Select Page
image

Microsoft Tech Summit Amsterdam #MSTechSummit

Today and tomorrow I’ll be at the Microsoft Tech Summit. You can find me at the Workshop Proctor "Build and manage your applications on Azure" or at the Microsoft Booth or somewhere at the Expert Hub Center the help the ... continue reading
image

Clustering FileServer Data Deduplication on Windows 2016 Step by Step #sofs #winserv #ReFS #WindowsServer2016 #Dedupe

Building a File server in Server 2016 isn’t that different tan in Server 2012R2 except there are different options, ReFS, DeDupe and a lot more options. As we start with the basic file server clustered and using ReFS and Data ... continue reading

The technical value of WSSD validated HCI solutions, part 1

This post is authored by Carmen Crincoli, Senior Program Manager, Windows Server, and is the first of a 2-part series aimed at explaining the value provided by the Windows Server-Software Defined (WSSD) program. As many of you are aware, one ... continue reading
image_thumb6

Part 2 Ultimate Step to Remote Desktop Services HTML5 QuickStart Deployment #RDS #VDI #RDP #RDmi

Ready for Part 2 of the RDS setup.  As I did already an step by Step Step by Step Server 2016 Remote Desktop Services QuickStart Deployment  #RDS #VDI #RDP #RemoteApp Step by Step Server 2016 Remote Desktop Services QuickStart Deployment ... continue reading
RDmi (RDS modern infrastructure)

Part 1 Ultimate Step to Remote Desktop Services HTML5 on Azure QuickStart Deployment #RDS #S2D #VDI #RDP #RDmi

As I did already an step by Step Step by Step Server 2016 Remote Desktop Services QuickStart Deployment  #RDS #VDI #RDP #RemoteApp Step by Step Server 2016 Remote Desktop Services QuickStart Deployment #RDS #VDI #RDP #RemoteApp that’s Covering all the ... continue reading
image

Check with Powershell for Meltdown and Spectre #exploit critical vulnerabilities Protection #Meltdown #KB4056892

Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can ... continue reading

Webcast: How to leverage Azure for your Windows Server environment

This blog post was authored by Jeff Woolsey, Principal Program Manager, Microsoft. Hello Windows Server Nation! I spend a lot of time traveling and talking to customers, and I love to hear about all the innovative ways you use Windows ... continue reading

In practice: How customers are using Shielded Virtual Machines to secure data

You’ve read and heard a lot from Microsoft about the unprecedented security provided by Shielded Virtual Machines in Windows Server 2016, but how is this feature being used by real customers? We decided to round up a few customer stories ... continue reading
Remote Desktop in Project "Honolulu"

Remote Desktop in Project “Honolulu”

This quick video demonstrate Remote Desktop in Project "Honolulu", a new feature available in the update for build 1711. Download Project "Honolulu" today at http://aka.ms/HonoluluDownload ... continue reading
PowerShell in Project "Honolulu"

PowerShell in Project “Honolulu”

This quick video demonstrate PowerShell in Project "Honolulu", a new feature available in the update for build 1711. Download Project "Honolulu" today at http://aka.ms/HonoluluDownload ... continue reading