Imagine Cup – Information Technology Invitational

September 23, 2007 § Leave a comment

Welcome to the

Information Technology Invitational

The international competition event!

 

The IT Invitational highlights the art and science of developing, deploying, and maintaining IT systems that are efficient, functional, robust and secure. In most scenarios, IT professionals have a base set of tools and techniques, but still have to work through custom needs and configurations that require an intimate understanding of how all the pieces fit together. IT professionals also have to know how to manage, administer, monitor, and maintain the systems for ongoing network security and reliability. The IT invitational challenges students to demonstrate their proficiency in understanding not only the theory of how Microsoft Windows-based networks and applications work, but also how to keep them working.  This includes core file and print services, e-mail messaging, database systems, document collaboration and sharing, network virtualization, unified communications, and systems management.

More Details later and also on the link below:

http://imaginecup.com/Competition/mycompetitionportal.aspx?competitionId=14

It is possible, IMAGINE … Good things!

Isvet

Read Only Domain Controllers in Windows Server 2008

September 23, 2007 § Leave a comment

TechNet Briefing. In this session we will be discussing Windows Server 2008 and Active Directory Domain Services. We will talk about the Directory Services and how it ties in with areas such as Security and Manageability.

Event: Level 200

The new Windows Server 2008 includes a new set of features such as the Role of a Read Only Domain Controller (RODC). This new feature will become very use full at Remote Branch Offices where little security is available. Some of the benefits RODC offers are:

Unidirectional Replication Because no changes are written directly to the RODC and therefore do not originate locally, writable domain controllers that are replication partners do not have to pull changes from the RODC.

Credential Caching Credential caching is the storage of user or computer credentials. Credentials consist of a small set of approximately 10 passwords that are associated with security principals.

Follow the updated Link for more info on this subject:

http://technet2.microsoft.com/windowsserver2008/en/library/ce82863f-9303-444f-9bb3-ecaf649bd3dd1033.mspx?mfr=true

Good things,

Isvet

Security Features in Windows Vista by Isvet Laclaustra

September 23, 2007 § Leave a comment

TechNet Briefing. In this session, we will discuss many of the innovative design philosophies and development strategies involved in making Windows Vista the most secure Windows operating system to date. One way that this security has been achieved is through service hardening. This means that most services run with low privilege to minimize resource access. Vista introduces several user-level security features within the Windows interface as well as additional enhancements to Internet Explorer including anti-spyware and anti-phishing capabilities. The Windows Firewall has also undergone significant improvements, including enhanced UI functionality, inbound and outbound filtering, filtering by application, and full support for IPv6. We’ll also talk about some of the other security enhancements available in Windows Vista, such as BitLock, data protection, and improved smartcard support.

Follow the link below and see the content of this session:

TechNet Webcast: Windows Vista Deployment Overview (Level 200)

Stay tuned!

Report Builder SQL Server 2005 by Isvet Laclaustra

September 23, 2007 § Leave a comment

TechNet Briefing. In this session, we will learn how Microsoft SQL Server 2005 Reporting Services is meeting the demand for end-user, ad hoc reporting. Report Builder, the latest addition to SQL Server 2005 Reporting Services, enables sophisticated self-service reporting and data exploration scenarios.

In this session will present the architecture behind Report Builder, demonstrate the capabilities of the Report Builder client, and show how you can easily build business data models for end users.

Follow the link below for the Presentation material of this presentation:

TechNet Webcast: SQL Server 2005 for the IT Professional (Part 1 of 11): A Fast-Paced Feature Overview and Series Introduction (Level 200)

Any questions fell free to write me.

Good Things!

What is SBS 2003 R2 and how can we Benefit from IT ?-

September 23, 2007 § Leave a comment

"Windows Small Business Server 2003 R2

Windows Small Business Server 2003 R2 (SBS 2003 R2) is an upgrade release to the award-winning SBS 2003 product. It provides enhancements to the core product technologies integrated into SBS 2003 and adds new features to address the growing needs of small businesses. As with SBS 2003, the new release is available in Standard and Premium Editions. Imagine having all the major productivity applications / servers from Microsoft available to you at a very low price. Yes, Enterprise IT Technology such as SQL Server, Exchange, ISA, and more in SERVER 2003 R2.

SBS 2003 R2 Standard Edition offers increased productivity and functionality with automated network-wide patch and update management, increased mailbox limits to 75 GB, and expanded client access license (CAL) rights. SBS 2003 R2 Premium Edition will include the features and functionality of SBS 2003 R2 Standard Edition in addition to providing improved database and firewall technologies, as well as tools for developing Web pages and Web server applications

Security at the Document Level with Rights Management Service (RMS)

September 23, 2007 § Leave a comment

Windows Server2003 and 2008

RMS : Microsoft Windows Rights Management Services (RMS) for Windows Server 2003 and 2008 is information protection technology that works with RMS-enabled applications to help safeguard digital information from unauthorized use.

RMS augments an organization’s security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it goes. Organizations can use RMS to help prevent sensitive information—such as financial reports, product specifications, customer data, and confidential e-mail messages—from intentionally or accidentally getting into the wrong hands.

One of the touchstones of trustworthy computing is the availability of technology that can reliably protect content and help keep digital information private. RMS represents a milestone in this regard, offering a new kind of protection for vital information. Microsoft will continue to invest in this important field and work to develop simple ways to help protect sensitive information. Microsoft envisions strong business-to-business and business-to-consumer scenarios that will provide better privacy, security and confidentiality for all customers.

More Details later…Good Things,

Isvet

Telnet is Available on Windows VISTA

September 17, 2007 § 1 Comment

Yes,

Telnet is available in Windows VISTA. All you need to do is TURN ON the feature in jus follow these steps:

  1. Start

  2. Control Panel

  3. Programs & Features

  4. Turn Windows features on or off

  5. Select the TELNET CLIENT

    You are set!

 

Hope it helps!

Software Estimation Techniques – Reschedule Date

September 17, 2007 § Leave a comment

Por razones ajenas a nuestra voluntad, la charla "Software Estimation Techniques" del PRdotNet pautada para el 18/Septiembre se moverá a otra fecha, pero muy pronto.  La nueva fecha hará posible, para beneficio de los asistentes, poder obtener un libro.  Pronto les estaremos comunicando los detalles de la nueva fecha y del libro.  Gracias por su  comprensión y disculpen los inconvenientes que esto les pueda causar.

Cordialmente,

PRdotNet
…para entusiastas de .NET

Software Estimation Techniques for Mature Developers

September 13, 2007 § 1 Comment

El Puerto Rico .NET User Group les invita a su próxima charla el 18 de Sept @ 5:30pm en Microsoft (Metro Office Park).

   

Software estimation techniques for mature developers:

  • How to estimate correctly
  • Tricks to succeed
  • Traps to avoid
  • Field Recommendations

Para más información, visite: http://www.prdotnet.org/

 Cosas buenas,

Longhorn Server / Windows Server 2008

September 9, 2007 § Leave a comment

Windows Longhorn Server (Windows 2008 RTM name) will provide support for the following features on RODC ( Read Only Domain Controllers):

Features under investigation

  • RODC GC with support for Outlook clients
  • RODC protection for highly sensitive credential attributes
  • Eliminate Windows Server "Longhorn" PDC FSMO requirement
  • Support for reckless handling of RODC Virtual Server images
  • LDAP Write chaining on RODC

Where Am I?

You are currently viewing the archives for September, 2007 at Isvet_JR.