Windows Phone 7.5 Training Kit

Posted by bink on December 21 2011, 4:37 PM.

Hands on Labs for the Windows Phone 7.5 Application Platform

 

Two sets of hands on labs for Windows Phone 7.5 application development. These are packages that support a full offline installation of the labs that are available live online.

 

 

 

 

MangoRTMTK_Advanced2011-12-14.01.05.09.Setup.exe 117.0 MB Download
MangoRTMTK_Basic2011-12-14.00.57.06.Setup.exe 215.6 MB Download

Microsoft Lync 2010 for iPhone and iPad released

Posted by bink on December 21 2011, 1:59 AM.

 

image

 

 

 

 

 

 

Microsoft Lync 2010 for iPhone requires a Lync Server or Office365/Lync Online account and will not work without it. If you are unsure about your account status, please contact your IT department.

iPhone Screenshot 1

iPhone Screenshot 2

 

iPhone Screenshot 3

iPhone Screenshot 4

iPhone Screenshot 5

Download for iPhone: http://itunes.apple.com/us/app/microsoft-lync-2010-for-iphone/id484293461?mt=8

Download for iPad: http://itunes.apple.com/dk/app/microsoft-lync-2010-for-ipad/id484222449?mt=8

Windows Embedded Device Manager 2011 Service Pack 1

Posted by bink on December 16 2011, 4:30 PM.

This Service Pack provides improvements in scalability, deployment, performance, and support for additional configurations for Windows Embedded Device Manager 2011.

The Service Pack provides improvements in scalability, deployment, performance, and support for additional configurations for Windows Embedded Device Manager 2011. Improved Scalability and Deployment: Device Manager 2011 can now be deployed in hierarchies with multiple distributed site servers, as well as in less complex site server hierarchies. Multiple distribution points can now be used to distribute write filter-enabled content, and centralized management and reporting is now supported. Improved functionality: The expiration period for device imaging deployments has been extended to 6 months, providing enhanced functionality for offline and newly deployed devices. Expanded support for Configuration Manager environments: Device Manager can now be deployed in environments with both ConfigMgr 2007 R2 SP2 and ConfigMgr 2007 SP1. In addition, Device Manager 2011 can be installed in an environment that includes both ConfigMgr 2007 and ConfigMgr 2003 (though Device Manager 2011 can only be installed on ConfigMgr 2007). More flexible collections: Predefined and dynamic collection creation can now be disabled, providing flexibility in the management of device collections. Kiosks now have their own collection, instead of being grouped with other Windows Embedded devices. Increased performance: Changes in the service pack enable fewer messages to be used throughout the lifecycle of a device imaging request. Improved documentation: There is now an expanded library on the deployment and use of Device Manager 2011.

Download WEDM 2011 SP1 - Microsoft Download Center - Download Details

A look back at 2011’s Microsoft’s security landscape

Posted by bink on December 15 2011, 5:18 PM.

msrc blog:

Decrease in Critical Issues and Bulletins

As far as individual issues, Critical-class CVEs accounted for less than a third of the issues we addressed in bulletin releases for the first time since we began our monthly bulletin-release cadence in 2004.And in absolute numbers, Critical-class CVEs are at their lowest levels since 2005. The fact that we’re seeing lower percentages of Critical issues and bulletins year-over-year demonstrates progress made by the product groups in creating more secure software.

With this regularly scheduled monthly release, our bulletin count for 2011 is 99, with 13 released today. Of those, we determined 10 to be Important-class bulletins, with only three classified as Critical in severity. In 2011, Critical-class bulletins represented just 32 percent of all bulletins – the lowest percentage since we began our monthly bulletin-release cadence in 2004 and, again, the lowest absolute number since 2005. Interestingly, for the second half of the year the numbers are even lower, with under 20 percent of bulletins released in the last six months rated Critical in severity.

Even though there are fewer Critical-class security updates year-over-year, we know that any update has the potential to be disruptive for customers. And so we work hard to make our update process as smooth and transparent as possible for customers – with no surprises. As part of that commitment, in 2011 we were able to address reported security issues effectively without resorting to emergency releases outside of the regular scheduled monthly releases. We understand the disruption that these “out-of-cycle” releases create for customers, and we take the decision to release an update out of cycle very seriously. Effective coordination with product teams, greater use of threat telemetry, the ability to release workarounds, and the ability to release defenses through partners like those in Microsoft’s Active Protection Program (MAPP) have all helped us to release all our 2011 bulletins in the usual monthly process. We’re glad about that, even though we will always reserve the right to release out-of-cycle if the situation merits it.

