Fwd: "How do I? videos" - Check these NOW and get answers to your Technical queries !!!

1 view
Skip to first unread message

Mrinal Kapoor

unread,
Nov 30, 2009, 1:43:59 PM11/30/09
to Skynet


---------- Forwarded message ----------
From: Microsoft <Micr...@newsletters.microsoft.com>
Date: Mon, Nov 30, 2009 at 6:36 PM
Subject: "How do I? videos" - Check these NOW and get answers to your Technical queries !!!
To: mrina...@gmail.com


Sign up for other newsletters | Unsubscribe | Update your profile
Volume: 1, Issue: 8, November 30, 2009A Fortnightly Magazine for IT Professionals
Dear Friends,

The response towards Microsoft's new efficiency products has been remarkable in the industry and it gets further strengthened with the exciting response coming from the community. Going with the launch momentum, the latest beta versions of Microsoft Office Professional Plus 2010 and SharePoint Server 2010 too are now available. Do not forget to visit TechNet.in to download these trial versions.

If you are looking for easy guidance to accomplish specific tasks with Microsoft products, do check Microsoft "How Do I?" Videos on the TechNet website. While you read through this edition to view the latest videos on SQL Server, Security, Windows Server, Exchange and SharePoint, subscribe to RSS feed to stay informed about new videos in future.

The TechNet webcast series for IT Professionals cover topics on a holistic range of products and technologies by Microsoft. You have the opportunity to get answers to all your questions from the experts. Check it out

Besides the latest from TechNet.in, this edition also features Expert Insights on new technologies and products. In below sections, Sanjay Bahl, Chief Security Officer at Microsoft India, talks about tackling Security in cloud computing environment and Jaideep Sen, Senior Manager - Datacenter Management, Security & Virtualization at Microsoft India shares how Virtualisation is making waves in the technology arena.

Also, do read expert views of Vijay Raj - our IT Pro Star, on how to handle Operating Systems. Vijay Raj is an MVP and a Springboard Series Technical Expert Panel member for Windows 7.

Happy reading!

Reshma Sinha Roy
IT Pro Audience Marketing Manager
Microsoft Corporation (India) Pvt. Ltd.
res...@microsoft.com
  Top News
  Products & Technologies
  IT Pro Resources
  Get Started
  Get Involved
  Stay Current
 
Share with friends
 
By Sanjay Bahl, Chief Security Officer, Microsoft India

You might be hearing a lot about something called "cloud computing." The term refers to computing capabilities provided to organizations that operate over the Internet. Businesses and governments are using "the cloud" to provide more and more services as it allows for greater flexibility, efficiency and lower costs.

"Client and cloud" is a term that describes a paradigm of computing that is currently seeing a great deal of interest in the IT industry. Enterprises can rent computing resources as a utility and use those resources to make services available to client applications over the Internet. Some characteristics of this paradigm are significant from a security perspective:
A third party manages the computing resources that host the cloud-based applications
Cloud services often store data on behalf of the client application
The client application is not necessarily a web browser, but could be a rich client or business system

An enterprise that is planning to use "client and cloud" computing must concern itself with the security of two major elements of the cloud environment. The first is the security of the third-party cloud platform. The other is the security of the business applications that the enterprise is hosting "in the cloud." The security of the cloud platform depends on the security of the software that is used to implement the cloud platform and on the operational security that is applied by the third party that is providing the cloud platform.

Whether data or software sits on an organization's own computers or on a cloud service provider's computers, online services like web-hosted e-mail, document sharing sites and social networking will operate in the same way they do today. Therefore, you should ask the same kind of questions about the privacy of your data and personal information in the cloud environment that you would ask of any online service provider.

Security and Privacy Fundamentals - As the computing industry evolves, Microsoft continues to invest in security and privacy fundamentals and ensures its innovative software development processes, best practices and technologies extend from Client to Cloud environments.

Improving Security through Community Collaboration - Through continued community collaboration, Microsoft supports a wide-range of industry partners by developing secure products and services and offering its security best practices. The release of Security Development Lifecycle (SDL) for Agile and the cloud security highlights Microsoft's continued efforts to meet the changing needs of the development community and ultimately will help create a more trusted online computing experience.

