Monday, June 29, 2009

Dell Diversifies With Fixed Server Offerings

Dell on Wednesday said it would offer pre-configured systems for enterprise customers looking to get server environments up and running quickly.

The fixed configurations include servers, storage modules and software that are pretested and can be deployed in hours, Dell officials said. The offerings are a diversification from Dell's traditional built-to-order business model, in which customers typically specify configurations before ordering.

Dell is offering fixed systems as an option to custom-built systems that could take longer to configure and deploy, said Praveen Asthana, Dell's director of enterprise storage.

"The goal is speed," Asthana said. "Now we're saying you can be up and running in 30 minutes, not in a week."

The systems are targeted at customers like small- and- medium businesses who may lack expertise in server deployment, or to those who want to quickly deploy servers with applications like virtualization.

Dell is perhaps one of the first server vendors to offer server packages out of the box, said Charles King, principal analyst with Pund-IT. During the recession, the bundles are an inexpensive way for customers to upgrade hardware infrastructure and to quickly deploy applications, he said.

"Dell is recognizing that there are certain application areas where pre-configuration trumps custom systems, specifically in the server space," King said. For example, the systems are good for SMBs who want virtualization, but don't have the manpower or technical know-how to deploy the application over a range of servers. Virtualization is generally employed mostly larger server environments like data centers, but is now reaching smaller server environments, King said.

Source: pcworld

Monday, June 22, 2009

Types of Servers : Are they really have?

Servers do not really have ``types''. A server can be a primary for some zones and a secondary for others, or it can be only a primary, or only a secondary, or it can serve no zones and just answer queries via its ``cache''. Previous versions of this document referred to servers as ``master'' and ``slave'' but we now feel that those distinctions -- and the assignment of a ``type'' to a name server -- are not useful.

Caching Only Server

All servers are caching servers. This means that the server caches the information that it receives for use until the data expires. A Caching Only Server is a server that is not authoritative for any zone. This server services queries and asks other servers, who have the authority, for the information needed. All servers keep data in their cache until the data expires, based on a TTL (``Time To Live'') field which is maintained for all resource records.

Remote Server

A Remote Server is an option given to people who would like to use a name server from their workstation or on a machine that has a limited amount of memory and CPU cycles. With this option you can run all of the networking programs that use the name server without the name server running on the local machine. All of the queries are serviced by a name server that is running on another machine on the network. A host which has an /etc/resolv.conf file listing only remote hosts, and which does not run a name server of its own, is sometimes called a Remote Server (because the actual server is remote?) but more often it is called simply a DNS Client. This kind of host is technically not a ``server'', since it has no cache and does not answer queries.

Slave Server

A Slave Server is a server that always forwards queries it cannot satisfy from its cache, to a fixed list of forwarding servers instead of interacting with the name servers for the root and other domains. The queries to the forwarding servers are recursive queries. There may be one or more forwarding servers, and they are tried in turn until the list is exhausted. A Slave and forwarder configuration is typically used when you do not wish all the servers at a given site to interact with the rest of the Internet servers. A typical scenario would involve a number of workstations and a departmental timesharing machine with Internet access. The workstations might be administratively prohibited from having Internet access. To give the workstations the appearance of access to the Internet domain system, the workstations could be Slave servers to the timesharing machine which would forward the queries and interact with other name servers to resolve the query before returning the answer.


Source: http://www.dns.net/dnsrd/docs/bog/bog-sh-4.html

Monday, June 15, 2009

Thecus New N5500 NAS Server

First and foremost, the N5500 is engineered to store your data and keep it safe. The N5500 is equipped with five hot-swappable SATA 3.5” hard disk bays for a whopping 10TB of total storage capacity. To protect this data, the N5500 lets you choose from a wide selection of RAID modes, including RAID 0, 1, 5, 6, and JBOD. The N5500 also supports multiple RAID volumes, enabling you to choose the right combination of RAID volumes for your network, and if you ever change your mind, the N5500 also features online RAID expansion, online RAID migration, and auto rebuild for maximum flexibility. In fact, the N5500 is the only storage solution on the market that can be configured as a NAS, a DAS, or an iSCSI device! A powerful Intel® CPU and dual Gigabit Ethernet ports with load balancing, failover, and link aggregation with 802.3ad, the N5500 lets you access your data quickly and reliably.

In a business environment, maintaining functional operation on storage device is critical. With the unique dual-DOM design, an extra DOM is installed to ensure continuous and flawless operation on N5500. Users do not need to worry about down-time due to unexpected system failure. The N5500 also shines in terms of flexibility with support for multiple file systems, including XFS, EXT3 and ZFS, and you can even select different file systems for each RAID volume. In addition to this, RAID volumes on the N5500 can also be encrypted for ultimate data protection and security. Those who require even greater performance will be happy to hear that the N5500 also supports iSCSI initiators, which means that you can enjoy blazing file transfer performance over Ethernet without the hassle and expense of fiber-channel.

With features like these, the N5500 represents the next level in NAS device flexibility and power.

“Powerful, flexible, and scalable, the N5500 is our most exciting five-bay NAS yet,” notes Thecus General Manager Florence Shih. “Offering best-in-class speed, a bevy of useful features, and complete ease-of-use, users will be hard-pressed to find a five-bay NAS that measures up to the N5500 in both home and business environments.”

For more: http://hothardware.com/News/Thecus-Introduces-N5500-NAS-Server/

Tuesday, June 9, 2009

Apple unveils Mac OS X Snow Leopard Server

Like Snow Leopard, the server version of the OS provides 64-bit support, and many of the Apple applications have been updated to take advantage of that. For example, SMB file server performance is 2.3x faster than Leopard Server, and AFP file server performance is now 1.3x faster.

New features include:

iCal Server 2 -- This upgrade to Leopard's iCal Server now provides push notification, wireless accessibility to your calendar from any iPhone, a new web-based calendaring interface, and updates to CalDAV that now allow you to invite colleagues to meetings via email.

Podcast Producer 2 -- Podcast Producer, which was added to the server mix in Leopard, is now improved with Podcast Composer. This new feature lets you create your own workflows for automating completion and publishing of podcasts. There's also a new Setup Assistant in Server Admin that can set up Podcast Producer 2 in a manner of minutes, even if you're setting up a cluster of servers.

Wiki Server 2 -- Workgroups wishing to collaborate now have a little bit more to love from Wiki Server. The only real new feature is iPhone support; users can securely log into confidential wikis and content, and even review content and comments from the iPhone.

