REVIEW
- First look: Apple Watch

- 10 Amazing Tools You Should Be Using with Dropbox
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
 
Desktop
Windows Vista : Build Your Network (part 1) - Terminology Primer, To Wire or Not to Wire
Windows Vista : Build Your Network (part 1) - Terminology Primer, To Wire or Not to WireFor best results, wire your nonmobile desktop system to your router/switch/hub when it's nearby. Cables aren't affected by poor reception, security codes, ...
-  Core i7-3770K - Born To Run
-  Fractal Design Node 304
 
Website
ASP.NET 4 in VB 2010 : The Data Controls - Editing with the GridView
ASP.NET 4 in VB 2010 : The Data Controls - Editing with the GridViewThe GridView provides support for editing that's almost as convenient as its support for selection. To switch a row into select mode, you simply set the ...
-  Sharepoint 2010 : Planning for Governance (part 4) - What Is in the Governance Plan - Policies and Standards
-  Sharepoint 2013 : The Managed Metadata Service (part 3) - Term Store, Groups
 
 
Ditch Your Laptop For Your Phone (Part 1)
Ditch Your Laptop For Your Phone (Part 1)Mobile technology is always pushing new boundaries, and the lines between today's smartphones and laptops are often blurred. Many of the functions you expect to find on a laptop are now readily available on most Android smartphones, and in some cases, offer a suitable replacement for a low-end laptop.
-  IPhone Cases Of The Year
-  Android Security Tools
-  iPad Therapy (Part 1) - Speech therapy
-  jQuery 1.3 : Modifying table appearance (part 4) - Filtering
 
 
 
 
Aperion Audio Zona Wireless Speaker System
Aperion Audio Zona Wireless Speaker SystemThe performance of Aperion Audio's Zona speakers is good enough for us to grant the company poetic license in labeling these speakers "wireless." They'd need to be battery-powered in order to be entirely free from wires, an impractical solution because ...
-  Happy iMas (Part 2)
-  Acoustic Energy’s AE1 Multi-Driver Loudspeakers (Part 2)
-  Philips AS860 Wireless Speaker Dock Review
-  Bridge Camera – A Complete Buyer's Guide! (Part 4 ) : Fujifilm Finepix HS20, Nikon Coolpix P500, Canon Powershot SX40 HS, Sony Cyber-Shot HX 100V, Panasonic Lumix FZ150
 
 
 
 
 
SQL Server 2012 : Storage Systems (part 7) - Measuring Performance - Storage Performance Testing
SQL Server 2012 : Storage Systems (part 7) - Measuring Performance - Storage Performance TestingYou have likely noticed how we have stressed that each workload is different. No single storage system will solve every technical or business problem. Any system must be validated prior to its production deployment.
-  Microsoft SQL Server 2008 R2 : Hierarchyid Data Type (part 2) - Modifying the Hierarchy
-  SQL Azure : Building Two OData Consumer Applications (part 2) - Windows Mobile 7 Application
-  Surviving Changes to Columns
-  Oracle SOA Suite 11g R1 : Unit-testing the Composite Application - Automated unit testing (part 4) - Setting the assertion for failure
 
 
 
 
Windows System Programming : The Registry
Windows System Programming : The RegistryThe registry is a centralized, hierarchical database for application and system configuration information. Access to the registry is through registry keys, which are analogous to file system directories.
-  Exchange Server 2010 Administration Overview (part 3) - Using the Graphical Administration Tools, Using the Command-Line Administration Tools
-  All We Need To Know About Green Computing (Part 3)
-  Microsoft Exchange Server 2010 : Creating and Managing Database Availability Groups (part 4) - Configuring Database Availability Group Properties
-  Master Apple Mail (Part 2)
 
 
 
 
Multifaceted Tests : Attempting PHP Include File Injection Interactively & Creating Decompression Bombs
A decompression bomb is a compressed file that is very small but expands to a disproportionately large amount of data. This recipe will discuss how such decompression bombs can be created.
-  Understanding Network Access Protection (NAP) in Windows Server 2008 R2
-  Secure Browsing and Local Machine Lockdown in Vista
-  Implementing Security in Windows 7 : Understanding Windows 7 Security
-  Microsoft Exchange Server 2007 : Exchange Server-Level Security Features (part 2) - Protecting Exchange Server 2007 from Viruses
-  Microsoft Exchange Server 2007 : Server and Transport-Level Security - Exchange Server 2007 SMTP Connectors (part 2) - Hub Transport Server Connectors
-  Microsoft Exchange Server 2007 : Securing Windows for the Edge Transport Server Role (part 1) - Using the SCW Template