Agile is an increasingly widely adopted methodology, for client and cloud. Increasingly Microsoft and non-Microsoft development teams have begun using the Agile methodology - and we have been thinking about how SDL concepts can evolve to apply to these methods.

The SDL for Agile Development guidance defines a way to embrace software security practices when using lightweight Agile software development methods, such as Extreme Programming (XP) and Scrum. The document combines the proven Microsoft SDL techniques, tools and processes with Agile methodologies in a way that maintains the principles of both the Agile methods and the SDL process.
Microsoft implemented the first version of the SDL in 2004 and has continued to invest and evolve SDL to produce products that demonstrate solid improvement. Windows Vista was the first version of the Microsoft Operating System to be fully developed under the SDL. With the benefit of the SDL, Windows Vista users had half (66 vs 119) as many vulnerabilities in the first year. This trend has continued, with Windows XP users experiencing 31% (244 vs 186) more vulnerabilities since release, as compared with those that chose to upgrade to Windows Vista. (Source: Internal Microsoft bulletin data tool)
SQL Server 2005 was the first version of the Microsoft product to be fully developed with the SDL. Thirty-six months after its release, SQL Server 2005 contained three vulnerabilities compared to the 34 vulnerabilities found in SQL Server 2000, resulting in a 91% reduction in total vulnerabilities. (Source: Jeff Jones Microsoft TechNet Security Blog)
Internet Explorer 7 was the first version of the Microsoft Web browser to be fully developed with the SDL. In the first year of its release, IE7 contained 17 vulnerabilities (3 high/14 medium) compared to the 26 vulnerabilities (8 high/18 medium) found in IE6, resulting in a 35% reduction in total vulnerabilities and a 63% decrease in high severity vulnerabilities. (Source: Browser Vulnerability Analysis of Internet Explorer and Firefox Report)

The NSS Labs has published Web Browser Security - Socially Engineered Malware Protection Comparative Results (comparing Apple Safari 4, Google Chrome 2, Microsoft Windows Internet Explorer 8, Mozilla Firefox 3 and Opera 10 Beta). Internet Explorer 8 had exceptional scores thereby confirming that the investments that we are doing in software, including the SDL, is helping us provide you with secure and reliable software and also improve productivity & communication. Internet Explorer 8 caught 81% of the live threats, an exceptional score which surpassed the next best browser (Firefox 3) by a 54% margin. Windows Internet Explorer 8 improved 12% between Q1 and Q2 tests, evidence of concerted efforts Microsoft is making in the SmartScreen technology.

Application security vendor Cenzic has released its security trends report for the first half of 2009 application. In it, Cenzic claims that the Mozilla's Firefox browser led the field of web browsers in terms of total vulnerabilities. According to Cenzic, Firefox accounted for 44 percent of all browser vulnerabilities reported in the first half of 2009. In contrast, Apple's Safari had 35 percent of all reported browser vulnerability, Microsoft's Internet Explorer was third at 15 percent and Opera had just six percent share.
By Jaideep Sen, Senior Manager- Datacenter Management, Security and Virtualization, Microsoft India

Virtualization has emerged as one of the most critical and disruptive IT waves with wide reaching implications for the IT Industry. Analysts too have acknowledged the wide-scale requirement and opportunity that virtualization technology presents. This is creating a shift from traditional Datacenters to Consolidated Datacenters and Infrastructure as a service on the cloud.

