Enterprise Infrastructure Management

Email Alerts

Register now to receive SearchWindowsServer.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • thunk

    Thunk is programming that converts 16-bit memory address space into 32-bit memory address space and vice versa. 

  • Microsoft Management Console (MMC)

    The Microsoft Management Console (MMC) is an application that provides a graphical-user interface (GUI) and a programming framework in which consoles (collections of administrative tools) can be created, saved, and opened. 

  • Windows Hardware Quality Labs (WHQL)

    Windows Hardware Quality Labs (WHQL) is a Microsoft procedure for certifying that the hardware for peripherals and other components is compatible (works as expected) with Microsoft Windows operating systems. 

  • computer

    A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program or sequence of instructions on how the data is to be processed. 

  • swap file (swap space or pagefile)

    A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM). 

  • COM+

    COM+ is an extension of Component Object Model (COM), Microsoft's strategic building block approach for developing application programs. 

  • word processor

    A word processor is a computer program that provides special capabilities beyond that of a text editor such as the WordPad program that comes as part of Microsoft's Windows operating systems. 

  • blue screen of death (BSOD)

    The blue screen of death (BSOD), is the informal name given by users to the Windows general protection fault (GPF) error. 

  • Weak passwords can make your company vulnerable

    Passwords can make your company vulnerable to hackers. By using passphrases, instead of passwords, you can tighten up the security of your infrastructure. Expert Derek Melber tells you how to do it. 

  • Take advantage of privilege delegation and off-load your work!

    Active Directory has a feature that could be useful to administrators grappling with assigning administrative privileges to users.