Microsoft has released a set of six printable posters which provides an overview of the capabilities, architecture, configurations etc of BizTalk Server 2010. These Posters are now available for download from the Microsoft Download Center.
Windows SteadyState is a useful tool for shared-computer access; however, it supports 32-bit versions of Windows XP and Windows Vista only. It does not support Windows 7. It helps defend shared computers from unauthorized changes and restricts users from changing [...]
I accidentally stumbled upon these two lesser known Windows eBooks from Microsoft. One a Windows 7 Tips & Tricks eBook, focused towards Government organizations, and the other The Windows Optimized Desktop E-Book for Government. Both appear to have been released [...]
Microsoft has released a set of documents which enumerate the Accessibility features in its major Microsoft products like Windows 7, Windows Vista, Windows XP, Microsoft Office 2010, Office 2007, Office 2003, Internet Explorer 8, IE 7 & IE 6. Computer [...]
A Tag is a high-capacity color barcode (HCCB) with encoded information. Organizations and individuals can create specific Tags by using the Microsoft Tag Manager Web service. When the Microsoft Tag Reader application is installed on a mobile device, the Tag [...]
Vulnerabilities are weaknesses in software that enable an attacker to compromise the integrity, availability, or confidentiality of that software. Microsoft uses a process to investigate and release security updates that address vulnerabilities in the software it produces.
You may have seen the trailer of The Social Network, a movie based on the founding of Facebook and you may have seen the previews of Office 2010 – The Movie, but now its time to enjoy some Learning Snacks! [...]
Microsoft today announced the launching a new Internet Explorer blog as part of the Windows family of blogs that will cover a broad range of industry and business topics to complement the existing Internet Explorer Engineering blog.
This VHD Guide from Microsoft describes the scenarios that guided the development of this feature, detailed steps about how to employ the functionality, including image creation, deployment, and maintenance, and the associated tools, scripts, and APIs, you use to create [...]
Microsoft has released it Security Intelligence Report with a focus on the second half of 2009. Microsoft Security Intelligence Report provides in-depth perspectives on malicious and potentially unwanted software, software exploits, security breaches, and software vulnerabilities in both Microsoft and [...]
Microsoft has released a quick-reference guide to commonly-used Windows PowerShell Script commands. Windows PowerShell Scripting Guide This guide provides a quick reference on how to read a text file, write conditional statements, write a text file, write for and for [...]