Continue: A look back at 2011’s security landscape - MSRC - Site Home - TechNet Blogs

A Guide to Claims-Based Identity and Access Control, Second Edition - eBook

Posted by bink on December 15 2011, 6:13 AM.

Claims-based identity seeks to control the digital experience and allocate digital resources based on claims made by one party about another. A party can be a person, organization, government, website, web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the authors of this book point out, there is nothing new about the use of claims. As far back as the early days of mainframe computing, the operating system asked users for passwords and then passed each new application a “claim” about who was using it. But this world was based to some extent on wishful thinking because applications didn’t question what they were told.

As systems became interconnected and more complicated, we needed ways to identify parties across multiple computers. One way to do this was for the parties that used applications on one computer to authenticate to the applications (and/or operating systems) that ran on the other computers. This mechanism is still widely used—for example, when logging on to a great number of Web sites.

However, this approach becomes unmanageable when you have many co-operating systems (as is the case, for example, in the enterprise). Therefore, specialized services were invented that would register and authenticate users, and subsequently provide claims about them to interested applications. Some well-known examples are NTLM, Kerberos, Public Key Infrastructure (PKI), and the Security Assertion Markup Language (SAML).

If systems that use claims have been around for so long, how can claims-based computing be new or important? The answer is a variant of the old adage, “All tables have legs, but not all legs have tables.” The claims-based model embraces and subsumes the capabilities of all the systems that have existed to date, but it also allows many new things to be accomplished. This book gives a great sense of the resultant opportunities.

Download A Guide to Claims-Based Identity and Access Control, Second Edition - Book Download

AppLocker Deployment at Microsoft

Posted by bink on December 14 2011, 12:28 AM.

AppLocker is a feature of Windows 7 and Windows 2008 R2 that maintains legal and security obligations to prevent the execution of unwanted applications on domain-joined devices

AppLocker is a feature of Windows 7 and Windows 2008 R2 that maintains legal and security obligations to prevent the execution of unwanted applications on domain-joined devices. Unauthorized Peer 2 Peer (P2P) applications within the Microsoft infrastructure are strictly prohibited by the Microsoft Information Security General Use Standard. Microsoft is currently blocking Unauthorized P2P on the network edge/proxy. This Group Policy setting extends the protection to machines on the corporate network.

 

Download AppLocker Deployment at Microsoft - Microsoft Download Center - Download Details

Microsoft IT Implementation of Disaster Recovery in the Datacenter

Posted by bink on December 14 2011, 12:27 AM.

Microsoft IT developed their solution for Disaster Recovery (DR) in the datacenter. This will give a good overview of how we created our DR strategy, the architecture, program management behind it, some of best practices/lessons learned and governance which drives our day to day operations.

Microsoft IT developed their solution for Disaster Recovery (DR) in the datacenter. This will give a good overview of how we created our DR strategy, the architecture, program management behind it, some of best practices/lessons learned and governance which drives our day to day operations.

 

Download Microsoft IT Implementation of Disaster Recovery in the Datacenter

Windows Defender Offline Beta

Posted by bink on December 13 2011, 5:52 PM.

Sometimes, malicious and other potentially unwanted software, including rootkits, try to install themselves on your PC. This can happen when you connect to the Internet or install some programs from a CD, DVD, or other media. Once on your PC, this software might run immediately, or it might run at unexpected times.Windows Defender Offline Beta can help remove such hard to find malicious and potentially unwanted programs using definitions that recognize threats. Definitions are files that provide an encyclopedia of potential software threats. Because new threats appear daily, it's important to always have the most up-to-date definitions installed in Windows Defender Offline Beta. Armed with definition files, Windows Defender Offline Beta can detect malicious and potentially unwanted software, and then notify you of the risks.

To use Windows Defender Offline Beta, you need to follow four basic steps:

  1. Download Windows Defender Offline Beta and create a CD, DVD, or USB flash drive.

  2. Restart your PC using the Windows Defender Offline Beta media.

  3. Scan your PC for malicious and other potentially unwanted software.

  4. Remove any malware that is found from your PC.

Windows Defender Offline Beta will walk you through the details of these four steps when you're using the tool. If you've been prompted in Microsoft Security Essentials or Windows Defender to download and run Windows Defender Offline Beta, it's important that you do so, to make sure that your data and your PC isn't compromised.