Mobile Access Server -- The piece that I'm probably the most excited about as an Xserve admin is Mobile Access Server. This new feature is like a custom VPN for Mac and iPhone users. As long as they're set up in the server's directory service, users can get secure, encrypted access to the server and network with very little hassle.

Mail Server -- The engine running Mail Server has been totally redesigned for much faster service, and now provides push email, vacation messages and server-side rules, and improvements to mail server clustering.

Web Server -- The biggest change to Web Server is that it can now do HTTP live video streaming. Performance is about 1.3x faster than Leopard Server's web services as well.

Client Management -- Organizations that are deploying many iPhones will love the new client management piece of Snow Leopard Server. It has an iPhone configuration utility for creating profiles that can be emailed to corporate users, thus setting up secure services in a few seconds. Administrators can now also use NetRestore to rebuild Macs over networks, based on either a custom build disk image or a standard OS X install disk.

Best of all, Snow Leopard Server will cost $499 for unlimited users (a sharp reduction from Leopard Server's price of $999 unlimited, $499 for 10 users) and should be shipping at the same time OS X 10.6 is available to the rest of us. I'd just be happy if Apple has finally fixed a lot of the issues with backing up network users to Mac OS X Server using Time Machine

Source:tuaw.com

Tuesday, June 2, 2009

How to Implement Outlook Web Access for Exchange Server 2007

Implementing Outlook Web Access

Once the Client Access role is installed on your Exchange Server, the OWA is available to your remote users who want to access their mailboxes using their web browsers. Although none of the settings are mandatory for the implementation of OWA, it requires you to configure various features and settings in Exchange Server 2007 for customization and efficiency. You can use various tools to configure OWA. These tools are:

* Exchange Management Console: A GUI used to manage the most common settings of OWA including Organization Configuration.
* Exchange Management Shell: A command-line interface that allows you to manage futures that cannot be managed using Exchange Management Console. It also allows you to automate administrative tasks and manage the associated command-line plug-ins.
* IIS Manager: A MMC that allows you to manage virtual directories.
* Web.config: A configuration file that must be modified using notepad. It allows you to modify OWA settings that are specific to ASP.NET.
* Registry editor: A sensitive tool that can be used to directly configure OWA settings such as the PublicClientTimeout, SSLOffloaded, and TrustedClientTimeout

To configure OWA in your Exchange server you can perform the following configurations:

* Configure OWA Virtual Directories: When the Client Access role is installed on your exchange server the following default OWA virtual directories are created under the Default Web Site in IIS on the Exchange server to allow access to Exchange content, as shown in Figure 5:

/owa: Used to allow access to mailboxes on Exchange Server 2007
/Public: Used to allow access to public folders using OWA
/Exchweb: Used to allow access to mailboxes on Exchange Server 2003 or Exchange Server 2000
/Exchange: Used to allow access to mailboxes on Exchange Server 2007, Exchange Server 2003, or Exchange Server 2000
/Exadmin: Used to allow access to administrative settings and properties to administrators.

You can manage the default virtual directories or create new virtual directories by using IIS Manager, Exchange Management Console, or Exchange Management Shell.

Related: How To Disable The Shutdown Event Tracker On Microsoft Windows Server


More Details here

Wednesday, May 27, 2009

How do I install or remove Windows on Windows 64 (WoW64) on my Windows Server 2008 R2 server core installation?

The WoW64 component is named ServerCore-WOW64. To install it, use the standard ocsetup method: Start /w ocsetup ServerCore-WOW64

To uninstall, use Start /w ocsetup ServerCore-WOW64 /uninstall

Note that this installs/removes the core WoW64 environment, and you need to reboot after changing this. There are also additional WoW64 packages for the various Windows Server 2008 R2 roles to enable 32-bit application support in those roles: Failover Clustering—FailoverCluster-Core-WOW64 PowerShell—MicrosoftWindowsPowerShell-WOW64 .NET 2—NetFx2-ServerCore-WOW64 .NET 3—NetFx3-ServerCore-WOW64 Printing—Printing-ServerCore-Role-WOW64 Server Core IME—ServerCore-EA-IME-WOW64 SUA—SUACore-WOW64

Before installing these components, you must first install the native 64-bit role/feature that this augments with 32-bit compatibility. For example, before installing NetFX3-ServerCore-WOW64, you need to have installed NetFX3-ServerCore.

You won't be told by an application install or application execution that you are missing WoW64 if you need it. Instead, you'll see more generic errors such as "Error 1719: The Windows Installer Service could not be accessed" during a 32-bit application installation, or "The system cannot execute the specified program" id you're trying to run a 32-bit program. Related Reading: Q. Is Windows Server 2008 R2 built on Server 2008's kernel in the same way that Windows Server 2003 R2 was built on Server 2003's kernel?

From: WindowsITpro

Wednesday, May 20, 2009

Microsoft will support server virtualization for Office Communications Server 2007 R2

Microsoft Wednesday announced that it will support server virtualization for Office Communications Server 2007 R2, its first statement on what portions of its real-time platform will run in a virtual environment.

In a post on Microsoft's Office Communications Server (OCS) blog, Jerome Berniere, senior program manager in the Office Communications group, said the company would support both "fully distributed virtualized topology across several hypervisors and for a single server virtualized topology."

The topologies are supported on Windows Server 2008 Hyper-V and any Server Virtualization Validation Program (SVVP) certified partner solution.

The virtualization will support presence, group chat and instant messaging. The IM support includes remote access, federation and connection to public IM.

The company made the announcement in conjunction with its annual TechEd conference going on this week.

Berniere also said a number of server services would be supported, including: front-end, back-end SQL Server 2008 64-bit; group chat channel; group chat compliance; archiving; monitoring (CDR only); and edge access.

Microsoft said the virtual machines must be running on Windows Server 2008 64 bits. Berniere wrote on the blog, "archiving server and monitoring server can be connected to a virtualized enterprise pool, but they must run on a physical server."


Source: itworld

Wednesday, May 13, 2009

Functions of IT Support Services

Its responsibility of IT support companies to keep all data safe while maintaining network server security, server upgrades and migrations, email management services and disaster recovery solutions. Such server support technicians help you to run your business smoothly. Therefore, there is high need to have a contract with an IT support service company as well as recommended.

Role of IT Support Services

It is the responsibility of the IT support services provider to ensure the effortless running of all computer systems and entire network.

