Windows
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 1 of 26, items 1 to 30 of 776.
Windows 8 : Configuring virtual machine networking and storage (part 3) - Assigning a virtual switch to a virtual machine , Assigning storage to a virtual machine
Virtual machines can have multiple network adapters and exist on multiple virtual switches. A number of additional features, such as bandwidth management, MAC address assignment (if an address other than the 00-15-5D-xx-xx-xx format is required), and VLAN identification, can be set as properties of the virtual machine.
Windows 8 : Configuring virtual machine networking and storage (part 2) - Hyper-V virtual switch
As mentioned previously, the Hyper-V virtual switch can operate three modes: external, internal, and private. Each of these switch modes has different characteristics that need to be considered before placing VMs on them.
Windows 8 : Configuring virtual machine networking and storage (part 1) - Introducing storage and networking for Hyper-V
The key concept for both storage and networking for Hyper-V is that, in both situations, the virtualized devices are communicating on behalf of the Windows 8 connectivity technologies. Both the Hyper-V virtual switch and Virtual Fibre Channel technologies have an underlying address scheme.
Windows 8 : Customizing the Lock Screen - Customizing the Lock Screen Background,Controlling the Apps Displayed on the Lock Screen, Disabling the Lock Screen
The Lock screen is the screen that appears before you sign on to Windows 8 (or, if your PC has multiple user accounts, it’s the screen that appears before you select which account to sign on).
Windows 8 for Business : Features Exclusive to Windows 8 Enterprise,Windows RT and Business
Microsoft is providing a unique set of features for users of the Windows 8 Enterprise edition. This high-end Windows 8 product edition is available only to corporate customers that subscribe to Microsoft’s Software Assurance volume licensing program.
Windows 8 for Business : Virtualization (part 4) - VHD Shell Integration,Remote Desktop and Remote Desktop Host
Windows 8 now offers direct shell integration with VHD files, letting you seamlessly “mount” them as if they were physical disks and then browse through them using File Explorer.
Windows 8 for Business : Virtualization (part 3) - Using Hyper-V Virtual Machine Connection
Hyper-V is a one-stop shop for creating and managing virtual machines and other virtual resources, but sometimes all you need to do is connect to a virtual machine, which can be found on your own PC or in a Hyper-V install on a different PC or server in your environment.
Windows 8 for Business : Virtualization (part 2) - Using Hyper-V Manager
Hyper-V Manager is the Hyper-V management console and the exact same utility that is provided with Windows Server 2012 and the Remote Server Administration Tools (RSAT) for Windows Server 2012.
Windows 8 for Business : Virtualization (part 1) - Client Hyper-V
Client Hyper-V, as Microsoft calls the Windows 8 version of Hyper-V, has been added to the OS for two primary reasons. One is for software developers who need to test applications and web apps on a variety of operating system and browser combinations.
Windows Server 2012 : Deploying Dynamic Access Control (part 4) - Validating the Configuration
If DAC is configured correctly, Betty should have no access to the Payroll share. In the properties of the Payroll share, click the Advanced button under Security. As we expected, the effective permissions of Betty’s account show she has no access to Payroll.
Windows Server 2012 : Deploying Dynamic Access Control (part 3) - Adding a Resource Property to the Global Resource Property List, Creating a New Central Access Rule
Every resource property has to be added to a resource property list. These lists make the resource property available to file servers. DAC resources can have individual lists target specific file servers, but for our purposes here, we are going to add the resource property to the Global Resource Property List.
Windows Server 2012 : Deploying Dynamic Access Control (part 2) - Configuring Resource Property for Files
To create a new resource property, from the ADAC click Resource Properties, New, and then Resource Property.
Windows Server 2012 : Deploying Dynamic Access Control (part 1) - Preparing Claims
When configuring claim types for users, you are adding existing Active Directory attributes to the list of attributes used to evaluate who gets access to what.
Windows Server 2012 : Managing Users and Data with Dynamic Access Control - The Building Blocks of DAC , Requirements and Predeployment Pointers
Without question, the one major new capability that you will have to get to know at some time or another—and no matter how big or small the infrastructure—is Dynamic Access Control (DAC).
Windows 7 : Using BitLocker Drive Encryption
Backup and System Protection ensure the availability of your files, in that they allow you to restore lost or damaged files by restoring from a backup copy. BitLocker drive encryption isn't about availability.
Windows 7 : Using System Protection (part 3) - Using previous versions
When System Protection makes copies of important system files every 24 hours, it also makes hidden shadow copies of every folder and file that was modified in the last 24 hours. The common term for that shadow copy is a previous version of the folder or file.
Windows 7 : Using System Protection (part 2) - Creating a restore point, Returning to a Previous Restore Point, Undoing a System Restore
The System Restore Wizard starts. Just read what it says and follow its directions. When you get to the page shown in Figure 2, click the restore point you created just before the installation.
Windows 7 : Using System Protection (part 1) - Turning System Protection on or off
System Protection is turned on by default for the drive on which Windows 7 is installed. That means it's protecting your Windows 7 operating system and also documents you keep in your user account folders like Documents, Pictures, Music, and so forth.
Windows 8 for Business : Disk Encryption - EFS, BitLocker and BitLocker To Go
When files are copied or moved out of an encrypted folder, the encryption is retained unless you move them to a location where encryption is not supported, such as to another machine on your home network.
Windows 8 for Business : Domain Join and Group Policy
When you think about it, traditional home-based Windows PCs are unmanaged in the sense that there’s no central oversight available, either by the head of a household or a central server.
Windows 8 : Customizing the Start Screen (part 5) - Adding Shutdown and Restart Tiles to the Start Screen, Customizing the Start Screen Background
While the Start screen does offer a few productivity improvements—at-a-glance info with live tiles, one-click app launching, as-you-type searching—there are a few tasks that are maddeningly (and, in our view, unnecessarily) inefficient.
Windows 8 : Customizing the Start Screen (part 4) - Pinning a Website to the Start Screen,Displaying the Administrative Tools on the Start Screen
Some of these tools are relatively easy to launch. For example, you can press Windows Logo+X to display a menu that includes Event Viewer, Disk Management, Computer Management, and a few other administrative tools .
Windows 8 : Customizing the Start Screen (part 3) - Turning Off a Live Tile, Pinning a Program to the Start Screen
If you’d like to see no live content for a minute or two, you can temporarily turn off all live tiles. From the Start screen, display the Charms menu and then click Settings (or just press Windows Logo+I), click Tiles, and then click Clear.
Windows 8 : Customizing the Start Screen (part 2) - Creating an App Group
If you examine the default Start screen, you notice a gap between the four “lifestyle” apps (News, Sports, Travel, and Finance) on the right, and the rest of the apps on the left.
Windows 8 : Customizing the Start Screen (part 1) - Resizing a Tile, Moving a Tile
The Start screen tiles come in two sizes: small, as seen with the Internet Explorer and Store tiles, and large, as seen with the Mail and Calendar tiles. The large size is useful for tiles that are live, because the tile has more room to display information.
Windows 8 : Creating and using Hyper-V virtual machines (part 3) - Using a Hyper-V virtual machine
After a virtual machine is created and running, you can install an operating system as long as valid physical or virtual media are provided to the virtual machine. When the virtual machine starts, it goes through a boot sequence much like that of a physical PC.
Windows 8 : Creating and using Hyper-V virtual machines (part 2) - Creating a new virtual machine
Dynamic memory provides a base amount of memory that Windows needs at startup and then increases as needed. This is known as startup memory and might not be as much as the defined amount of memory in the New Virtual Machine Wizard.
Windows 8 : Creating and using Hyper-V virtual machines (part 1) - Planning your virtual machines
Each situation in which you might create a virtual machine is different. Therefore, the decision to create a virtual machine must be based on the needs of the particular situation and the policies of your organization.
Learning about Hyper-V for Windows 8 (part 3) - What you need to know to succeed
Getting started with Hyper-V is easy, but a number of points should be addressed ahead of time. In addition to how and when Hyper-V will be used, you will also need a thorough understanding of a number of critical elements of the virtualization technology as a whole so you will be successful.
Learning about Hyper-V for Windows 8 (part 2) - Enabling Hyper-V
The Hyper-V hypervisor is included with Windows 8 but must be enabled. This means it is a feature and can be added easily with Windows. Before you enable this feature, make sure you have the right configuration.
 