A server typically utilizes a mere 15% of its full capacity at any given time. While all resources of a server may be occasionally required to run the application it supports - it remains unutilized for the majority of time and keeps guzzling precious power. This leads to immense wastage of resources. This is where virtualization steps in. Virtualization drives consolidation i.e. the capability to create multiple virtual servers on a single hardware machine, thereby drastically improving resource utilization. The top benefits of virtualization can be summarized as follows:

Reduced TCO: Power and physical space reduction, accelerated server provisions / consolidation, quick ROI
Increased availability: Simplified backup and recovery, business continuity built-into model, dynamic provisioning
Enabling dynamic IT: Transformation of physical IT infrastructure into logical layers with policy based management that enables self managing dynamic systems

Microsoft believes that only a holistic approach will help organizations stay competitive in today's dynamic, global and connected world. As a key differentiator in the market landscape, Microsoft's strategy addresses the end-to-end virtualization scenario rather than providing point in time solutions. This approach talks about "Virtualization from the Datacenter to desktop" and brings a huge differentiator of being able to manage both virtual and physical resources from a single pane of glass. We also offer tools like the ROI Calculator and MAPS tool that will give a good view to customers on their AS IS and TO BE State and is a good aid as you embark on your Virtualization journey.

Check out some press stories on the success of Virtualization:

Cutting costs through Virtualization

Network Computing reported a case study of KPIT
KPIT was wary of virtualization till it tried Microsoft's Hyper V and today, by using virtualization the firm has improved server utilization from 25% to 75%
"We have observed that there is a direct saving of 30% related to power. In terms of server budgets, 60% of new server budgets were saved as these servers were moved to the virtualized environment. Another 25 to 30% savings were observed in charges related to AMC."
Mandar Marulkar - Head of Technology and Infrastructure, KPIT
 
............................................................................................................................................................
Virtualized infrastructure brings out cost savings
Express Computer reported a case study of Mphasis
Microsoft Hyper-V and SCVMM have helped Mphasis consolidate from 145 to 14 servers saving $500,000 in CAPEX while offering tighter control on infrastructure management.
"Having experienced the benefits of virtualization, going forward Mphasis plans to virtualize all its critical applications"
Arvind Joshi - Group Chief information officer, Mphasis
 
............................................................................................................................................................
Reliance Communications launches 'Cloud Computing' solutions in India on Microsoft Platform
In a move that combines the power of virtualization technology and cloud computing, Reliance Data Center, a part of Reliance Communications, announced the launch of "Reliance Cloud Computing Services" - hosted infrastructure service for its customers, based on the Microsoft platform.

Click to read the complete story: SIFY  CIOL  HBL
 
Lets view IT professionals sharing their thoughts on the Efficiency Products:
 
Evaluate Microsoft Exchange Server 2010
 Test out the new release of Exchange Server, and don't forget to check out the new Exchange Server TechCenter, which features new resources for Exchange Server 2010.
 
Download the SQL Server 2008 R2 November Community Technology Preview
 SQL Server 2008 R2 delivers several capabilities that will enable your organization to scale database operations, improve IT and developer efficiency, and enable highly scalable and well-managed business intelligence on a self-service basis for your users.
 
Windows Server 2008 R2:  A Primer
 Take a guided tour through the new and enhanced features of Windows Server 2008 R2. Important stops along the way include Windows PowerShell cmdlets, tools for remote management, core parking options for processors, Active Directory changes, and branch caching.
 
Free Microsoft IT Environment Health Scanner Available Now
 Ensure your IT environment is healthy and up-to-date before you migrate. Designed for administrators of small or medium-sized networks, this tool takes a few minutes to scan your IT environment, perform more than 100 separate checks, and collect and analyze information.
 
Download the New SDL Developer Starter Kit
 Educate yourself and your organization on how to build more secure applications. The SDL Developer Starter Kit offers content, labs, and training to help you establish a standardized approach to roll out the Microsoft Security Development Lifecycle (SDL) in your organization.
 
Latest Security Intelligence Report Shows Resurgence in Worm Attacks
 Review the latest Security Intelligence Report (SIRv7) to find deeper analysis and recommendations based on data input from over 450 million computers worldwide to help you successfully plan and manage protection technologies.
 