· Install and configure operating systems as per the agreed standards.
· Give assistance in maintenance and compilation of all significant software and hardware.
· In server failure condition, IT support services provides the facility for disaster recovery solutions for your data as well as server upgrade and if needed migrate to other improved systems.
· Provide secure backup services with complete email management, even remotely.
· Provide repair services and troubleshooting for small and large businesses and always help you get access to the newest technology.
· Find solutions to all those problems that can hinder the smooth working of an organization or business.
· Provide proactive network installation for your network support requirements and a complete range of support packages and systems.
· Most IT support firms offer phone and online support and no need to wait for an engineer to come out to your office.
· Network support services include data security that helps you to detect promptly any computer virus and hacker threats.
· Ensure that all the software and the help desk systems are being kept up-to-date.

Thursday, May 7, 2009

How to Install Read-Only Domain Controller on Windows Server 2008

Installing a Read-Only Domain Controller (RODC) isn’t much different than installing a regular domain controller.

However, there is one important factor to keep in mind. A RODC can only be installed into an existing Active Directory Domain with at least one full (non-read-only) Windows 2008 Server Domain Controller.

The reason is that the RODC is a new feature to Windows 2008 and it needs at least one DC to understand what it is doing in order to function properly.

Once the decision has been made to install a RODC the next decision is whether to install on a full-install or core-install of Windows 2008 Server.

The RODC is primarily aimed at providing additional security on an Active Directory Database for a server that is not physically secured. Installing a RODC on a Core Install of Windows 2008 provides no additional physical security.

Installing RODC on a Core Server Install

There is only one way to install RODC role on a Core Server installation. The dcpromo.exe command runs on the GUI-less version of Windows Server 2008.

Using an answer file for the command makes the process much easier than trying to get all the switches just right in the command line.

Installing the Read-Only Domain Controller on Windows Server 2008 - 1

Although there are many settings available depending upon your particular infrastructure, just basic information is required to complete the command:

  • an account with permissions to do what you are trying to do
  • the name of the Site
  • the database and log paths
  • and whether or not to install DNS.

Installing the Read-Only Domain Controller on Windows Server 2008 - 2

Many people will put a “yes” for RebootOnCompletion. If you are doing an actual unattended promotion then that would make sense.

Regular Installation

On a full install of Windows Servers 2008, there is of course a GUI tool to help with the process. The Active Directory Domain Services Installation Wizard handles the installation of RODC.

Type “dcpromo” at a command prompt to start the wizard. The first screen will ask you whether you want to use an existing forest, or create a new domain in a new forest. Since you must join an existing domain with a RODC, the choice is obvious.

Next you’ll be asked for a username and password. The account must be a member of Domain Admins in order to create a Read-Only Domain Controller.

Next, you’ll choose the site you wish to join.

So far, this is all the same as a regular Domain Controller install. Under “Additional Options” is where you actually choose to make this a Read-Only Domain Controller installation.

Using an answer file for the command makes the process much easier than trying to get all the switches just right in the command line.

Installing the Read-Only Domain Controller on Windows Server 2008 - 1

Although there are many settings available depending upon your particular infrastructure, just basic information is required to complete the command:

* an account with permissions to do what you are trying to do
* the name of the Site
* the database and log paths
* and whether or not to install DNS.

Installing the Read-Only Domain Controller on Windows Server 2008 - 2

Many people will put a “yes” for RebootOnCompletion. If you are doing an actual unattended promotion then that would make sense.

If you are sitting at the console, I prefer to manually reboot the server so that I can take as much time as I want to study what is on the screen if there is an issue.

Next, choose the paths for installing the components, or just click Next to use the defaults. Once the confirmation screen appears, you are all set.

Source: http://windowsserver.trainsignal.com/server-2008-install-rodc-read-only-domain-controlle

Monday, May 4, 2009

How To Disable The Shutdown Event Tracker On Microsoft Windows Server

Microsoft Windows has a feature which enables the operating system to record information about why the machine is going to be shut down or in the event of an unexpected shut down; why it was shut down.

This functionality is called the Shutdown Event Tracker. The feature is turned off by default in Windows XP Home & Professional and most other desktop versions of the operating system. In the case of Windows Server 2003 and other versions in the server family it is enabled by default.

Follow these steps:

1. Go to Start > Run and type gpedit.msc and press ok

2. Open the Computer Configuration > Administrative Templates > System Folder

3. Double click the Display Shutdown Event Tracker setting in the right hand pane.

4. Select the Disable option on the pop up window and press ok

When you attempt to Reset or Shut Down the computer next time the Shut Down Event Tracker option will no longer be displayed and you will be free to perform the operation without its annoyance. To turn it back on - repeat the above but select enabled.

Source: Ezine

Thursday, April 30, 2009

How to Change Display Data Prioritization in Windows Server 2008?

Display Data Prioritization in Windows Server 2008 Terminal Services allows for automatic control over the virtual channel traffic that is passed between the client (RDP 6.0) and the server. This enables better performance and user experience because display, keyboard typing, and mouse movement data is given a higher priority over other virtual channel traffic, such as printing, clipboard operations or file transfers. This prioritization is designed to ensure that your screen performance (user experience) is not affected by bandwidth intensive actions, such as large print jobs.

In Windows Server 2008 Terminal Services, the default bandwidth ratio is 70:30. This means that display and input data will be allocated 70% of the bandwidth and all other traffic, such as print jobs , clipboard or file transfers will be allocated 30% of the bandwidth.

Changing the Display Data Prioritization

Warning! This document contains instructions for editing the registry. If you make any error while editing the registry, you can potentially cause Windows to fail or be unable to boot, requiring you to reinstall Windows. Edit the registry at your own risk. Always back up the registry before making any changes. If you do not feel comfortable editing the registry, do not attempt these instructions. Instead, seek the help of a trained computer specialist.

Display Data Prioritization can be changed by making changes to the Registry of the server.

1. Click Start, and then click Run.
2. In the Open box, type Regedit, and then click OK.
3. In the left pane, locate and then click the following registry key:

HKEY_LOCAL_MACHINE'SYSTEM'CurrentControlSet'Services'TermDD

The parameters you might want to change are:

* FlowControlDisable - If display data prioritization is disabled, all requests are handled on a first-in-first-out basis. The default value is 0. You can disable display data prioritization by setting the value to 1.
* FlowControlDisplayBandwidth - Controls the relative bandwidth priority for display (and input data). The default value is 70 and the maximum value allowed is 255.
* FlowControlChannelBandwidth - Controls the relative bandwidth priority for other virtual channels (such as clipboard, file transfers, or print jobs). The default value is 30 and the maximum value allowed is 255.
* FlowControlChargePostCompression - Determines if flow control will calculate the bandwidth allocation based on pre-compression or post-compression bytes. The default value is 0, which means that the calculation will be made on pre-compression bytes.