 
Most View
 
- Exchange Server 2013 administration overview : Exchange Server and Active Directory, Exchange Online and Office 365
- Windows 8 for Business : Features Exclusive to Windows 8 Enterprise,Windows RT and Business
- Application Lifecycle Management in SharePoint 2013 : Planning Your Upgrade and Patching Approach
- SQL Server 2012 : Delivering Manageability and Performance (part 8) - OTHER MICROSOFT TOOLS FOR MANAGING SQL SERVER - System Center Operations Manager
- SQL Server 2012 : Delivering A SQL Server Health Check (part 1)
- SQL Server 2012 : Delivering A SQL Server Health Check (part 4)
- Microsoft Access 2010 : Introduction to Relational Database Design (part 2) - Normalization and Normal Forms
- Creating SharePoint 2013 Workflows (part 3) - Workflow Visualization Using Visio 2013, Creating Custom Workflows Using Visual Studio 2012
- Windows Phone 8 : Working with People - The People Hub (part 4) - Deleting a Contact
- Installing Exchange 2013 : Security groups and accounts Exchange creates
 
 
Top 10
 
- Sharepoint 2013 : Developing Integrated Apps for Office and Sharepoint Solutions - The New App Model for Office
- Overview of Oauth in Sharepoint 2013 : Application Authorization - On-Premises App Authentication with S2S
- Overview of Oauth in Sharepoint 2013 : Application Authorization - Requesting Permissions Dynamically
- Microsoft Excel 2010 : Working with Graphics - Inserting a Diagram,Inserting an Object
- Microsoft Excel 2010 : Working with Graphics - Inserting WordArt, Using Smart Art in Excel
- Microsoft Excel 2010 : Working with Graphics - Using AutoShapes
- Overview of Oauth in Sharepoint 2013 : Application Authentication (part 2) - Managing Tokens in Your Application
- Overview of Oauth in Sharepoint 2013 : Application Authentication (part 1) - Using TokenHelper
- Overview of Oauth in Sharepoint 2013 : Creating and Managing Application Identities
- Overview of Oauth in Sharepoint 2013 : Introduction to OAuth