Microsoft Corporation

Displaying 1-40 of 81 results

  • White Papers // Feb 2012

    Microsoft Embedded Systems Custom Guide

    Embedded systems are devices with embedded computational capability. Sometimes these devices are much more device than computer, like a motion sensing light that turns on and off at different times of the day. Other times, these devices are essentially special-purpose computers or handhelds, like electronic hospital charting systems, or handheld...

    Provided By Microsoft Corporation

  • Podcasts // Mar 2011

    Microsoft SDL Implementation Phase: Security Practices

    In this podcast, the speakers and iSEC Partners, discusses the implementation security practices of the "Implementation" phase of the Microsoft SDL. Peter uses the definition of what makes secure code as a point of departure, explaining then the benefits of the ease and repeatability the Microsoft SDL process brings to...

    Provided By Microsoft Corporation

  • Podcasts // Mar 2011

    Microsoft SDL Requirements Phase: Security Practices

    In this video, Chris Weber, Managing Partner and Robert Mooney, Senior Software Development, Casaba, speak about the security practices of the "Requirements" phase of the Microsoft SDL. The speakers explain the benefits of following the Microsoft SDL to building more secure, reliable, and standard-compliant software.

    Provided By Microsoft Corporation

  • Podcasts // Mar 2011

    Windows 7 Deployment - I Want My MDT

    Is any one unsure of how to get the perfect Windows 7 image built with all one's applications? Is any one tired of searching through dozens of images for the right one when people deploy a new computer, wishing one could reclaim all that disk space that they use? Join...

    Provided By Microsoft Corporation

  • Podcasts // Mar 2011

    Security Talk: Threat Model Express

    As a core element of the design phase of the Microsoft Security Development Lifecycle (SDL), threat modeling helps software architects identify and mitigate potential security issues early. Although the benefits of threat modeling at the design phase are well-documented and tools are available to automate this technique, some organizations aren't...

    Provided By Microsoft Corporation

  • Podcasts // Feb 2011

    Refreshing Windows XP to Windows 7 Using a USB Drive (Part 3 of 6): Creating a Task Sequence

    Task Sequencer in MDT 2010 contains the steps to be performed during LTI. Task sequences in MDT 2010 use the same task sequence engine as System Center Configuration Manager. The speakers are going to create a Task Sequence to do the Operating System install.

    Provided By Microsoft Corporation

  • Podcasts // Feb 2011

    Refreshing Windows XP to Windows 7 Using a USB Drive (Part 2 of 6): Adding Applications, OS and Packages

    Applications can be deployed as a part of the operating system image or after the operating system is deployed to the target computer. To prepare for deployment people will need to create an application portfolio that includes a list of applications and the compatibility status of each application.

    Provided By Microsoft Corporation

  • Podcasts // Feb 2011

    Refreshing Windows XP to Windows 7 Using a USB Drive (Part 1 of 6): Creating a USB Deployment Share

    Typically, target computers have high-speed, persistent connections to the deployment infrastructure. However, some target computers may connect to an intranet remotely or not at all. To deal with this, the MDT 2010 provides one with two methods for deploying operating systems and applications: Deployment share: This method uses a network...

    Provided By Microsoft Corporation

  • White Papers // Jan 2011

    Hyder - A Transactional Record Manager for Shared Flash

    Hyder supports reads and writes on indexed records within classical multi-step transactions. It is designed to run on a cluster of servers that have shared access to a large pool of network addressable raw flash chips. The flash chips store the indexed records as a multiversion log-structured database. Log-structuring leverages...

    Provided By Microsoft Corporation

  • White Papers // Oct 2010

    Transitioning to Microsoft SharePoint and Virtualization with Microsoft and NetApp

    The rapid growth and adoption of Microsoft SharePoint reinforce the role of collaboration in information-rich organizations. Microsoft's fastest-growing business software product of all time, SharePoint is becoming a mission-critical resource. A recent survey showed that 29% of current SharePoint adopters rate it as one of their top three IT initiatives,...

    Provided By Microsoft Corporation

  • Podcasts // Aug 2010

    The Value of Business Intelligence With SQL 2008 R2, Office 2010 and SharePoint 2010

    In a challenging economic environment, businesses must be even more agile and responsive to changes in the marketplace. From the chief executive to the marketing analyst, users need relevant information at their fingertips.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Profile Data With the Data Profiling Task and Viewer?

