Google weighs in on Microsoft purchase of Yahoo, Yahoo may look to Google for help

On

Google’s senior vice president and chief legal officer, David Drummond, said in the company’s blog on Feb. 3 that given Microsoft’s anti-competitive conduct in the past, coupled with its continued dominance in the technology industry, would threaten “innovation and openness” on the…

Microsoft aims to bridge your trust with new strategy

On

Microsoft’s long history of security problems gives most CIOs significant heartburn, especially when they consider the conditions under which they’ll open up Microsoft systems to the Internet. And recent developments with the .NET MyServices initiative haven’t helped. First, Microsoft announced a far-reaching…

Do You like Windows 7?

On

Windows 7 is the latest public release version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. Windows 7’s server counterpart, Windows…

Should you use SQL Server Express Edition or Microsoft Access for your small business applications?

On

When you’re weighing you options in database applications, it helps to make a feature-by-feature comparison. This overview will look at the feature sets of the Express edition of SQL Server 2005 and Microsoft Access. I did my best to avoid including too…

Microsoft fixes remote code execution flaw in Exchange 5.5 OWA

On

For its regular monthly security announcement in August 2004, Microsoft released only a single Security Bulletin, MS04-026, “Vulnerability in Exchange Server 5.5 Outlook Web Access Could Allow Cross-Site Scripting and Spoofing Attacks.” This vulnerability, which could allow a remote attacker to run…

Microsoft fixes remote code execution flaw in Exchange 5.5 OWA

On

For its regular monthly security announcement in August 2004, Microsoft released only a single Security Bulletin, MS04-026, “Vulnerability in Exchange Server 5.5 Outlook Web Access Could Allow Cross-Site Scripting and Spoofing Attacks.” This vulnerability, which could allow a remote attacker to run…