The bandwidth ratio for display data prioritization is based on the values of FlowControlDisplayBandwidth and FlowControlChannelBandwidth compared to each other. For example, if FlowControlDisplayBandwidth is set to 200 and FlowControlChannelBandwidth is set to 50, the ratio is 200:50.

Source: http://www.petri.co.il/

Wednesday, April 22, 2009

How to Manage server-side e-mail signatures with Policy Patrol 5?

The e-mail signature in Microsoft Exchange is difficult to manage. Users often make their own signatures, which may be in violation of company policy. This can include everything from improper use of logos, title misrepresentation, and even incorrect data. One way to manage this process is to put in server-side rules. Red Earth Software’s Policy Patrol 5 is one of the tools available for managing server-side e-mail signatures in Microsoft Exchange environments.

We’ve all seen e-mails that come from an organization where all the signatures look the same? That is a nice branding in my opinion. Among its other features, Policy Patrol has a rather advanced signature builder. It can drop in images, custom Active Directory fields, different behavior for new messages vs. replies, company logos, disclaimer text, and time-sensitive messages.

Server Support, Policy patrol 5

Pricing

Policy Patrol, as well as other tools in this space, are generally priced by user count and then increase with the price per user decreasing as tiers are crossed. List price for Policy Patrol 5 for 1,000 mailboxes and one year of maintenance is $1,004, which is barely more than $1 per mailbox per year. This is a good value for the functionality provided.

Source: blogs.techrepublic.com.com/datacenter/?p=766

Thursday, April 16, 2009

Remote Monitoring Service for Microsoft SharePoint

SharePoint managed services launched by Azaleos which introduced a remote monitoring service for Microsoft SharePoint which covers server & all other necessary infrastructure.

SharePoint Services draws the line at maintaining SharePoint and supporting infrastructure including Microsoft's SQL Server and Data Protection Manager (DPM), Web application servers, and SharePoint add-ons such as Excel and InfoPath forms. The management services & monitoring services will not stretch to content management, web site maintenance.

The advantage is that this service monitors 2000 data points from SharePoint Server, Internet Information Server (IIS) and SQL Server.

Advantages:

Azaleos covers system architecting
deployment and configuration
Testing & installation of patches
Backup and prevention of data
Monitoring Services

Azaleos is offering its SharePoint Services as a virtualized architecture, but also can monitor physical deployments. The base configuration is designed for Windows Server 2008 on Hyper-V.

Azaleos SharePoint Services starts at $15 per user per month.

Source: networkworld.com

Monday, April 13, 2009

Which network does Live Migration traffic use?

Every network in a cluster is assigned a metric based on its configuration, broken down into Does the network have a default gateway defined? If the network doesn't have a default gateway, the network is configured as a private network. If it has a gateway configured, the network is configured as a public network. Is the network enabled for cluster use?

Private networks that are enabled for cluster use get a metric starting at 1,000, and each additional private network get a metric incremented by 100. So the first private network enabled for cluster use gets a metric of 1,000, the next gets 1,100 and so on. If a private network isn't configured for cluster use, then it will get a much higher metric than public networks that are available for cluster use. Public networks that are enabled for cluster use get a metric starting at 10,000 and increment by 100 if there are multiple networks.

The cluster fault tolerant driver (NetFT.sys) uses the network with the lowest metric for the cluster Internet traffic, such as heartbeats, and for Cluster Shared Volume (CSV) traffic, which is why you need a 1 Gbps or 10 Gbps network for a cluster network if you're using CSV.

For the network used by live migration traffic, which is the memory of the virtual, delta copies of the virtual and then partition state (as well as CPU/device state, but this is a tiny amount of traffic) each virtual machine (VM) can have its own network priority order. By default, the nework with the second lowest metric is used while the lowest metric network, the one used by NetFT, is actually placed at the bottom of the network priority. This is because you don't want CSV traffic and live migration traffic going over the same network.

You can manually change which network is used by modifying the properties of the VM in Failover Cluster Manager and modifying the networks in the Network for live migration tab, as shown below. As you can see, the Cluster Network is moved to the bottom by default and my iSCSI network, which I unselected for use by the cluster, is still an available network for Live Migration.

Source: http://windowsitpro.com/mobile/pda/Article.cfm?ArticleID=101857&FAQ=1

Tuesday, April 7, 2009

Windows Server OS for Small Businesses by Microsoft

As expected, Microsoft Wednesday introduced a version of its Windows Server OS for small businesses with 15 users or less, filling in what the company sees as a gap in its server offerings.

Windows Server 2008 Foundation initially will be available in 40 countries once its OEM release servers for the new OS, since it will be sold exclusively through them. Hewlett-Packard, Dell and IBM should have those servers out sometime in the second half of this year, according to Microsoft.

Microsoft recommends using the new OS edition for basic small-business IT needs such as running and maintaining a database, Web-site hosting, running line-of-business applications, file- and print-sharing and remote access, among other uses.

Microsoft already has an OS and software bundle called Windows Small Business Server (SBS) aimed at the small-business market. But that package bundles the Windows Server OS with Exchange Server, SQL Server and other business software, and may be more than some very small companies need to run their businesses.

One thing that will make Windows Server 2008 Foundation more affordable for small businesses is that the OS does not require them to purchase client access licenses, which other Microsoft business software -- including SBS -- does. Instead, the OS is licensed by user accounts; however, each license is limited to a maximum of 15 user accounts, and each one of those accounts can only have one distinct user at a time.

Source: pcworld

Wednesday, April 1, 2009

Windows Embedded Server With Windows Server 2008 R2

Microsoft is not only hard at work laboring to produce the first Release Candidate of Windows 7, but it is also looking beyond the next iterations of the Windows client and server operating systems. The next version of Windows Embedded Server would be based on the Windows 7 platform, the Redmond company informed. In all fairness, Windows Embedded Server was a variant of Windows Server 2008 R2, Microsoft revealed, claiming that the new offering was positioned to take the Windows Embedded software-plus-services platform to the next level.

“The evolution of the Windows Embedded software-plus-services platform with the addition of Windows Embedded Server reflects the realization of Microsoft’s continued commitment to drive innovation and leadership in the embedded market by fostering the next generation of smart, connected, service-oriented devices and device services,” revealed Kevin Dallas, general manager of the Windows Embedded business unit at Microsoft.

According to the software giant, Windows Embedded Server is based on the Windows Server core and will permit original equipment manufacturers to develop dedicated server appliances with a focus on robust networking and large volumes of storage, while keeping a low footprint. In Microsoft's vision, the Windows Embedded Server OEM appliances will feature capabilities serving to streamline the setup and remote management associated with embedded devices.

