you will want to check out the recently released Microsoft Windows Server 2003 Server Performance Advisor (SPA) available here.
SPA is a server performance diagnostic tool developed to diagnose root causes of OS performance issues Windows Server 2003 operating system, particularly performance problems for Internet Information Services (IIS) 6.0 and the Active Directory directory service. Neither Microsoft Windows XP nor Microsoft Windows 2000 supports this tool. Server Performance Advisor measures the performance and use of server resources that are stressed under workload.
Other server roles include system overview (hot files, hot TCP clients, top CPU consumed), print spooler, context switch data and preliminary File Server trace data.