Download IIS Application Request Routing (ARR) 2.0
 IIS Application Request Routing (ARR 2.0) is an extension for IIS that enables Web server administrators, hosting providers, and content delivery network (CDN) providers to increase Web application scalability and reliability through rule-based routing, client and host name affinity, load balancing of HTTP server requests, and distributed disk caching.
Download Microsoft Forefront Threat Management Gateway 2010 RC
Microsoft Forefront Threat Management Gateway 2010 (TMG) provides multiple layers of continuously updated protections - including URL filtering, anti-malware inspection, intrusion prevention, application- and network-layer firewall, and HTTP/HTTPS inspection - that are integrated into a unified, easy-to-manage gateway.
Evaluate Forefront Protection 2010 for Exchange Server
Microsoft Forefront Protection 2010 for Exchange Server is now available for testing, and you'll find new resources on the Forefront Protection 2010 for Exchange Server home page. Forefront Protection 2010 for Exchange Server provides fast and effective protection against malware and spam by including multiple scanning engines from industry-leading security partners.
Download the Windows 7 Enterprise 90-day Trial
Begin testing your organization's software and hardware by downloading the Windows 7 Enterprise 90-day Evaluation. Designed just for IT Pros, this limited-time trial offer lets you begin developing your organization's best practices for configuration and deployment.
 
Hey Scripting Guy
Hey, Scripting Guy! How Can I Use Profiles with Windows PowerShell?
Hey, Scripting Guy! Quick-Hits Friday: The Scripting Guys Respond to a Bunch of Questions (11/20/09)
Hey, Scripting Guy! How Can I Quickly Check Stocks with Windows PowerShell?
Hey, Scripting Guy! How Can I Use a Web Service to Find Weather for a Specific City?
See More Scripting Tips
 
Microsoft Deployment Toolkit 2010
Download the Infrastructure Planning and Design (IPD) Guide for DirectAccess
Inside SharePoint: Protect SharePoint Data
A Peek at MSRT November Threat Reports
Get the Microsoft Assessment and Planning Toolkit for PC Security
 
Microsoft Office Performance Point Server 2007: Dashboard End to End
Microsoft Office Performance Point Server 2007: Excel Dashboards
Microsoft Office Performance Point Server 2007: SharePoint List Dashboards
Use Terminal Services to Manage Hyper-V from an Older Version of Windows
7 Best Practices for Physical Servers Hosting Hyper-V Roles
Install Hyper-V on Windows Server 2008
 
Windows7 Hardware Compatibility
Graphics Card Compatibility Question
No Bluetooth device
USB 2.0 problem
Join the nearest IT Pro User group!
Mumbai Group
Pune Group
Delhi Group
Siliguri Group
Chennai Group
Hyderabad Group
Kolkata Group

Read the blog >>
InterOp on Windows Azure
Download the Microsoft Office Professional Plus 2010 Beta 
Evaluate the SharePoint Server Enterprise 2010 Beta 
Microsoft VDI Part I: Server-Side Configuration (Video)
 
Vijay works at Texas Instruments focusing on Application Setup and Deployment. He is an MVP and a Springboard Series Technical Expert Panel member for Windows 7.  He is also a part of the core team at BDotnet and BITPro User Groups. Apart from being passionate about technology evangelism, he loves music. He is also a big fan of Mark Russinovich, A R Rahman and Sachin Tendulkar. His online address is www.vijayraj.info. To subscribe to his technical blog Msigeek, Visit - http://feeds.feedburner.com/msigeek

Vijay shares his valuable knowledge on operating systems with us

"We all have this question in our mind - Why does my application break when we change the Operating Systems?
Typically, whenever a new operating system is released, Microsoft makes every effort to ensure application compatibility. Unfortunately, as an operating system evolves and when reliability, security and performance improvements are made, there are some compromises which are made that ends up breaking some applications. Thankfully, when the changes are decided to be made, there is some mitigation planned to address the applications which are broken. Hence, Application Compatibility is the most important and  is at the top of everybody's mind." 