    Data quality is important to every business. Using the SQL Server 2008 Data Profiling task computes statistics about the data in a database to spot incorrect values. The Data Profiling viewer allows one to view the generated statistics.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Use the Row Value Constructor to Insert Data Into a SQL Server 2008 Table?

    In this podcast, the speaker tells about how to insert data into a SQL Server 2008 table using the Row Value Constructor. This demo shows how to Insert data into a SQL Server 2008 table-Four different methods are used to insert bulk data, including the new Data Row Constructor.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Use the Service Audit Object in SQL Server 2008?

    In this podcast, the speaker tells about how to use the Service Audit Object to record events within SQL Server 2008 Enterprise Edition. This demo shows how to Create a Server Audit Object-Create a Server Audit Specification-Create a Database Audit Specification-Examine the audit logs for Login Failed events.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Import Data From Oracle Databases?

    Many organizations have both Oracle and SQL Server databases. In this video speaker shows how easy it is to use the import data wizard and SQL Server Integration Services to import data from a table in an Oracle database into SQL Server.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Configure Database Mail in SQL Server 2008?

    Database Mail is useful for sending e-mail to administrators and end users. Database mail can contain data from queries or from files or other resources on one's network. In this podcast, the speaker tells about how to configure Database Mail in SQL Server 2008.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Block Connections to SQL Server by IP Address Using Logon Triggers?

    This podcast, the speaker tells about how to restrict access to SQL Server 2005 SP 2 (Or Above) based on IP Address. This demo shows how to:- Retrieve the IP Address of the client using the EVENTDATA() function-Use a Logon Trigger to restrict access to a SQL Server instance

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Use PowerShell to Transfer Data?

    PowerShell can be used to export or import data. By creating a simple script one can easily move data between databases. This can be given to developers or testers to allow them to refresh data in their systems.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Use the Database Engine Tuning Advisor?

    For many database administrators ensuring top performance is a large part of their job. By using the Database Engine Tuning Advisor the database any workload can be analyzed for changes to the database that will increase performance.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Use the File-stream Data Type to Store BLOB Data?

    In this podcast, the speaker tells about how to configure Windows and SQL Server to enable the Filestream data type. After configuring SQL Server to support the Filestream, Scott creates a new database and table that uses the Filestream data type.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Configure a Report Portal in SSRS?

    This podcast, the speaker tells about how configure a SSRS report portal from scratch. This demo shows how to: setup a Report URL, define an execution account, create a Reports Server database, configure SMTP and more...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Create and Publish a Data Cube for SQL Server Analysis Server 2008?

    This podcast, the speaker tells about how to use Business Intelligence Development Studio (BIDS) to create an data cube for SQL Server Analysis Server 2008. This demo shows how to: Use BIDS to create a data model project, create Data Sources, Data Views, Dimensions, and Cubes and how to Deploy...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Provide an Up-to-Date Data Warehouse With Change Data Capture?

    In this podcast, the speaker introduces one to the Change Data Capture feature of SQL Server 2008. After showing how to configure Change Data Capture on a database Scott shows a sample SSIS package that extracts the changed data from the database.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Automate Report Delivery in SQL Server Reporting Services Using Subscriptions?

    The speaker tells about how to create report subscriptions to au This demo shows how to: configure a shared data source to store credentials (required for subscriptions), configure SSRS for SMTP email delivery, create a subscription that delivers reports to a file share and create a subscription that delivers reports...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Setting Up a Maintenance Plan to Backup Databases?

    In this podcast, the speaker tells about how to create database maintenance plans using the Maintenance Plan wizard and SQL Server Integration Services (SSIS). The speaker also shows how to customize plans that were created with the wizard.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Create and Modify Reports Using the Report Builder Tool?

    In this podcast, the speaker tells about how to use SQL Server 2008 Business Intelligence Studio to create a report model. The people then use the report model and the Report Builder tool to create a report.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Manage SQL Server 2008 Spatial Data?

    In this podcast, the speaker tells about an overview of spatial data in SQL Server 2008. Using the geometry data type Scott looks at some of the functions that a DBA might have to know to properly understand and maintain the data being stored in the database.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Streamline an Upgrade From SQL Server 2005 to SQL Server 2008?

    In this podcast the speaker introduces the SQL Server Upgrade Advisor. He then shows two methods for using the command line to upgrade a SQL server without having to wait for dialog boxes or provide further input.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Synchronizing Remote SQL Server Databases With the Sync Framework?

    In this podcast, the speaker tells about shows how to install the synchronization framework and then how to use it in conjunction with SQL Server 2008 change tracking to update remote, occasionally connected databases.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Configure Report Security in SSRS?

