IT tutorials
 
Technology
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 12 of 56, items 331 to 360 of 1656.
Microsoft Exchange Server 2013 : Site mailboxes (part 2) - How site mailboxes work - Synchronization between Exchange and SharePoint
Exchange synchronizes with SharePoint by using the SharePoint REST API to fetch the metadata used to display information about documents stored in the site mailbox, including document title, author, last modified date, checked-out status, and the user who last modified the item.
Microsoft Exchange Server 2013 : Site mailboxes (part 1) - How site mailboxes work
SharePoint communicates with Exchange using EWS, which means that you must download and install EWS on your SharePoint servers. It is important for a matching version of EWS to be installed on the SharePoint servers so they can communicate with the mailbox servers.
Microsoft Exchange Server 2013 : Migration to modern public folders
Migrations tend to be complex affairs. Migration from old-style to modern public folders is unlikely to be simple for many organizations, especially when the hierarchy is large.
Microsoft Exchange Server 2013 : Migration to modern public folders
Migrations tend to be complex affairs. Migration from old-style to modern public folders is unlikely to be simple for many organizations, especially when the hierarchy is large.
Windows 8 : Using Secure Boot and SmartScreen Filter
Working with security on a modern computer begins at startup, and Windows 8 has incorporated the Secure Boot feature to enable firmware to validate certificates used by the operating system.
Windows 8 : Configuring network discovery and wireless security (part 2)
Wireless networks are everywhere, and nearly every device is capable of wireless connection. This makes it easy to connect anywhere. With this always-on availability for numerous devices come security considerations about joining a computer to a particular network.
Windows 8 : Configuring network discovery and wireless security (part 1) - Creating network discovery profiles
The technology used to allow network discovery has the potential for misuse and should be carefully considered before the technology is used.
Sharepoint 2013 : Search for People (in SharePoint Server)
You might want to find the contact details of people who work with you in the organization. You might need to know someone’s phone number, department, manager, and so on.
Sharepoint 2013 : Use the Advanced Search (in SharePoint Server)
Sometimes when you want to search for a document or a list item, you don’t want to use free text to search on the content of the document or the list item.
Sharepoint 2013 : Search Using the Search Center
When you are using a SharePoint site that is hosted on a server that has SharePoint Server installed, the search options are different and more versatile than if you have just SPF installed.
Sharepoint 2013 : Search for Documents and List Items
You want to find a piece of content that exists in your corporate network, but you’re not sure where in the network it is. It might be a document stored in SharePoint or in a file share, or a list item in SharePoint or in an application database.
Windows Server 2008 R2 : Planning for Active Directory (part 3) - Global Catalog servers
Global Catalog (GC) servers are DCs assigned to host additional information about the forest. A typical DC contains details about the domain in which it resides, however, GC servers contain additional information about every domain in the forest.
Windows Server 2008 R2 : Planning for Active Directory (part 2) - Planning for Active Directory sites and replication
You will need to consider sites and replication strategies as part of your AD deployment. AD is a multimaster database, meaning every DC has a local copy of the database and the ability to make changes to it.
Windows Server 2008 R2 : Planning for Active Directory (part 1) - Planning for Active Directory forest and domains
During the early stages of your AD planning, you need to consider how many forests and domains will be needed to support your network. To properly plan your forests and domains, you need a clear understanding of each of them and how they apply to an AD deployment.
Windows Server 2008 R2 : What is New in Active Directory (part 3) - Active Directory Best Practices Analyzer
AD now includes a best practices analyzer (BPA). BPAs for other Microsoft products have been around for several years. The most popular of these is the Exchange Server BPA. BPAs do exactly as their name implies.
Windows Server 2008 R2 : What is New in Active Directory (part 2) - Offline Domain Join
Offline Domain Join is a new feature in Windows Server 2008 R2 and Windows 7 that allows you to join a computer to an AD domain without having connectivity to a DC.
