Last Updated on 23 Oct. 2015, Total: 168 Blog Posts
Spear phishing has quickly evolved into one of the dangerous forms of spam. Phishing emails, designed to steal passwords, banking info, and other sensitive information, have become very common and very costly. Many IT and Security professionals know they need to bolster their defenses but are having trouble justifying new investments internally with a good ROI case. Join Michael Osterman... Read More
Microsoft Forefront UAG - Configuring Forefront UAG as a DirectAccess Server (Part 2) In this article the author explains how to configure Forefront UAG as a DirectAccess Server. Comprehensive Overview of Web and Server Publishing Rules in TMG 2010 (Part 10) In this article we take a look at the details of the Server Publishing Rule we created and find... Read More
A new technology developed by researchers at the University of British Columbia could help people who are unable to verbally speak! These researchers have developed a voice synthesizer that allows people to speak by simply moving their hands. The technology known as the Digital Ventriloquist Actor (DiVA) uses a pair of special gloves equipped with 3D sensors that use gestures... Read More
What archiving features are coming in MS Exchange 2013? What are the top myths and misconceptions when it comes to MS Exchange and email archiving? Why is email archiving considered the "Swiss Army Knife" of the IT world because it solves so many groups' problems in one solution? Read more and Register here!... Read More
Join J. Peter Bruzzese, Microsoft Certified Trainer and CIO and CoFounder of ClipTraining on Wednesday, March 27, 2013 for a live MSExchange.org webinar, sponsored by Kroll Ontrack. In this complimentary 45 minute Webinar, you will discover:... Read More