    This podcast, the speaker tells about how configure SSRS report security using both default and custom roles This demo shows how to: grant a user access to a report & folder, grant group access to a report & folder, create a custom role in SSRS, configure users to utilize the...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: The New SQL Audit Feature of SQL Server 2008?

    In this podcast, the speaker tells about one new SQL Audit feature of SQL Server 2008. Scott shows one how to set up a server audit using Transact SQL. He also shows one how to create a database audit using SQL Server Management Studio. Using SQL Audit one can audit...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Use Policy Based Management Features of SQL Server 2008 to Manage SQL Servers?

    In this podcast, the speaker tells about how to use the new policy based management features of SQL Server 2008 to manage the SQL Servers. Scott shows one how to use facets, create conditions, and create policies to manage the servers. The video demonstrates cases where the policy can automatically...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Enable Transparent Data Encryption?

    In this podcast the speaker tells about how to use the transparent data encryption (TDE) feature of SQL Server 2008 Enterprise Edition. In addition to showing how to create the keys and certificates necessary to enable TDE, Scott encrypts the Adventure Works sample database.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Integrate a Map With SQL Server Reporting Services?

    This podcast, the speaker tells about how to insert a map into a report using SQL Server 2008 R2 Reporting Services. The map utilizes spatial data within a SQL Server database. This video demonstrates the following: Create a report using Business Intelligence Design Studio Add a map to the report...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Highlight Exceptions Table Analysis Tool for Data Mining?

    In this podcast, the speaker tells will learn how to use the Highlight Exceptions Table Analysis Tool for Excel. The Highlight Exceptions tool uses the Microsoft clustering algorithm and pattern analysis to find values in a dataset that are atypical.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Forecast Table Analysis Tool?

    In this tutorial one will learn how to use the Forecast Table Analysis Tool for Excel. The Forecast tool uses the Microsoft time series algorithm to predict future values based on trends in existing time series data.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Use SQL Profiler With SQL Server 2008?

    This podcast, the speaker tells about how use SQL Profiler to perform the following tasks: - Create and Edit Traces-Create Trace Templates-Watch Trace results-Start, Pause, and Stop a Trace-Replay Trace results- Capture SHOWPLAN events and view analyze their results.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Setup Snapshot Replication With SQL Server 2008?

    This podcast, the speaker tells about how to configure Snapshot Replication between two instances of SQL Server 2008. This video demonstrates the following: Creating a Publisher database, Creating Subscriber database, selecting replicable SQL Server database objects, Configuring security for the replication processes.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Set Up Database Mirroring?

    Database mirroring is a feature of SQL Server that allows an administrator to create a copy of the database that is always up to date. If the principal server fails or needs to be taken offline for maintenance the mirror server can be quickly set up to take on the...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Using the HierarchyID Data Type in SQL Server 2008 to Manage Data Hierarchies?

    Managing hierarchies in Information Systems has long been a challenge to most information systems professionals. The issues are simple, but the implementation of hierarchies within databases is complex and often onerous.

    Provided By Microsoft Corporation

  • White Papers // Apr 2009

    VLDB et BUSINESS INTELLIGENCE

    Que l'on parle de VLDB Intelligence ou de traditionnel SID, il s'agit toujours de g?rer des volumes de donn?es importants. Et cela ne s'improvise pas. L'entrep?t de donn?es peut ?tre d'une efficacit? redoutable, pour peu qu'il soit bien construit, au renfort d'une m?thodologie ad?quate et d'un vrai souci de qualit?...

    Provided By Microsoft Corporation

  • Webcasts // Apr 2010

    Microsoft Career Webcast: Meet women at Microsoft showcasing 3 Services roles they excel at and love to do

    Meet up to 12 different women from Microsoft Services and learn how they are helping our customers succeed. We are holding four webcasts to accommodate four different time zones on the three roles below. We hope you will join the one that works best for you. The Consultant: Meet...

    Provided By Microsoft Corporation

  • White Papers // Feb 2012

    Microsoft Embedded Systems Custom Guide

    Embedded systems are devices with embedded computational capability. Sometimes these devices are much more device than computer, like a motion sensing light that turns on and off at different times of the day. Other times, these devices are essentially special-purpose computers or handhelds, like electronic hospital charting systems, or handheld...

