Title: searchWin2000.com - Today's News: Headlines, trends and technical advice for Windows pros
An e-newsletter published by SearchWin2000.com 
 February 19, 2004 >> Receive this e-mail as text   >> About this e-mail 
ISSUE SPONSORED BY:
>>  SurfControl: Ensure critical corporate governance requirements are met
 Today's Highlights  

>>  LEAD STORY:  Modern Windows less tolerant of sloppy apps
>>  NEWS:  Yankee says patching costs companies millions
>>  EXPERT WEBCAST:  Selecting managed network security services
>>  THE MISSING LINK:  Internet unites teen with truth
 News and Top Stories  

LEAD STORY
Modern Windows less tolerant of sloppy apps  (SearchWin2000.com)
Windows desktop expert Jerry Honeycutt offers advice on migrating legacy applications to newer versions of Microsoft's operating system.
More on this topic:
How to avoid app deployment disasters
Submit a question to desktop expert Jerry Honeycutt
SPONSORED BY: SurfControl

Ensure critical corporate governance requirements are met.

Due to recent management scandals at several major corporations, there is an emerging focus on regulatory compliance. Content filtering software can help companies prevent the release of confidential data and remove unwanted Internet content. This white paper, 7 Tips to Enforcing Corporate Governance Policy on your Network, will provide seven useful tips to help cut through the tangle of policies governing content management.


Click here for your free white paper.
NEWS
Yankee says patching costs companies millions (SearchSecurity.com)
Patching systems is a major drain on enterprise finances. New Yankee Group research says that it costs more than $1 million a year per patch to keep 5,000 desktops up to date.

NEWS
Windows code leak may have unintended benefit (InternetNews.com)
Leaked Windows code may actually lead to improvements in the operating system, some industry observers say. In the coming months, Microsoft will likely receive suggestions from developers across the globe on how to improve the operating system based on what they've seen on the Internet.

DAILY HEADLINES
All headlines, including those below, are available from our news page.
  > Netsky no longer flying high
  > Testing begins on Microsoft's Virtual Server
  > Is now the time for an e-mail migration?
  > SAS CIO sets example for whole company
 VIEW ALL NEWS AND TOP STORIES

 Announcements & Links  


EXPERT WEBCAST
Selecting managed network security services
In this expert webcast, Ed Yakabovicz, information security for the corporate Internet group at Bank One, talks about how more businesses are hiring outsourcers to manage security, from firewalls to VPNs and everything in between. Find out about the choices and how to select the best security services for your network.
Click here to watch and listen to this expert webcast.


WORD CHALLENGE
Framework for MS compound doc technology
This is Microsoft's framework for a compound document technology. Part of Microsoft's ActiveX technologies, this takes advantage and is part of a larger, more general concept, the Component Object Model (COM) and its distributed version, DCOM.
Think you know the term? Click here to find out.


IT SURVIVAL KIT
Customize default user profiles
When different users log on locally to the same Windows 2000 computer, Windows uses a factory-supplied default user profile as a template to create a profile for each user. However, it is possible for the administrator to provide customizations to the default profile that all users can share.
Click here to learn how.


FEATURED TOPIC
Build an affordable test lab at home
A virtual IT training lab? Readers were intrigued by the use of virtual software to help pass their certification exams.
Find out more in this collection of articles and member feedback.


READER POLL
Windows source code leaked
Do you care about the leaking of the Windows source code?
Cast your vote in our current poll.



THE MISSING LINK
Internet unites teen with truth

You just never know what you can learn about yourself when you enter your name in an Internet search engine. One 17-year-old boy in Southern California got a real shock when he "googled" himself. He ended up on a Web site devoted to missing children and found out that his mother had kidnapped him in 1989 from his father's home in Canada. Surprise! The mom has now been arrested, but the teenager isn't sure he wants to return to chilly Alberta after 15 years in sunny Los Angeles.



Sign up for our white paper alerts today!
Enter your e-mail and start receiving White Paper Alerts.
E-mail
  
Not a member? We'll activate your membership with your subscription.


  Contact Us  

NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.


SENIOR SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.


SITE EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your bloopers and Featured Topic ideas.


SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.


ASSOCIATE EDITOR
Matt Danielsson
[EMAIL PROTECTED]
Send me your ideas for webcasts and discussion day topics.


ASSISTANT EDITOR
Jennifer Luscomb
[EMAIL PROTECTED]
Send me your favorite Web sites and white papers.


ASSISTANT EDITOR
Vandana Sharma
[EMAIL PROTECTED]
Send me your tips and your true IT bloopers.


SENIOR SITE SALES MANAGER
Gabrielle Derussy
[EMAIL PROTECTED]
Contact me to sponsor this or any other TechTarget newsletter.


A B O U T   T H I S   N E W S L E T T E R
Contact us:
SearchWin2000
MemberServices
117 Kendrick Street, Suite 800
Needham, MA 02494

This e-newsletter is published by SearchWin2000.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals.
Copyright 2004 TechTarget. All rights reserved.

To unsubscribe from "Today's News":

Go to unsubscribe: http://searchWin2000.techtarget.com/unsubscribe?track=NL-118

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Reply via email to