To get started, find a blank CD, DVD, or USB flash drive with at least 250 MB of free space and then download and run the tool—the tool will help you create the removable media.

Download the 32-bit version

Download the 64-bit version

Microsoft Exchange Server 2010 Service Pack 2 Released

Posted by bink on December 5 2011, 7:19 PM.

Microsoft Exchange Server 2010 helps you achieve new levels of reliability and performance by delivering features that help to simplify your administration, protect your communications, and delight your customers by meeting their demands for greater business mobility.

Microsoft Exchange Server 2010 SP2 helps IT Professionals achieve new levels of reliability with greater flexibility, enhanced user experiences, and increased protection for business communications.

  • Flexible and reliable - Exchange Server 2010 SP2 gives you the flexibility to tailor your deployment based on your company's unique needs and a simplified way to keep e-mail continuously available for your users.
  • Anywhere access - Exchange Server 2010 SP2 helps your users get more done by giving them the freedom to securely access all their communications - e-mail, voice mail, instant messaging, and more - from virtually any platform, Web browser, or device.
  • Protection and compliance - Exchange Server 2010 SP2 delivers integrated information loss prevention, and compliance tools aimed at helping you simplify the process of protecting your company's communications and meeting regulatory requirements.

You must accept the license terms for the software before you are authorized to use it. There is no product support for the trial edition of the software. You are welcome to participate in the forums to share your trial experiences with others and to ask for advice.

 

Download Microsoft Exchange Server 2010 SP2 - Microsoft Download Center - Download Details

Microsoft Cloud Services Get Major Service Updates, New Customers

Posted by bink on November 30 2011, 6:56 PM.

Microsoft Corp. today announced the first major service update for Microsoft Office 365, the company’s next-generation cloud productivity service for businesses of all sizes. The service will also be available to try in 22 additional markets today, including Argentina, Iceland, Indonesia, South Africa and Taiwan.

Look who is using the cloud.

“We are seeing really positive momentum for Office 365. Customers are adopting Office 365 eight times faster than our previous service, and the solution is on track to become one of our fastest-growing offers in Microsoft history,” said Kurt DelBene, president of the Office Division at Microsoft. “We are also seeing great traction with small businesses, with more than 90 percent of our early Office 365 customers coming from small businesses.”

Small Businesses and Big Brands Bet on Office 365

More and more large global companies are choosing Office 365 to enable their employees and customers to work together in the cloud. In fact, more than 40 percent of the global Interbrand list of the 100 top brands use Office 365 or related cloud productivity services from Microsoft. Among the new customers are Campbell Soup Company and Groupe Marie-Claire, which have recently chosen Office 365 to reap the benefits of cloud productivity.

“Office 365 is key to our plans to propel our employees to next-generation innovation in productivity technologies, at a very rapid pace,” said Joe Spagnoletti, senior vice president and chief information officer at Campbell Soup Company. “We’re betting on the cloud — and Office 365 — as we prepare to build a highly collaborative workplace where employees across our global offices can all work together and communicate in a seamless fashion.”

Groupe Marie-Claire, a leading fashion magazine published in more than 30 countries, will use Office 365 to modernize the company’s email and collaboration capabilities, while moving away from a costly and inefficient legacy technology. Employees at Groupe Marie-Claire will be able to access email and share documents on a PC, Mac or various mobile devices with Office 365.

“We thoroughly evaluated other cloud productivity offerings in the market before choosing Microsoft. Office 365 is the right choice to help our company support the way people work today and encourage a more mobile work environment,” said Philippe Chapier, IT manager for Groupe Marie-Claire. “With the service, we have the added benefit of working together with familiar tools on almost any device and can make quicker decisions when needed.”

Rapid Cloud Evolution

Microsoft is also making more than 30 new updates to Office 365 to enhance collaboration and communication, and for SkyDrive, adding simple app-centric sharing for Office, powerful file management and easier uploads with HTML5 based largely on customer feedback. Key new features and enhancements include the following:

Support for Lync for Mac. Mac users can now use instant messaging, presence and videoconferencing through Office 365.