    Provided By Microsoft Corporation

  • White Papers // May 2008

    Microsoft Online Services And The Microsoft Business Productivity Online Suite

    Microsoft regulates the number of Microsoft Online trial subscriptions that are active at any one time. If trial subscriptions to a service have reached the activation limit, the Microsoft Online Customer Portal will report that the service is "Temporarily suspended" when you try to sign up for it. You can...

    Provided By Microsoft Corporation

  • Podcasts // Mar 2010

    Enable Better Decision Making With Microsoft Business Intelligence

    In this podcast, the speakers tell about Microsoft's business intelligence vision and how Microsoft SQL Server 2008 R2 can help businesses derive more value from the information they already have.

    Provided By Microsoft Corporation

  • Podcasts // Aug 2010

    The Value of Business Intelligence With SQL 2008 R2, Office 2010 and SharePoint 2010

    In a challenging economic environment, businesses must be even more agile and responsive to changes in the marketplace. From the chief executive to the marketing analyst, users need relevant information at their fingertips.

    Provided By Microsoft Corporation

  • Podcasts // Apr 2009

    Windows Mobile Digital Certificate Management

    Digital Certificates and public/private key technology is core to Windows Mobile platform security. In this podcast, people can learn how certificates are used to provide authentication, access control and encryption for the OS, applications and networking.

    Provided By Microsoft Corporation

  • Podcasts // Apr 2008

    Windows Mobile Series: Mobility Infrastructure Optimization

    For an organization to create and deploy mobile line-of-business applications, it must first have an appropriate level of enterprise hardware, software, networking, and security in place to support those operations.

    Provided By Microsoft Corporation

  • Podcasts // Apr 2008

    Windows Mobile Series: Mobilizing Business Processes and Applications

    Like many companies today, one organization is likely feeling the impact of having to work harder to grow one's business and raise productivity in an increasingly competitive environment. Mobile workforce numbers are growing steadily each year, and IT organizations are under increasing pressure from employees and executives to provide company-wide...

    Provided By Microsoft Corporation

  • Podcasts // Apr 2008

    Windows Mobile Series: The Optimal Mobile Communications Solution

    Windows Mobile delivers the advanced e-mail, calendaring, and collaboration capabilities and productivity tools one mobile workers already know and use, in addition to a familiar, flexible, and cost-effective environment for one IT organization.

    Provided By Microsoft Corporation

  • Podcasts // Apr 2008

    Windows Mobile Series: Beyond e-Mail With Windows Mobile for Small and Mid-Sized Companies

    Join this webcast to learn why Windows Mobile is a top platform for mobilizing business applications. See what's new with Windows Mobile 6, and the latest devices coming to market. This session includes specifics on the advantages of using Windows Mobile Developer Tools to develop and run successful business applications.

    Provided By Microsoft Corporation

  • Podcasts // Mar 2011

    Microsoft SDL Implementation Phase: Security Practices

    In this podcast, the speakers and iSEC Partners, discusses the implementation security practices of the "Implementation" phase of the Microsoft SDL. Peter uses the definition of what makes secure code as a point of departure, explaining then the benefits of the ease and repeatability the Microsoft SDL process brings to...

    Provided By Microsoft Corporation

  • Podcasts // Feb 2010

    Windows Intune: PC Management With Cloud Services and Windows 7

    Microsoft recently announced the beta of Windows Intune, a new solution that simplifies how businesses manage and secure PCs using Windows cloud services and Windows 7. Windows Intune is a comprehensive offering that includes PC management, malware protection, and Windows upgrades - all without the need to set up enterprise...

    Provided By Microsoft Corporation

  • Podcasts // Jan 2010

    Learn How Microsoft Dynamics CRM Online Plus BPOS Deliver Greater Value

    Please join one for the Microsoft-led seminar Learn How Microsoft Dynamics CRM Online Plus BPOS Deliver Greater Value, where the speaker will review two solutions from Microsoft Online Service, the Microsoft Business Productivity Online Standard Suite (BPOS), and Microsoft Dynamics CRM Online.

    Provided By Microsoft Corporation

  • Podcasts // Mar 2010

    Navigating the ITIL IT Life Cycle (Part 3 of 5): The Service Transition Phase

    In this podcast series, the speakers navigate the IT Infrastructure Library (ITIL) IT life cycle, following the five ITIL phases, and they provide an introduction and practical guidance for the goals, inputs, outputs, and value of each ITIL life-cycle phase.

    Provided By Microsoft Corporation

  • Podcasts // Apr 2008

    Firewall Transversal in Communications Server 2007

    The ability to transverse firewalls is very important to how Microsoft Office Communications Server 2007 allows VoIP calls in a secure manner. In this podcast, the speakers talk in depth about the how Interactive Connectivity Establishment (ICE) and TURN are used to allow media to transverse firewalls in a secure...

    Provided By Microsoft Corporation

  • Podcasts // Jun 2008

    Disaster Recovery in Communications Server 2007

    Disaster recovery is a major issue for enterprises all over the world. In this session, the speakers provide backup and service restoration procedures for Microsoft Office Communications Server 2007. Join one as they dive into two primary sections: pool and server backup.

    Provided By Microsoft Corporation

  • Podcasts // May 2008

    All About Communications Server 2007 Security

    A major focus during deployment is to make sure one's application is secure. Attend this podcast as the speakers take a look at areas of Microsoft Office Communications Server 2007 that incorporate security such as TCP, Transport Layer Security (TLS), SRTP, and others.

    Provided By Microsoft Corporation

  • Podcasts // Jun 2008

    Video Conferencing and Interoperability With Existing Systems

    Join this webcast as the speaker discuss the current video conferencing solutions and describe how to deploy them. In addition, they explore High-Definition (HD) video and the partner interoperability road map.

    Provided By Microsoft Corporation

  • Podcasts // Dec 2008

    Microsoft Align IT: Episode 23: Unified Communications? Simplify Administration by Bringing Everything Together

    In this episode the speaker talk with T Manager from Gerrie Electric and President of Legendcorp on how they came about deploying a Microsoft based Unified Communications solution to replace an end of life PBX system for 17 offices.

    Provided By Microsoft Corporation

  • Podcasts // May 2009

    Platform Solution Blueprints: Unified Communications

    In this podcast, the speaker illustrate how Microsoft Unified Communications simplifies access to information no matter where people are. If one struggle with information overload then tune in to this webcast and see how context, relevance, and immediacy help move one from being available to being ready.

    Provided By Microsoft Corporation

  • Podcasts // Dec 2009

    Technical Talks With Tim Vander Kooi: Integrated Communications

    Employees in one's organization want access to information and people regardless of what device they use; the ability to instantly see the status of colleagues and chat with them is a business requirement.

    Provided By Microsoft Corporation

  • Podcasts // Dec 2009

    Leveraging New Ways to Work

    Interested in the hearing about the latest developments in Unified Communications? If so, please join one for the Microsoft-led webinar Leveraging New Ways to Work, where one can learn about: How to save money by controlling IT costs, improve efficiency and increase revenue streams through innovation.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2009

    Building Applications Using the .NET Service Bus

    In this podcast, the speaker provide an overview of the Microsoft .NET Services Service Bus. They cover what a Service Bus is and why it is necessary, and they step through the features of the Service Bus: The naming system, the service registry, the messaging fabric, and the programming model,...

    Provided By Microsoft Corporation

  • Podcasts // Feb 2011

    Refreshing Windows XP to Windows 7 Using a USB Drive (Part 3 of 6): Creating a Task Sequence

    Task Sequencer in MDT 2010 contains the steps to be performed during LTI. Task sequences in MDT 2010 use the same task sequence engine as System Center Configuration Manager. The speakers are going to create a Task Sequence to do the Operating System install.

    Provided By Microsoft Corporation

  • Podcasts // Feb 2011

    Refreshing Windows XP to Windows 7 Using a USB Drive (Part 2 of 6): Adding Applications, OS and Packages

    Applications can be deployed as a part of the operating system image or after the operating system is deployed to the target computer. To prepare for deployment people will need to create an application portfolio that includes a list of applications and the compatibility status of each application.

    Provided By Microsoft Corporation

  • Podcasts // Feb 2011

    Refreshing Windows XP to Windows 7 Using a USB Drive (Part 1 of 6): Creating a USB Deployment Share

    Typically, target computers have high-speed, persistent connections to the deployment infrastructure. However, some target computers may connect to an intranet remotely or not at all. To deal with this, the MDT 2010 provides one with two methods for deploying operating systems and applications: Deployment share: This method uses a network...

    Provided By Microsoft Corporation

  • Podcasts // Mar 2011

    Windows 7 Deployment - I Want My MDT

    Is any one unsure of how to get the perfect Windows 7 image built with all one's applications? Is any one tired of searching through dozens of images for the right one when people deploy a new computer, wishing one could reclaim all that disk space that they use? Join...

    Provided By Microsoft Corporation

  • Podcasts // Jun 2009

    Fundamentals of Third-Party Security Management

    In this podcast, the speaker tells about learn the fundamentals for building a vendor security management program that provides reasonable assurance that third parties who are hosting and managing one's data, applications, or business processes have appropriate levels of security controls in place to protect one's information assets.

    Provided By Microsoft Corporation

  • Podcasts // Mar 2011

    Microsoft SDL Requirements Phase: Security Practices

    In this video, Chris Weber, Managing Partner and Robert Mooney, Senior Software Development, Casaba, speak about the security practices of the "Requirements" phase of the Microsoft SDL. The speakers explain the benefits of following the Microsoft SDL to building more secure, reliable, and standard-compliant software.

    Provided By Microsoft Corporation

  • Podcasts // Mar 2011

    Security Talk: Threat Model Express

    As a core element of the design phase of the Microsoft Security Development Lifecycle (SDL), threat modeling helps software architects identify and mitigate potential security issues early. Although the benefits of threat modeling at the design phase are well-documented and tools are available to automate this technique, some organizations aren't...

    Provided By Microsoft Corporation

  • Podcasts // Nov 2008

    BenkoTips Live & on Demand: Security Sidebars and Hacker Tricks!

    Is any one afraid? Should they be? Do one really think that what one doesn't know won't hurt? In this podcast the speakers take a look at the top five Web exploits that hackers are using to break into sites.

    Provided By Microsoft Corporation

  • Podcasts // Nov 2008

    A Proactive Approach to Building a Successful Security Development Lifecycle (SDL) Program

    With software security, the best defense is a good offense. A good offense starts with security as part of the whole development lifecycle - not just an afterthought - and requires specialized security knowledge and tools that organizations can adopt quickly and with minimal disruption to their development process.

    Provided By Microsoft Corporation

  • White Papers // Jun 2010

    Remote Desktop Virtualization Host Capacity Planning in Windows Server 2008 R2

    The Remote Desktop Virtualization Host (RD Virtualization Host) role service lets multiple concurrent users run Windows-based applications on a remote virtual machine running Windows client operating systems. This white paper is intended as a guide for capacity planning of RD Virtualization Host in Windows Server 2008 R2. It describes the...

    Provided By Microsoft Corporation

  • White Papers // May 2010

    Choosing an Appropriate User State Virtualization Solution

    User state virtualization describes the separation of user settings and data from an end user's personal computer. Microsoft Windows provides three technologies for virtualizing user state information: Roaming User Profiles, Folder Redirection, and Offline Files. Windows 7 includes improvements that provide IT implementers with more options, greater flexibility, and simplified...

    Provided By Microsoft Corporation

  • White Papers // May 2010

    Deploying Remote Desktop Connection Broker With High Availability Step-by-Step Guide

    This paper describes the steps for configuring Remote Desktop Connection Broker (RD Connection Broker) in a failover cluster, as part of a configuration that provides users with access to personal virtual desktops or virtual machines in a virtual desktop pool through RemoteApp and Desktop Connection. A failover cluster is a...

    Provided By Microsoft Corporation

  • White Papers // Apr 2010

    Deploying Virtual Desktop Pools by Using Remote Desktop Web Access Step-by-Step Guide

    Virtual desktop pools are groups of identically configured virtual machines that users can connect to by using either RemoteApp and Desktop Connection or Remote Desktop Web Access (RD Web Access). In this paper, the authors will set up a virtual desktop pool and connect to the pool by using RD...

    Provided By Microsoft Corporation

  • White Papers // Sep 2008

    Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy

    In Wireless LANs, users may adapt their transmission rates depending on the observed radio conditions on their links to maximize their throughput. Recently, there has been a significant research effort in developing distributed rate adaptation schemes offering better performance than that of the current ARF (Automatic Rate Fallback). Unlike previous...

    Provided By Microsoft Corporation

  • White Papers // Mar 2009

    Reflections on MobileActive08 and the M4D Landscape

    This paper revisits presentations at the MobileActive08 conference in Johannesburg to critically examine the current diversity of projects and approaches in Mobiles For Development (M4D). The authors identify four common choices facing individual M4D projects (intended users, technical accessibility, informational links, and market links) which collectively mark the current landscape...

    Provided By Microsoft Corporation

  • White Papers // Jan 2011

    Hyder - A Transactional Record Manager for Shared Flash

    Hyder supports reads and writes on indexed records within classical multi-step transactions. It is designed to run on a cluster of servers that have shared access to a large pool of network addressable raw flash chips. The flash chips store the indexed records as a multiversion log-structured database. Log-structuring leverages...

    Provided By Microsoft Corporation