Windows Server 2008 R2 : What is New in Active Directory (part 1) - Active Directory Recycle Bin
AD now includes an undelete option known as the Recycle Bin. The AD Recycle Bin acts a lot like the Windows recycle bin we are all very familiar with. The AD Recycle Bin stores objects for 180 days (by default) after they are deleted from AD.
Sharepoint 2010 : Building a .NET Connectivity Assembly (part 5) - Define Entity Metadata
Before we redeploy our assembly, we need to make another important change. Even though we’ve updated the metadata to use the WebResult object as our Entity class, we haven’t added metadata defining the properties of the WebResult object.
Sharepoint 2010 : Building a .NET Connectivity Assembly (part 4) - Create a Custom Entity Object
One of the things you may notice when reviewing the properties of the WebResult External Content Type in SharePoint Designer is that no fields are defined. Of course, there is a perfectly reasonable explanation for this.
Sharepoint 2010 : Building a .NET Connectivity Assembly (part 3) - Define a Method to Support the SpecificFinder Stereotype
The SharePoint server that’s used as the target for deployments can be changed by clicking the Project node in Solution Explorer and changing the Site URL property in the Properties pane.
Sharepoint 2010 : Building a .NET Connectivity Assembly (part 2) - Create a Custom Entity Service Object, Define a Method to Support the Finder Stereotype
These relationships and their representation in the design tools can cause some confusion at first glance. In the Entity View, it appears as though the methods are defined on the entity object. In fact, the methods are declared as static methods on the Entity Service object.
Sharepoint 2010 : Building a .NET Connectivity Assembly (part 1) - Business Data Connectivity Model Project
From our demonstration scenario, we require the functionality to attach product information retrieved from Internet search results to our competitive analysis reports.
Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 5) - Configuring outbound rules, Configuring connection security rules
Outbound rules prevent certain applications or local ports from sending data out of the computer. For example, if a computer in an environment should not be allowed to access the Internet, outbound access on port 80 (and other ports) could be disabled to ensure that this computer does not connect to the Internet.
Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 4) - Allowing the secure connection
One of the actions that can be specified when creating a new inbound rule is Allow The Connection If It Is Secure (see Figure 5). This option is useful when an incoming connection needs to be authenticated before it can be allowed.
Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 3) - Configuring IPsec settings
In addition to the profiles, there is a tab for IPsec Settings in the Properties dialog box, as shown in Figure 3. Internet Protocol Security (IPsec) ensures that communication between two points on a network is secured.
Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 2) - Modifying a firewall profile
In Windows Firewall with Advanced Security, a profile is the network type to which the settings apply. Profiles enable the firewall to behave differently, depending on the type of network to which the computer connects.
Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 1) - Choosing Windows Firewall
The general purpose of a firewall is to stop traffic from accessing computers on a private network or computer system. Windows 8 supports two firewall applications, Windows Firewall and Windows Firewall with Advanced Security.
Exchange Server 2010 : Interoperability with Earlier Versions of Exchange
The interoperability and transition story for Exchange Server 2010 Client Access servers is a little different from the transition story from Exchange Server 2003 to Exchange Server 2007.
Exchange Server 2010 : Positioning the Client Access Server in Your LAN (part 2) - Client Redirection, Client Access Arrays
Redirection occurs when you set up multiple Internet-facing Client Access servers in different Active Directory sites. If a user connects to a CAS that is not in the same site as their mailbox, and if there is an Internet-facing CAS that is in the same site as the user's mailbox, the user will be redirected to the Internet-facing CAS in the site that their mailbox is in.
Exchange Server 2010 : Positioning the Client Access Server in Your LAN (part 1) - Client Access Server Proxying
At this point, the CAS in Baltimore (CAS-1) will determine if an external URL is configured for the CAS in Honolulu (CAS-2). If not, CAS-1 will contact CAS-2 and then proxy Nora's request to it. CAS-2 gets the info from Nora's Mailbox server and passes it back to CAS-1.
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us