Windows Vista – Springboard Series of Resources

Can’t find all the resources you need to Plan, Deploy and Manage Windows Vista? Well, the Springboard Series of Resources is available to help you. Discover, Explore, Deploy and Manage resources, are all in one place, to make your job easier. Monthly spotlights; interviews and advice from technical experts like Mark Russinovich; links to the…


SQL Server 2008 Upgrade Technical Reference Guide

The SQL Server 2008 Upgrade Technical Reference Guide is now available. This 490-page white paper covers the essential phases and steps to upgrade existing instances of SQL Server 2000 and 2005 to SQL Server 2008 by using best practices. These include preparation tasks, upgrade tasks, and post-upgrade tasks. It is intended to be a supplement…


Azure – How does Microsoft build, provision, monitor and run the environment

A recorded session from the Microsoft Professional Developers Conference (PDC) is available that discusses the Microsoft Azure platform from a technical perspective. In this session you will about the internal service management system and virtualization technologies responsible for monitoring, configuring, and lifecycle management of the cloud computing environment. Hear about the mechanisms used to deliver…


TechDays 2009 Switzerland – Save the dates

Microsoft’s TechDays Switzerland, the premier event for IT Professionals, Developers and Architects, will be held on the following dates: 1-2 April 2009      Geneva     (French)8-9 April 2009      Bern         (German and English) Sessions, speakers and exact details will be published closer to the event. TechDays will have distinctive tracks for IT Professionals, Developers and Architects, covering topics…


IT Pro User Group Event – Unified Communications and Virtualization Security

Subject:  Unified Communications and Virtualization Security Language: Deutsch / English Tuesday – 2 December 2008 17:45 – 21:00 Digicomp Academy AG  (Zürich) Limmatstrasse 50 CH-8005 Zürich   Participation is free. More details and registration here.   Abstract: Session 1 Voice und IM Lösung von Microsoft  (Deutsch / German) OCS 2007 ist die Voice und IM…


SQL Server 2008 Compliance Guide

The Microsoft SQL Server Customer Advisory Team (SQLCAT) have published a compliance guide for SQL Server 2008. The guide covers: Understanding Compliance Implementing IT Controls with SQL Server 2008 Securing the Platform Controlling Identity and Separation of Duties Separation of Duties Encrypting Database Data Auditing Sensitive Operations Using Policy-Based Management to Define, Deploy, and Validate…


SharePoint Guidance – November 2008

  The SharePoint Guidance has just been published on Microsoft’s Patterns and Practices Developer Center. This guidance helps architects and developers build SharePoint intranet applications. The guidance contains a reference implementation (RI) that demonstrates solutions to common architectural, development, and lifecycle management challenges. This guidance discusses the following: Architectural decisions about patterns, feature factoring, and…


SQL Server Energy 2008 Vienna

    SQL Server Energy 2008 Dates: 25.-26. November 2008 Venue: Leopold Museum, Vienna, Austria Information und Registration: www.sqlserverenergy.at   Note: The web site and registration is in German, the sessions at SQL Energy will be in English.    Rafal Lukawiecki, Robert Bruckner, Dejan Sarka, Steffen Krause, Itzik Ben-Gan, Ramesh Meyyappan, Maciej Pilecki, Kevin Ashby,…


Tech-Ed EMEA IT Pro

  Videos from Tech-Ed 2008 EMEA IT Professionals, currently on in Barcelona, are now online on Tech-Ed-TV Day 1, Monday 3 November, was dominated by the keynote address from Brad Anderson. Brad spoke about Windows Server 2008 R2, Online Services and the next version of SQL Server (“Kilimanjaro“), how “Software plus Services“ enables IT Professionals…


Microsoft Security Intelligence Report (Volume 5)

The Microsoft Security Intelligence Report (SIR) provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows users, and some of the busiest online services on the Internet, this report also provides a detailed analysis…