“The combination of software plus services from Windows Embedded will establish new revenue channels for embedded OEMs and partners by utilizing Windows Embedded Server and the complete Microsoft portfolio of embedded platforms and technologies in scenarios such as device maintenance and support services,” Dallas added.

Source:

Thursday, March 26, 2009

Power Pack 2 for Windows Home Server by Microsoft

The next version of Windows Home Server, codenamed Vail, is expected to be a 64-bit only server, based on Windows Server 2008 R2 and could well be Microsoft's first 64-bit only consumer product. It is scheduled to be launched next year and will come with a re hauled user interface.

Microsoft has finally released Windows Home Server Power Pack 2 which is a free package that significantly improves WHS's core set of features especially and will be available as a Windows Update.

The current service pack would improvement remote access configuration, enhance functionality for PCs running Windows Media center.

Windows Home Server is essentially a more media friendly server operating system that allows home users to back up, access, share, and store content in a centralised vault.

Users will need Windows Home Server with Power Pack 1 installed on their home servers before installing Power Pack 2. Microsoft Windows Home Server Power Pack 1 can be purchased from for as little as £73 and comes in a 1 server - 10 Client Access Licenses.

Source: ITproportal

Tuesday, March 17, 2009

Security Configuration Wizard in Windows 2003 Server

New in Windows Server 2003 SP1 and R2, Microsoft has made available a tool that will help you to determine exactly what is running on your Windows Server 2003 system and be able to reduce the surface area of your server, thereby making it less vulnerable to an attack. In short, through the use of the Security Configuration Wizard, you can take a very granular look at your system and disable non-required functionality.

The Security Configuration Wizard does not automatically install when you install SP1 or R2. Follow these steps to install:

1. Go to Start | Settings | Control Panel
2. Choose Add or Remove Programs.
3. Choose Add/Remove Windows Components
4. Select the check box for Security Configuration Wizard, click Next. Make sure you have your source media available.

After installation is complete, the Security Configuration Wizard is available from Start > All Programs | Administrative Tools | Security Configuration Wizard.

When you initially run the tool, you need to provide a server to use as a baseline. Further in the Wizard, you will see a complete list of the potential roles for your server, from both a server and a client perspective. For example, you might have one server that runs the SMS 2003 server, and another that has the SMS 2003 client installed. Select the roles for this server. You can also choose whether to enable administrative services, such as BITS (Background Intelligent Transfer Service), Browser, Browse Master, Remote Desktop, SQL Server Agent, and more. Microsoft can't be on top of every possible server service on your server, so the Wizard also provides you with the capability to either ignore or disable any services that are not on the lists.

Beyond services, the Wizard also allows you to specifically allow or deny specific TCP/IP ports. Also, you can use the tool to restrict access to a specific TCP/IP port to a single computer or a range of IP addresses. For example, if you want to allow only people on your administrative network permission to establish any kind of connection using Remote Desktop, you could restrict port 3389 to just that subnet.

You can also make policy changes that affect the handling of SMB file and print traffic. For example, if your server has enough excess capacity, you can require signing for all SMB traffic to prevent man-in-the-middle type attacks on your clients. The same goes for signing all LDAP traffic. In the policy, you can indicate that all clients that connect run a version of at least SP3 for Windows 2000 to help protect LDAP information on your network.

Other areas addressed in the tool:

* Audit settings: Determine if you want to enable auditing and, if so, if you want to log successful, or both successful and unsuccessful activities.
* IIS: Which IIS extensions do you want to enable? For example, ASP.NET 1.1, ASP.NET 2.0, Server Side Includes, WebDAV, etc. Also, which virtual directories should be enabled? You might want, for example, to block access to the IISAdmin folder.

Thursday, March 12, 2009

Way to Change Computer Name on Windows Server 2008

Default installations of Windows Server 2008 give the server a name like WIN-94CX1930EF21 or some other obscure pattern that doesn’t fit into most computer infrastructures. You can change the computer name using the netdom command. Netdom (which isn’t a new tool) is an easy way to change the computer name after Windows Server 2008 is installed on Core Editions. You can also use it on the full installation versions.

It’s pretty straightforward to use the netdom command. For example, let’s go from the default name WIN-94CX1930EF21 to a computer name of SERVER13. This is the command you would enter:

netdom renamecomputer WIN-94CX1930EF21 /Newname SERVER13

Once this is complete, you get a friendly prompt that renaming a system may cause certain services to fail. Because of this warning, it is a good idea to rename the server early in the build process.

Windows Server 2008 Core Edition

The server is successfully renamed after the requested system reboot.

If you want to join the system to an Active Directory domain, the same command is used except extra parameters are required. If the computer account already has the correct name, a command like the following will join a Windows Server 2008 server to a domain:

netdom join /DOMAIN:RWVDEV server13 /userD:RWVDEV\Administrator /password:*


Source: http://blogs.techrepublic.com.com/datacenter/?p=594

Wednesday, March 4, 2009

Amazon Extends EC2 Windows Support Into Europe

Seattle-based Amazon Web Services LLC, the web services subsidiary of Amazon.com, announced this morning that it has extended support for Microsoft Windows server and Microsoft SQL Server into Europe. The firm said the Amazon EC2 Windows support--which was launched in October for users in the US--will be available to its EU Region customers today, including access to the new features in the AWS Management Console, Amazon's interface for managing EC2 instances.

Amazon has been rolling out its cloud computing services to Europe after ironing out the services in the US: the firm only rolled out local, EC2 support in Europe in December. Amazon's EC2 services running Windows includes support for ASP.NET, AJAX, Silverlight, and Internet Information Server (IIS), along with SQL Server Express and SQL Server Standard.

EC2 is Amazon's cloud computing service, which allows customers to create virtual server images in either Linux or Windows via an API; those servers can be used to scale out web applications or create cloud computing farms, billed by how much CPU and traffic is send to those servers.

Source: http://www.nwinnovation.com/amazon_extends_ec2_windows_support_into_europe/s-0020241.html

Wednesday, February 25, 2009

How to Choose IT Network Server Support Company?

Whether you are a large company or small, you would always require tech help. You will find that something can foretell your technical support requirement based on what your company's future plans are. Choosing a good small business computer support services will ensure that your IT network is going to stay in good shape and that you will be able to work in a trouble free environment. On the other hand, choosing a company poorly rated could get you into a contract which will put you in a difficult situation down the line. This decision can make or break your tech support.

Your small business encounters numerous security threats, some more obvious than others. These events can lead to data loss, cause harm to your competitive advantage, or spoil your daily operations. With increasing technology thefts and security violations, computer security has become a critical part of your overall IT infrastructure.