This series of posts covers information on how the core changes of Windows 7 will affect the applications. Also, it covers some basic methods to mitigate these issues from the viewpoint of Developers, IT Pros and end-users.  You can follow the blog or refer to TechNet for more insights on Application Compatibility.
Part 1: How do you fix the OS Version Number Issues?
Part 2: How do you Fix Browser Compatibility Issues?
Part 3: Demystifying the Windows 7 Virtual XP Mode
Part 4: Session 0 Isolation and Secure Desktop
Part 5: Libraries, UAC, WRP and other Core Changes
The Microsoft Security Intelligence Report (SIR) provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows computers, and some of the busiest online services on the Internet, this report also provides a detailed analysis of the threat landscape and the changing face of threats and countermeasures and includes updated data on privacy and breach notifications. The seventh volume of this report focuses on the first half of 2009 and is now available. Click here to download the report
Learn more about Microsoft products such as SQL Server, Security, Windows Server, Exchange and SharePoint with these "How Do I?" videos. TechNet has assembled these short videos for customers to learn how to accomplish specific tasks with Microsoft products: step-by-step. Subscribe to the TechNet videos RSS feed to learn about new videos.
"Hyper - V, AD and Identity Management, Integrated best practice analyser are good in Windows Server 2008 R2"

Sachin Kumar
Systems Engineer
New Delhi

.....................................
"Many features are new and navigation is also easy in this version of Windows Server 2008 R2"

Vishal Choudary
Helpdesk Support
Chandigarh

.....................................
"Hyper-V seems to be a cool feature in Windows Server 2008 R2. ADS published as a service is really cool"

Renjith A
Senior Manager - Networks Thiruvananthapuram

.....................................
"Resource monitor, Event VWR, IIS7.5, Hyper V, Recycle bin for AD are cool in Windows Server 2008 R2"
A. Prakash
Infrastructure Architect
Chennai
.....................................
"Windows 7 is easy to use, time saving, data security and user friendly."
M Mary Divya
Senior Executive - Systems Coimbatore
.....................................
"Features like Aero, Peek , Library, Restore Version are good in Windows 7"
Madhu Gorle
Staff Engineer - QA
Bangalore
.....................................
"The Windows 7 Operating System is user friendly and more reliable to use and better than Windows Vista"

Sajeev. S. Anand
System Administrator
Thrissur

.....................................
"Windows 7 Powershell, Hyper V, Bit Locker and App Locker features are really good"

K V Nagaraj Gupta
Systems Engineer
Bangalore

.....................................
"E-mail and SMS Linking are cool in Exchange Server 2010"
Sanjith. S.
Network Engineer  Thiruvananthapuram
.....................................
"Exchange Server 2010 provides great scalability, is available as a hosted solution and Outlook web access gives more features"

Pankaj Kumar Verma
System Administrator
Sikar

Read more
Does your organization's Security System bugs you as much as it keeps the bugs away? Then voice your concern. Participate in the Nationwide Information Security Survey brought to you by Microsoft and Crosstabs.
Access lots of new opportunities to improve and share your knowledge of Microsoft's newest operating system!
New Windows 7 Application Compatibility List for IT Professionals
Ten Things IT Professionals Need to Know About Windows 7
Windows 7 Security Enhancements
Microsoft SQL Server 2008 R2 Microsoft Forefront Microsoft Internet Explore8 Microsoft Exchange Server 2010 Windows Server 2008 R2 Microsoft System Center
© 2009 Microsoft Corporation. All rights reserved. Microsoft, and other logos are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective owners.

Review our Privacy Statement: If you prefer not to receive future promotional emails of this type from Microsoft, please click here to unsubscribe. We will promptly update your preferences; however, you may still receive previously initiated promotional communications from Microsoft. This email is intended for distribution within India.

Protect Your PC: Three steps to help ensure your PC is protected. Microsoft wants to help ensure your PC is protected from viruses and worms, and from other future threats. Please go to www.microsoft.com/protect and follow these steps today.
1. Use an Internet Firewall 2. Update Your Computer 3. Use Up-to-Date Antivirus Software

To get more information and resources about how to help protect your PC, go to www.microsoft.com/protect.
Sign up for other newsletters | Unsubscribe | Update your profile
© 2009 Microsoft Corporation Terms of Use | Trademarks | Privacy Statement

Reply all
Reply to author
Forward
0 new messages