Desktop
Installing and Configuring Windows Server 2008 R2 : Administration basics (part 2) - Windows Server 2008 R2 administration tools
Installing and Configuring Windows Server 2008 R2 : Administration basics (part 2) - Windows Server 2008 R2 administration toolsYou will be introduced to various Windows Server 2008 R2 administrative tools. However, there are some key tools you should familiarize yourself with ...
-  Installing and Configuring Windows Server 2008 R2 : Administration basics (part 1) - Microsoft Management Console 101, Overview of Server Manager
-  Installing and Configuring Windows Server 2008 R2 : Automating the installation process - Installing and configuring WDS
 
Website
Microsoft SharePoint 2010 : InfoPath Forms Services - Responding to Events in InfoPath Forms (part 2) - Adding Code-Behind
Microsoft SharePoint 2010 : InfoPath Forms Services - Responding to Events in InfoPath Forms (part 2) - Adding Code-Behind You may have noticed in our demonstration form that no matter what is entered in the Company Name field, all companies are returned each time the Find ...
-  Microsoft SharePoint 2010 : InfoPath Forms Services - Responding to Events in InfoPath Forms (part 1) - Using the Rules Engine
-  Microsoft SharePoint 2010 : InfoPath Forms Services - Accessing Data in InfoPath Forms (part 2) - Data Connection Libraries, Modifying UDC Files
 
 
Windows Phone 8 : Microsoft Office Mobile - Excel (part 10) - Entering Formulas,AutoSum
Windows Phone 8 : Microsoft Office Mobile - Excel (part 10) - Entering Formulas,AutoSumThe Windows Phone 8 screen has a limited amount of space, and sometimes working with a spreadsheet is easier if you hide columns that you don’t currently need.
-  Windows Phone 8 : Microsoft Office Mobile - Excel (part 9) - Sharing a Spreadsheet, Fitting and Hiding Text
-  Windows Phone 8 : Microsoft Office Mobile - Excel (part 8) - Accessing Charts and Sheets, Saving a Spreadsheet
-  Windows Phone 8 : Microsoft Office Mobile - Excel (part 7) - Undo and Redo, Charting
-  Windows Phone 8 : Microsoft Office Mobile - Excel (part 6) - Sorting a Column, Filtering
 
 
 
 
The Jaguar F-Type R Coupe – Wild Cat (Part 2)
The Jaguar F-Type R Coupe – Wild Cat (Part 2)We liked the drive in the F-Type Convertible, but the Coupe is 80 per cent stiffer and chassis rigidity is everything. The front and rear springs are a few percentage points stiffer to help deliver a more honed athlete and get the best from the steering. ...
-  The Jaguar F-Type R Coupe – Wild Cat (Part 1)
-  Review : NBA 2K15
-  Review : Alien: Isolation
-  The Lamborghini Huracan : Raging Bull goes to the ballet
 
 
 
 
 
Two Is Better Than One - WD My Cloud Mirror
Two Is Better Than One - WD My Cloud MirrorAs we have noted in our May issue, cloud storage is getting more popular. To capitalize on this and to offer users an alternative to services like Google Drive and Dropbox, Western Digital has its My Cloud series of personal cloud storage devices. And ...
-  Data In A Pinch - Kingston Mobile Lite Wireless G2
-  SQL Server 2012 : Policy Based Management - Evaluating Policies
-  SQL Server 2012 : Defining Policies (part 3) - Creating Policies
-  SQL Server 2012 : Defining Policies (part 2) - Conditions
 
 
 
 
Using Exchange Server 2010 Antispam Tools (part 6) - Sender Reputation
Using Exchange Server 2010 Antispam Tools (part 6) - Sender Reputation Sender reputation is the most promising feature of Exchange 2010 when it comes to reducing the amount of spam you receive. This is because much of the spam that is received today is sent by bot or zombie networks.
-  Using Exchange Server 2010 Antispam Tools (part 5) - Sender Filtering, Sender ID
-  Using Exchange Server 2010 Antispam Tools (part 4) - IP Block and Allow Lists, Recipient Filtering , Tarpitting
-  Using Exchange Server 2010 Antispam Tools (part 3) - IP Block and IP Allow Providers
-  Using Exchange Server 2010 Antispam Tools (part 2) - Content Filtering
 
 
 
 
Netgear EX6200 AC1200 Wi-fi Range Extender
Netgear EX6200 AC1200 Wi-fi Range ExtenderI love getting equipment from Netgear, because it's covered in that lovely low-tack plastic protective film that compulsive/obsessives like me find so therapeutic to remove. Whatever is underneath looks great until dust inevitably heads towards it.
-  Windows 8 : Managing BitLocker and other policy-based mobility tools (part 5) - Configuring offline file synchronization, Configuring policy settings for device power
-  Windows 8 : Managing BitLocker and other policy-based mobility tools (part 4) - Configuring policy settings for offline files
-  Windows 8 : Managing BitLocker and other policy-based mobility tools (part 3) - Managing BitLocker at the command line
-  Windows 8 : Managing BitLocker and other policy-based mobility tools (part 2) - Managing BitLocker at the command line
-  Windows 8 : Managing BitLocker and other policy-based mobility tools (part 1) - Configuring BitLocker policies
-  Connecting Us TP-LINK TL-PA6010 Test