Small businesses necessitate that additional steps must be taken to secure data on their desktops and workstations. To get the work done, you can look forward to any good server support company like iYogi, Dell, Microsoft etc...

If you are in a situation where you are looking for a great small business tech support company, you can't go wrong by doing a lot of research. What tech support companies are devoted to giving companies of your size and your industry good services? Who is well known for good tech help service, and who is getting blasted on reviews sites for poor standards? While you should always take what you see on review sites with a grain of salt, you will find that there is usually some truth to them. A lot of complaints or a history with the Better Business Bureau is something that should make you wary.

Look at the maximum amount of downtime that they promise. When a problem happens, what is the maximum amount of time that it will take for them to fix it? In many ways, this is something that can be quite indicative of what their tech support service is like. Make sure that their business tech support will cover you at all times of the day and take some time to plan out a worst case scenario. What are you looking at when you are considering entering into their services? Unless you can live with their lowest promised rates, you will want to go to someone else. Figuring out what your options are and what you can do when you are looking to get their attention is something that goes a long way towards getting you the results and the tech support company that you need.

Thursday, February 12, 2009

Windows Server 2008: Active Directory Domain Services Auditing Capabilities Explained

Active Directory Domain Services Auditing has remained fairly consistent since the first release of Active Directory in Windows 2000 Server. However, Microsoft has introduced new Active Directory Domain Services auditing capabilities in Windows Server 2008. Active Directory Domain Services auditing in Windows Server 2008 provide more granular auditing capabilities and more control.

This article takes a deeper look at the new Active Directory Domain Services auditing capabilities in Windows Server 2008.

New Default Auditing Settings in Group Policy

Windows 2000 Server and Windows Server 2003 enabled auditing for a number of policies by default. However, Windows Server 2008 does not define these global audit settings by default. These settings are instead defined by using the new auditing subcategories. This may seem as though auditing is not configured by default, however this is not the case. The configuration of the global audit settings is inherited by the subcategories below that global audit setting. Therefore, Microsoft chose to configure specific subcategories by default, which is covered in the next section.

New Auditing Subcategories

As previously mentioned, Windows Server 2008 introduces auditing subcategories. The following table shows the subcategories below each global audit setting, as well as the default configuration for each audit subcategory.


Global Audit Setting

Subcategory

Default Setting

Audit Account Logon Events

Kerberos Service Ticket Operations

Success

Other Account Logon Events

No Auditing

Kerberos Authentication Service

Success

Credential Validation

Success

Audit Account Management

Computer Account Management

Success

Security Group Management

Success

Distribution Group Management

No Auditing

Application Group Management

No Auditing

Other Account Management Events

No Auditing

User Account Management

Success

Audit Process Tracking

Process Termination

No Auditing

DPAPI Activity

No Auditing

RPC Events

No Auditing

Process Creation

No Auditing

Audit Directory Service Access

Directory Service Changes

No Auditing

Directory Service Replication

No Auditing

Detailed Directory Service Replication

No Auditing

Directory Service Access

Success

Audit Logon Events

Logoff

Success

Account Lockout

Success

IPsec Main Mode

No Auditing

IPsec Quick Mode

No Auditing

IPsec Extended Mode

No Auditing

Special Logon

Success

Other Logon/Logoff Events

No Auditing

Logon

Success and Failure

Audit Object Access

File System

No Auditing

Registry

No Auditing

Kernel Object

No Auditing

SAM

No Auditing

Certification Services

No Auditing

Application Generated

No Auditing

Handle Manipulation

No Auditing

File Share

No Auditing

Filtering Platform Packet Drop

No Auditing

Filtering Platform Connection

No Auditing

Other Object Access Events

No Auditing

Audit Policy Change

Authentication Policy Change

Success

Authorization Policy Change

No Auditing

MPSSVC Rule-Level Policy Change

No Auditing

Filtering Platform Policy Change

No Auditing

Other Policy Change Events

No Auditing

Audit Policy Change

Success

Audit Privilege Use

Non Sensitive Privilege Use

No Auditing

Other Privilege Use Events

No Auditing

Sensitive Privilege Use

No Auditing

Audit System Events

Security System Extension

No Auditing

System Integrity

Success and Failure

IPsec Driver

No Auditing

Other System Events

Success and Failure

Security State Change

Success



Source: http://www.enterpriseitplanet.com/networking/features/article.php/3797931

Wednesday, February 4, 2009

SBS 2008 to SBS 2008 Migration Fails When "Windows SBS User Policy" Edited

Windows Small Business Server 2008 creates a group policy called "Windows SBS User Policy", one of the tasks of this group policy is to add a few shortcuts (OWA, RWW, and WSS) to IE on SBS clients. If this list is modified AND you attempt a SBS 2008 to SBS 2008 migration the migration will irrecoverably fail. You will receive this following installation issue and be unable to complete the migration:

The installation of Windows Small Business Server 2008 cannot finish.

At this point, you must restore the original server from backup and completely start the migration process over. To avoid this issue please complete the following steps prior to a SBS 2008 to SBS 2008 migration:

Note: This only needs to be done if the policy has been edited. If you're not sure, there is no harm in doing these steps as a precaution.

  1. Open gpmc.msc and edit the "Windows SBS User Policy".
  2. Navigate to User Configuration -> Policies -> Windows Settings -> Internet Explorer Maintenance -> URLs.
  3. View the properties of Favorites and Links.
  4. Make a note of all the Favorites and Links (This has likely been customized from the default).
  5. Remove all the Favorites and Links and save the policy.

Once you complete the migration, the favorites for OWA, RWW and Companyweb will be automatically recreated. You will then have to manually re-add your custom URLs.

SBSSetup.log Errors:

[908] 080925.155308.3044: Setup: Task ConfigureIE succeeded.
[908] 080925.155308.3200: TaskManagement: In TaskScheduler.RunTasks(): The "ConfigureIE" Task or the "NET" TaskProcessor threw an Exception during the ITaskProcessor.Run() call:System.NullReferenceException: Object reference not set to an instance of an object.
at Microsoft.WindowsServerSolutions.ClientSetup.IEUtility._normalFavoritesEX()
at Microsoft.WindowsServerSolutions.ClientSetup.IEUtility..ctor()
at Microsoft.WindowsServerSolutions.ClientSetup.IEUtility.DelIEFavorites(String keyName)
at Microsoft.WindowsServerSolutions.IWorker.Tasks.ConfigureIE.Run(ITaskDataLink DataLink)
at Microsoft.WindowsServerSolutions.TaskManagement.TaskProcessors.NetTaskProcessor.Run(Task currentTask, ITaskDataLink dataLink)
at Microsoft.WindowsServerSolutions.TaskManagement.Data.Task.Run(ITaskDataLink dataLink, IDictionary`2 taskProcessorMap)
at Microsoft.WindowsServerSolutions.TaskManagement.TaskScheduler.RunTasks(String taskListId, String stateFileName)