New SharePoint Business Connectivity Services, which allow people to connect to information in their company’s critical line-of-business applications, such as customer relationship management or SAP software.

Support for Windows Phone 7.5. Starting today, people can access and update documents in SharePoint Online from anywhere using their Windows Phone.

SkyDrive gets simpler app-centric sharing for Office, powerful file management and easier uploads with HTML5. Share any Office document in one click. Work together more easily with any contact — across email services and connected networks such as Facebook or LinkedIn. Powerful tools to manage and organize files quickly. Drag and drop multiple files to upload across browsers on PC and Mac.

“Today’s news illustrates how we’re executing like never before in the cloud with more customers, capabilities and commitment than anyone in the industry. All this while others search for their focus,” said Takeshi Numoto, corporate vice president, Microsoft Office Division.

New Microsoft Security Essentials Beta now public

Posted by bink on November 30 2011, 1:57 AM.

Version: 4.0.1111.0

The Beta program is a fully functional antimalware app with ongoing updates to help protect your PC from viruses, spyware, and other malicious software. In addition to ongoing virus and spyware definition updates, we’ll provide software updates to the Beta for download through Microsoft Update on a periodic basis. To have these updates installed automatically, you must be subscribed to Microsoft Update with preferences set to Automatically download and install new updates.

ace05119-319e-4770-9684-16c6cba0167d

This Beta version of Microsoft Security Essentials includes the following new features and enhancements to better help protect your PC from threats:

  • Enhanced protection through automatic malware remediation: The Beta program will clean highly impacting malware infections automatically, with no required user interaction.

  • Enhanced performance: The Beta includes many performance improvements to make sure your PC performance isn’t compromised.

  • Simplified UI – Simplified UI makes Microsoft Security Essentials Beta easier to use.

  • New and improved protection engine: The updated engine offers enhanced detection with cleanup capabilities and better performance.

System Requirements:

Operating System: Windows XP Service Pack 3 (SP3)*; Windows Vista (Service Pack 1, or Service Pack 2)*; Windows 7 (Service Pack 1)*

  • For Windows XP, a PC with a CPU clock speed of 500 MHz or higher, and 256 MB RAM or higher.

  • For Windows Vista and Windows 7, a PC with a CPU clock speed of 1.0 GHz or higher, and 1 GB RAM or higher.

  • VGA display of 800 × 600 or higher.

  • 200 MB of available hard disk space.

  • An Internet connection is required for installation and to download the latest virus and spyware definitions for Microsoft Security Essentials Beta.

  • Internet Browser:

    • Windows Internet Explorer 6.0 or later.

    • Mozilla Firefox 2.0 or later.

  • Microsoft Security Essentials Beta also supports Windows XP Mode in Windows 7. For more information see the system requirements for Windows XP Mode in Windows 7.

  • *Your PC must run genuine Windows to install Microsoft Security Essentials Beta. Learn more about genuine Windows.

Download Microsoft Security Essentials Public Beta

image

HP launches X5000 G2 with Microsoft Windows Storage Server 2008 R2

Posted by bink on November 30 2011, 12:47 AM.

 

Network Attached Storage (NAS) solution to enable midsize companies to efficiently manage data growth while maintaining constant access to critical information.

Tailor made for Windows file server consolidation:

Many companies run Microsoft Windows® Server to power their applications, but most NAS offerings are closed systems. This adds complexity from separate management, antivirus, & backup tools. The X5000 G2 addresses these gaps and improves file serving performance:

  • Powered by Microsoft Windows Storage Server 2008 R2 the X5000 G2 has native integration with Microsoft tools and software to eliminate additional hardware or overhead.
  • Advanced BranchCacheTM and file management tools improve file access performance while automating data categorization and retention.

Turnkey converged appliance with built-in availability

As file data becomes more critical to operations, the need to ensure high availability is even more important. If not done carefully, it can lead to large investments in duplicate hardware, clustered systems and complex setup. The X5000 G2 provides turnkey high availability.

  • Clustered, dual-node, active-active architecture increases data availability while quick-start deployment tools to ensure you are up and running in minutes.
  • Unique converged hardware provides 32 terabytes in a dense 3U chassis which decreases physical footprint by 50% and dramatically cuts power & cooling costs

Here is a Video @HPStorageGuy made at HP Discover: