Plus
尋找一個方便記載登錄並收集網路文章的方式--Blog...
2009年12月29日 星期二
Virtual server resiliency tips for high availability
Virtual server resiliency tips for high availability
Microsoft doesn't rule out rushed patch for IIS zero-day vulnerability
Microsoft doesn't rule out rushed patch for IIS zero-day vulnerability
2009年12月27日 星期日
Top 10 Windows Server tips of 2009
Top 10 Windows Server tips of 2009
2009年12月24日 星期四
『3G行動網路』+『WiFi無線上網』 無線自由選 享受無限 - Mobile01 廣編特輯
『3G行動網路』+『WiFi無線上網』 無線自由選 享受無限 - Mobile01 廣編特輯
2009年12月23日 星期三
Best of 2009: Computer networking advice
Best of 2009: Computer networking advice
Video: The Enterprise Database Security Lifecycle: Configuration and Controls sponsored by Guardium
Video: The Enterprise Database Security Lifecycle: Configuration and Controls sponsored by Guardium
What network managers need to know about virtualization planning
What network managers need to know about virtualization planning
2009年12月22日 星期二
How to translate network usage to cost
How to translate network usage to cost
How to install Microsoft VDI and key deployment considerations
How to install Microsoft VDI and key deployment considerations
世界,就有了光~ - 文章分類: 朱小金牌來報到
世界,就有了光~ - 文章分類: 朱小金牌來報到
Securing sensitive data on Windows-based laptops
Securing sensitive data on Windows-based laptops
Simple tools and techniques for finding Windows memory leaks
Simple tools and techniques for finding Windows memory leaks
Top 10 networking stories of 2009
Top 10 networking stories of 2009
Top 10 SharePoint tips of 2009
Top 10 SharePoint tips of 2009
Virtual disaster recovery will evolve in 2010
Virtual disaster recovery will evolve in 2010
Taking the time out of backups with DPM 2007
Taking the time out of backups with DPM 2007
Application switch testing: An easy RFP guide
Application switch testing: An easy RFP guide
2009年12月21日 星期一
VSphere upgrade and performance study guide
VSphere upgrade and performance study guide
2009年12月17日 星期四
Simple tools and techniques for finding Windows memory leaks
Simple tools and techniques for finding Windows memory leaks
Windows 7 improvements driving enterprise adoption
Windows 7 improvements driving enterprise adoption
Lesson 1: How to counter wireless threats and vulnerabilities
Lesson 1: How to counter wireless threats and vulnerabilities
Windows Infrastructure and Architecture Digest
Windows Infrastructure and Architecture Digest
Managing multiple passwords in Windows
Managing multiple passwords in Windows
Utilizing Active Directory snapshots in Windows Server 2008
Utilizing Active Directory snapshots in Windows Server 2008
Preventing hacker attacks with network behavior analysis IPS
Preventing hacker attacks with network behavior analysis IPS
How to avoid the WPA wireless security standard attack
How to avoid the WPA wireless security standard attack
Troubleshooting Microsoft WSUS connectivity issues
Troubleshooting Microsoft WSUS connectivity issues
Intelligent edge switches: Complexity is driving a smarter LAN
Intelligent edge switches: Complexity is driving a smarter LAN
Secure your Windows systems with proper password practices
Secure your Windows systems with proper password practices
Installing Server Core for Windows 2008 the easy way
Installing Server Core for Windows 2008 the easy way
ITIL guide: Best practices, implementation and training
ITIL guide: Best practices, implementation and training
BranchCache makes branch offices feel like home
BranchCache makes branch offices feel like home
BranchCache makes branch offices feel like home
BranchCache makes branch offices feel like home
Integrating NAC with network security tools
Integrating NAC with network security tools
Top 5 Windows desktop security tips
Top 5 Windows desktop security tips
Choosing the best way to install images
Choosing the best way to install images
Data archiving: Three key elements
Data archiving: Three key elements
Rethinking capacity planning with Windows Server 2008 R2
Rethinking capacity planning with Windows Server 2008 R2
Four mistakes that can kill virtual machine performance
Four mistakes that can kill virtual machine performance
Generating a DNS health check in Windows
Generating a DNS health check in Windows
Best practices for data center cabling selection
Best practices for data center cabling selection
Lifecycle of a network security vulnerability
Lifecycle of a network security vulnerability
Defending against WAN bandwidth 'killers': Strategies to improve WAN performance
Defending against WAN bandwidth 'killers': Strategies to improve WAN performance
Extending NAC enforcement to network security devices
Extending NAC enforcement to network security devices
Manage the desktop image lifecycle to limit work, ensure security
Manage the desktop image lifecycle to limit work, ensure security
Top 10 things you don't know about Windows Server 2008 R2
Top 10 things you don't know about Windows Server 2008 R2
Network change and configuration management primer
Network change and configuration management primer
iThome online : : 微軟揭露雲端運算戰略,企業私有雲工具半年後上市
iThome online : : 微軟揭露雲端運算戰略,企業私有雲工具半年後上市
Fixing lingering object problems in complex Active Directory forests
Fixing lingering object problems in complex Active Directory forests
Group policy tricks to secure network endpoints
Group policy tricks to secure network endpoints
Get the low-down on Windows Server 2008 R2
Get the low-down on Windows Server 2008 R2
Citrix Essentials for Hyper-V automates disaster recovery process
Citrix Essentials for Hyper-V automates disaster recovery process
Integrating wired and wireless LANs: Making the business case
Integrating wired and wireless LANs: Making the business case
iThome online : : 3套免費虛擬化備份工具介紹
iThome online : : 3套免費虛擬化備份工具介紹
2009年12月16日 星期三
Building a private storage cloud: Essential components
Building a private storage cloud: Essential components
2009年12月15日 星期二
Virtualization change and configuration management primer
Virtualization change and configuration management primer
VMware vSphere PowerCLI: Learn it, love it
VMware vSphere PowerCLI: Learn it, love it
Parallels bare-metal hypervisor takes on VMware
Parallels bare-metal hypervisor takes on VMware
VSphere upgrade and performance study guide
VSphere upgrade and performance study guide
Balancing Windows security with reasonable password policies
Balancing Windows security with reasonable password policies
Successful SharePoint training strategies
Successful SharePoint training strategies
802.11n WLAN architecture strategies: The 2.4 vs. 5 GHz band debate
802.11n WLAN architecture strategies: The 2.4 vs. 5 GHz band debate
Desktop virtualization network challenges: A primer
Desktop virtualization network challenges: A primer
Structuring patch management in seven steps
Structuring patch management in seven steps
Four less-known mistakes that can kill Hyper-V environments
Four less-known mistakes that can kill Hyper-V environments
BitLocker in R2 provides data protection for semi-protected servers
BitLocker in R2 provides data protection for semi-protected servers
Preventing SQL injection attacks: A network admin's perspective
Preventing SQL injection attacks: A network admin's perspective
Preventing SQL injection attacks: A network admin's perspective
Preventing SQL injection attacks: A network admin's perspective
Is Your IT Infrastructure Ready for Tomorrow? - Preparing for a 10GbE Future sponsored by Dell, Inc.
Is Your IT Infrastructure Ready for Tomorrow? - Preparing for a 10GbE Future sponsored by Dell, Inc.
Carrier Ethernet Testing for the Real World – better, faster, cheaper: A White Paper sponsored by Fluke Networks
Carrier Ethernet Testing for the Real World – better, faster, cheaper: A White Paper sponsored by Fluke Networks
Carrier Ethernet Testing for the Real World – better, faster, cheaper: A White Paper sponsored by Fluke Networks
Carrier Ethernet Testing for the Real World – better, faster, cheaper: A White Paper sponsored by Fluke Networks
Scaling Windows server resources for virtualization
Scaling Windows server resources for virtualization
Remote troubleshooting made easier with Windows 7's Problem Step Recorder
Remote troubleshooting made easier with Windows 7's Problem Step Recorder
Fibre Channel over Ethernet Special Report for enterprise data storage professionals
Fibre Channel over Ethernet Special Report for enterprise data storage professionals
How to prepare for a secure network hardware upgrade
How to prepare for a secure network hardware upgrade
Is cloud data storage right for your IT infrastructure?