[908] 080925.155308.3200: Setup: An error was encountered on the TME thread: System.NullReferenceException: Object reference not set to an instance of an object.
at Microsoft.WindowsServerSolutions.ClientSetup.IEUtility._normalFavoritesEX()
at Microsoft.WindowsServerSolutions.ClientSetup.IEUtility..ctor()
at Microsoft.WindowsServerSolutions.ClientSetup.IEUtility.DelIEFavorites(String keyName)
at Microsoft.WindowsServerSolutions.IWorker.Tasks.ConfigureIE.Run(ITaskDataLink DataLink)
at Microsoft.WindowsServerSolutions.TaskManagement.TaskProcessors.NetTaskProcessor.Run(Task currentTask, ITaskDataLink dataLink)
at Microsoft.WindowsServerSolutions.TaskManagement.Data.Task.Run(ITaskDataLink dataLink, IDictionary`2 taskProcessorMap)
at Microsoft.WindowsServerSolutions.TaskManagement.TaskScheduler.RunTasks(String taskListId, String stateFileName)
at Microsoft.WindowsServerSolutions.Setup.SBSSetup.ProgressPagePresenter._RunTasks(Object sender, DoWorkEventArgs e)
[2228] 080925.155308.5384: Setup: _UnhandledExceptionHandler: Setup encountered an error: System.Reflection.TargetInvocationException: Exception has been thrown by the target of an invocation. ---> System.Reflection.TargetInvocationException: The TME thread failed (see the inner exception). ---> System.NullReferenceException: Object reference not set to an instance of an object.
at Microsoft.WindowsServerSolutions.ClientSetup.IEUtility._normalFavoritesEX()
at Microsoft.WindowsServerSolutions.ClientSetup.IEUtility..ctor()
at Microsoft.WindowsServerSolutions.ClientSetup.IEUtility.DelIEFavorites(String keyName)
at Microsoft.WindowsServerSolutions.IWorker.Tasks.ConfigureIE.Run(ITaskDataLink DataLink)
at Microsoft.WindowsServerSolutions.TaskManagement.TaskProcessors.NetTaskProcessor.Run(Task currentTask, ITaskDataLink dataLink)
at Microsoft.WindowsServerSolutions.TaskManagement.Data.Task.Run(ITaskDataLink dataLink, IDictionary`2 taskProcessorMap)
at Microsoft.WindowsServerSolutions.TaskManagement.TaskScheduler.RunTasks(String taskListId, String stateFileName)
at Microsoft.WindowsServerSolutions.Setup.SBSSetup.ProgressPagePresenter._RunTasks(Object sender, DoWorkEventArgs e)
at System.ComponentModel.BackgroundWorker.WorkerThreadStart(Object argument)
--- End of inner exception stack trace ---
at Microsoft.WindowsServerSolutions.Setup.SBSSetup.ProgressPagePresenter.TasksCompleted(Object sender, RunWorkerCompletedEventArgs e)
--- End of inner exception stack trace ---
at System.RuntimeMethodHandle._InvokeMethodFast(Object target, Object[] arguments, SignatureStruct& sig, MethodAttributes methodAttributes, RuntimeTypeHandle typeOwner)
at System.RuntimeMethodHandle.InvokeMethodFast(Object target, Object[] arguments, Signature sig, MethodAttributes methodAttributes, RuntimeTypeHandle typeOwner)
at System.Reflection.RuntimeMethodInfo.Invoke(Object obj, BindingFlags invokeAttr, Binder binder, Object[] parameters, CultureInfo culture, Boolean skipVisibilityChecks)
at System.Delegate.DynamicInvokeImpl(Object[] args)
at System.Windows.Forms.Control.InvokeMarshaledCallbackDo(ThreadMethodEntry tme)
at System.Windows.Forms.Control.InvokeMarshaledCallbackHelper(Object obj)
at System.Threading.ExecutionContext.runTryCode(Object userData)
at System.Runtime.CompilerServices.RuntimeHelpers.ExecuteCodeWithGuaranteedCleanup(TryCode code, CleanupCode backoutCode, Object userData)
at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
at System.Windows.Forms.Control.InvokeMarshaledCallback(ThreadMethodEntry tme)
at System.Windows.Forms.Control.InvokeMarshaledCallbacks()
at System.Windows.Forms.Control.WndProc(Message& m)
at System.Windows.Forms.Control.ControlNativeWindow.WndProc(Message& m)
at System.Windows.Forms.NativeWindow.DebuggableCallback(IntPtr hWnd, Int32 msg, IntPtr wparam, IntPtr lparam)
at System.Windows.Forms.UnsafeNativeMethods.DispatchMessageW(MSG& msg)
at System.Windows.Forms.Application.ComponentManager.System.Windows.Forms.UnsafeNativeMethods.IMsoComponentManager.FPushMessageLoop(Int32 dwComponentID, Int32 reason, Int32 pvLoopData)
at System.Windows.Forms.Application.ThreadContext.RunMessageLoopInner(Int32 reason, ApplicationContext context)
at System.Windows.Forms.Application.ThreadContext.RunMessageLoop(Int32 reason, ApplicationContext context)
at Microsoft.WindowsServerSolutions.Common.Wizards.Framework.WizardFrameView.Create()
at Microsoft.WindowsServerSolutions.Common.Wizards.Framework.WizardChainEngine.Launch()
at Microsoft.WindowsServerSolutions.Setup.SBSSetup.MainClass._LaunchWizard()
at Microsoft.WindowsServerSolutions.Setup.SBSSetup.MainClass.RealMain(String[] args)
at Microsoft.WindowsServerSolutions.Setup.SBSSetup.MainClass.Main(String[] args)
[2228] 080925.155308.5696: Setup: Removed the password.
[2228] 080925.155308.5696: Setup: Deleting scheduled task at path Microsoft\Windows\Windows Small Business Server 2008 with name Setup
[2228] 080925.155308.5852: Setup: Removed SBSSetup from the RunOnce.

Source & inspiration: http://blogs.technet.com/sbs/archive/2008/12/16/sbs-2008-to-sbs-2008-migration-fails-when-windows-sbs-user-policy-edited.aspx

Friday, January 30, 2009

Windows Home Server for Small Business

(Business Wire) LPI Level Platforms Inc, the global leader in remote monitoring and management software for solution providers and managed services providers today announced that the Small Office/Home Office (SOHO) market is now “open for business” with Microsoft’s Windows Home Server.

