Desktop
Windows Server 2012 : Managing and Troubleshooting Hardware (part 11) - Resolving resource conflicts
Windows Server 2012 :  Managing and Troubleshooting Hardware (part 11) - Resolving resource conflictsAnyone who remembers IRQ conflicts will be thankful that current computers support ACPI BIOS. With ACPI BIOS, resources are allocated automatically by ...
-  Windows Server 2012 : Managing and Troubleshooting Hardware (part 10) - Troubleshooting hardware
-  Windows Server 2012 : Managing and Troubleshooting Hardware (part 9) - Adding non–Plug and Play, legacy hardware
 
Website
Sharepoint 2013 : List and library essentials - Organizing items by using folders
Sharepoint 2013 : List and library essentials - Organizing items by using foldersIn SharePoint 2013, you can create folders to organize your lists, similar to creating folders on your computer. However, for the purposes of organizing ...
-  Sharepoint 2013 : List and library essentials - Sorting or filtering a list view
-  Sharepoint 2013 : List and library essentials - Creating and selecting a list view
 
 
Windows Phone 8 : Microsoft Office Mobile - Excel (part 10) - Entering Formulas,AutoSum
Windows Phone 8 : Microsoft Office Mobile - Excel (part 10) - Entering Formulas,AutoSumThe Windows Phone 8 screen has a limited amount of space, and sometimes working with a spreadsheet is easier if you hide columns that you don’t currently need.
-  Windows Phone 8 : Microsoft Office Mobile - Excel (part 9) - Sharing a Spreadsheet, Fitting and Hiding Text
-  Windows Phone 8 : Microsoft Office Mobile - Excel (part 8) - Accessing Charts and Sheets, Saving a Spreadsheet
-  Windows Phone 8 : Microsoft Office Mobile - Excel (part 7) - Undo and Redo, Charting
-  Windows Phone 8 : Microsoft Office Mobile - Excel (part 6) - Sorting a Column, Filtering
 
 
 
 
The Jaguar F-Type R Coupe – Wild Cat (Part 2)
The Jaguar F-Type R Coupe – Wild Cat (Part 2)We liked the drive in the F-Type Convertible, but the Coupe is 80 per cent stiffer and chassis rigidity is everything. The front and rear springs are a few percentage points stiffer to help deliver a more honed athlete and get the best from the steering. ...
-  The Jaguar F-Type R Coupe – Wild Cat (Part 1)
-  Review : NBA 2K15
-  Review : Alien: Isolation
-  The Lamborghini Huracan : Raging Bull goes to the ballet
 
 
 
 
 
Two Is Better Than One - WD My Cloud Mirror
Two Is Better Than One - WD My Cloud MirrorAs we have noted in our May issue, cloud storage is getting more popular. To capitalize on this and to offer users an alternative to services like Google Drive and Dropbox, Western Digital has its My Cloud series of personal cloud storage devices. And ...
-  Data In A Pinch - Kingston Mobile Lite Wireless G2
-  SQL Server 2012 : Policy Based Management - Evaluating Policies
-  SQL Server 2012 : Defining Policies (part 3) - Creating Policies
-  SQL Server 2012 : Defining Policies (part 2) - Conditions
 
 
 
 
Using Exchange Server 2010 Antispam Tools (part 6) - Sender Reputation
Using Exchange Server 2010 Antispam Tools (part 6) - Sender Reputation Sender reputation is the most promising feature of Exchange 2010 when it comes to reducing the amount of spam you receive. This is because much of the spam that is received today is sent by bot or zombie networks.
-  Using Exchange Server 2010 Antispam Tools (part 5) - Sender Filtering, Sender ID
-  Using Exchange Server 2010 Antispam Tools (part 4) - IP Block and Allow Lists, Recipient Filtering , Tarpitting
-  Using Exchange Server 2010 Antispam Tools (part 3) - IP Block and IP Allow Providers
-  Using Exchange Server 2010 Antispam Tools (part 2) - Content Filtering
 
 
 
 
Microsoft Exchange Server 2007 : Components of a Secure Messaging Environment (part 5) - Using Email Disclaimers
Email disclaimers are notices that are automatically appended to outgoing messages. These disclaimers are primarily intended to reduce liability, and to caution recipients not to misuse the information contained within.
-  Microsoft Exchange Server 2007 : Components of a Secure Messaging Environment (part 4) - Establishing a Corporate Email Policy, Securing Groups
-  Microsoft Exchange Server 2007 : Components of a Secure Messaging Environment (part 3) - Hardening Windows Server 2003 - Running SCW
-  Microsoft Exchange Server 2007 : Components of a Secure Messaging Environment (part 2) - Hardening Windows Server 2003 - Using the Microsoft Baseline Security Analyzer
-  Microsoft Exchange Server 2007 : Components of a Secure Messaging Environment (part 1) - Hardening Windows Server 2003 - Auditing Policies
-  Microsoft Exchange Server 2007 : Server and Transport-Level Security - Considering the Importance of Security in an Exchange Server 2007 Environment
-  Security and Windows 8: Keeping Your PC Safe (part 2) - Windows SmartScreen, Using Windows SmartScreen, Action Center Improvements