Is cloud data storage right for your IT infrastructure?
The top 5 barriers to expanding a virtual infrastructure
The top 5 barriers to expanding a virtual infrastructure
Desktop virtualization network requirements
Desktop virtualization network requirements
How to test LAN switch energy efficiency
How to test LAN switch energy efficiency
Many IT shops budget for server, virtual desktop projects in 2010
Many IT shops budget for server, virtual desktop projects in 2010
Desktop virtualization storage strategies: Easing bandwidth and access
Desktop virtualization storage strategies: Easing bandwidth and access
How to provide access to Web content (while ensuring network security)
How to provide access to Web content (while ensuring network security)
Key elements of a HIPAA compliance checklist
Key elements of a HIPAA compliance checklist
Desktop computing predictions for 2010
Desktop computing predictions for 2010
New Enterprise Desktop E-Zine Vol. 1: Defining Application Virtualization
New Enterprise Desktop E-Zine Vol. 1: Defining Application Virtualization
Introduction to virtualization and data protection
Introduction to virtualization and data protection
Web application vulnerability assessment shows patching progress
Web application vulnerability assessment shows patching progress
How to find and remove lingering objects in Active Directory
How to find and remove lingering objects in Active Directory
Unified wireless network still a work in progress for vendors
Unified wireless network still a work in progress for vendors
Testing LAN switch power consumption: A best practices guide
Testing LAN switch power consumption: A best practices guide
Integrating NAC with network security tools
Integrating NAC with network security tools
Control VM sprawl in your virtual server infrastructure
Control VM sprawl in your virtual server infrastructure
Avoid data migration project failure: Five best practices
Avoid data migration project failure: Five best practices
Are your IT administrators trustworthy?
Are your IT administrators trustworthy?
Are your IT administrators trustworthy?
Are your IT administrators trustworthy?
University runs video over wireless LAN, converts multicast to unicast
University runs video over wireless LAN, converts multicast to unicast
How Windows servers get hacked
How Windows servers get hacked
Desktop virtualization network challenges: A primer
Desktop virtualization network challenges: A primer
Out-of-band network management ensures data center network uptime
Out-of-band network management ensures data center network uptime
Using subnets to isolate network traffic in Hyper-V
Using subnets to isolate network traffic in Hyper-V
Cost of security, IT management add up at healthcare facilities, study finds
Cost of security, IT management add up at healthcare facilities, study finds
Desktop virtualization network requirements
Desktop virtualization network requirements
20 days to a more secure enterprise
20 days to a more secure enterprise
2009年12月14日 星期一
Reduce hardware costs by using Universal Desktop Converter
Reduce hardware costs by using Universal Desktop Converter
Reduce hardware costs by using Universal Desktop Converter
Reduce hardware costs by using Universal Desktop Converter
Reduce hardware costs by using Universal Desktop Converter
Reduce hardware costs by using Universal Desktop Converter
Unlocking the possibilities of native-boot VHD in Windows 7
Unlocking the possibilities of native-boot VHD in Windows 7
A guide to internal and external network security auditing
A guide to internal and external network security auditing
New virtual server networking standards to offer network admins control
New virtual server networking standards to offer network admins control
Sell your CIO on helpful technologies
Sell your CIO on helpful technologies
Many IT shops budget for server, virtual desktop projects in 2010
Many IT shops budget for server, virtual desktop projects in 2010
2009年12月13日 星期日
How Windows servers get hacked
How Windows servers get hacked
2009年12月9日 星期三
University tackles large-scale 802.11n wireless network management
University tackles large-scale 802.11n wireless network management
University tackles large-scale 802.11n wireless network management
University tackles large-scale 802.11n wireless network management
2009年12月1日 星期二
哈哈!我的電腦修好了 @ 漂泊--浮雲永恆的歸宿 :: 痞客邦 PIXNET ::
http://pirateking.pixnet.net/blog/post/15568496
iThome online : : 企業資訊應用的革命性發展
iThome online : : 企業資訊應用的革命性發展
iThome online : : 企業資訊應用的革命性發展
iThome online : : 企業資訊應用的革命性發展
較新的文章
較舊的文章
首頁
訂閱:
文章 (Atom)