While the millions of SOHO businesses have the greatest need for outsourced IT, cost and technology limitations have made this an elusive target for managed services providers.

With Level Platforms award-winning Managed Workplace installed on a Windows server, solution providers can now deliver end-to-end remote management of workgroup networks including monitoring of all devices (servers, PCs, network devices, printers, IP telephony, etc.), all applications running on Windows devices, alerting, full asset management, remote control, patch management, back up and security, extensive reporting, local storage and much more at a very low cost easily affordable to SOHO businesses.

“With this announcement we are radically expanding the size of their available market and bringing the benefits of managed services to millions of businesses that were not previously accessible to the service provider community.” said Peter Sandiford, CEO Level Platforms.

“By adding the Windows Home Server as a supported platform for Managed Workplace, Level Platforms has opened the doors to a hugely underserviced and important segment of the business market.” said Aaron Booker, President of Hardlines, a Washington-based solution provider focused on the small business market.

“We are excited to work with Level Platforms to extend the value of Windows Home Server to the Small Office/Home Office market,” said Charlie Kindel, General Manager, Windows Server Solutions Group, Microsoft (NASDAQ:MSFT). “This solution will help Microsoft Partners introduce the benefits of Windows Server technology to a large and important market segment establishing a solid foundation for improved performance and reliability today and growth for the future.”

Source: http://www.earthtimes.org/articles/show/windows-home-server-for-small-business,697081.shtml

Friday, January 23, 2009

Red Hat Gives Boost To Virtual Server Support

Red Hat decide to give some boost to virtual server support. Red Hat's Enterprise Linux 5.3 release is a sign of the times, both in terms of the growing importance companies are placing on the scalability of virtual environments and as an example of the maturity of enterprise Linux.

Launched Tuesday, Red Hat Enterprise Linux 5.3 supports virtual servers with up to 32 virtual CPUs and 80 GB of memory, and includes new performance-boosting features such as Hugepage memory andIntel Extended Page Tables. Red Hat has also bumped physical server support to 126 CPUs and 1 TB of main memory.

Red Hat Enterprise Linux 5.3 also adds support for Intel Core i7 processors and OpenJDK, the official open-source core of the Java SE specification. The integration of OpenJDK marks the culmination of a push that began more than 18 months ago to shift Red Hat's development resources away from in-house projects and toward OpenJDK.

In November 2007, Red Hat signed Sun's OpenJDK license agreement and licensed Sun's Java Standard Edition (SE) technology compatibility kit, essentially paving the way for Red Hat to develop an officially compatible open-source Java Development Kit for Red Hat Enterprise Linux.

While the new additions to Red Hat Enterprise Linux 5.3 are noteworthy, the new release shows that Linux purveyors are more focused on performance and new hardware and standards support than they are on adding game-changing new features, according to Gordon Haff, a principal IT adviser at research firm Illuminata.

Source:http://www.crn.com/software/212901511

Friday, January 16, 2009

How to install the Windows 2000 Support Tools to a Windows 2000 Server-based computer

Support personnel and network administrators can use the Windows 2000 Support Tools to help manage their networks and troubleshoot problems. Note that you should install the Windows 2000 Support Tools before you contact Microsoft for support. This article describes how to install the Windows 2000 Support Tools to a Windows 2000 Server-based computer.

Install Windows 2000 Support Tools

To install the Windows 2000 Support Tools:-

1. Start Windows 2000. Note that you must log on as a member of the administrator group to install these tools.
2. Insert the Windows 2000 CD-ROM into your CD-ROM drive.
3. Click Browse this CD, and then open the Support\Tools folder.
4. Double-click Setup.exe, and then follow the instructions that appear on the screen.

The following tools are included with Windows 2000:

Acldiag.exe
Adsiedit.msc
Apcompat.exe
Apmstat.exe
Browstat.exe
Clonepr.dll
Dcdiag.exe
Depends.exe
Dfsutil.exe
Dnscmd.exe
Dommig.doc
Dsacls.exe
Dsastat.exe
Dskprobe.exe
Dumpchk.exe
Filever.exe
Gflags.exe
Kill.exe
Ksetup.exe
Ktpass.exe
Ldp.exe
Memsnap.exe
Movetree.exe
Msicuu.exe
Msinfo32.exe
Msizap.exe
Netdiag.exe
Netdom.exe
Nltest.exe
Pmon.exe
Poolmon.exe
PPTP Ping
Pviewer.exe
Reg.exe
Remote.exe
Repadmin.exe
Replmon.exe
Rsdiag.exe
Rsdir.exe
Sdcheck.exe
Search.vbs
SIDWalker
Snmputilg.exe
Tlist.exe
W2000msgs.chm
Windiff.exe
Winrep.exe
Wsremote.exe

Source: http://support.microsoft.com/kb/301423

Wednesday, January 14, 2009

Online Server Support Services For your Small Businesses

Are you offend of dealing with pesky server problems, always displaying messages such as 'Cannot create a connection to data source' or 'login failed for user 'username' or other errors such as 'login failed for user 'not authority'?

Resolve all these server issues once and for all with the help of professional System Engineers? You can easily find them through leading online technical support resources. They offer critical server support through remote sessions. Entirely focusing on leading technology, these expert technicians give their best to leverage the best out of their technical knowledge and skills to cater your server support requirements.

By using different technologies, tools and products, these system engineers diagnose your server to determine errors and troubleshoot all issues and faulty items causing execution failure. And this all is done right away without wasting any time. Consequentially, they plan the maintenance of swap-out for the most convenient time.

Online server support services are gaining in popularity primarily with small businesses. There are several different factors pushing popularity of online server support services with major being 24x7 availability and experts' help at the most affordable prices.

System Engineers working with online technical support resources are known to follow a precise as well as meticulous approach to cut down the cost of IT support services and increase the overall efficacy of services. This allows customers to work out their IT competencies to achieve business objectives.

Exclusive online server support resources like iYogi offer remote monitoring and management for all components of your server infrastructure, including systems at the Operating System level, custom applications, databases, networks, and the Internet. You can also ask for personalized solutions to fulfill your unique business needs.

Moreover, you can ask your support technicians for tweaks to maintain an efficient server network. It is always recommended to not to overload your server with too many photos loading in web pages especially those with large sizes.

Always clean up your blog mess on regular basis. Remove widgets and other files in your header, sidebar and footer that are no longer useful. All such tips will help you to cut load on your server and upload your web pages fast.

Source: http://ezinearticles.com/?Server-Support&id=1374938