John Dvorak: Apple should pull the plug on the iPhone

John Dvorak on the iPhone in his Second Opinion column titled “Apple should pull the plug on the iPhone”: These phones go in and out of style so fast that unless Apple has half a dozen variants in the pipeline, its phone, even if immediately successful, will be passé within 3 months. Interesting and opinionated, […]

More →

Back Pressure and Exchange Server Transport error 452 4.3.1 Insufficient system resources

In my hotel room in Orlando, getting ready for an Exchange 2007 transport presentation tomorrow morning at TechMentor. When trying to telnet to the SMTP port of an Exchange 2007 Hub Transport server, I got the following error: 452 4.3.1 Insufficient system resources Not a good thing the night before a presentation – Murphy’s law […]

More →

Internetnews.com: Surprise, Microsoft Listed as Most Secure OS!

Microsoft has no dearth of critics as far as security goes, particularly from the open source bandwagon. Apple’s commercials certainly show no mercy when talking about this issue, and frankly the commercials are quite funny and well-executed, imo (..but then isn’t marketing the art or science of being as far removed from the facts as […]

More →

Zenprise named Gartner Cool Vendor in IT Operations Management

Reputed analyst firm Gartner has just named Zenprise as a Gartner Cool Vendor in IT Operations Management space! After winning a number of awards between last year and this – including InfoWorld’s 2007 Technology Of The Year award (Best Exchange Troubleshooting Solution), SearchExchange.com’s Product Of The Year award (Exchange Server Reporting & Management), and the […]

More →

Locating Exchange Server 2007 CAS role in the perimeter?

Where should you locate Exchange Server 2007 servers with the Client Access Server (CAS) role? Is it more secure to locate them in perimeter network (aka “DMZ” or demilitarized zone)? Security folks in many organizations insist that any server that needs to be accessed from external networks (i.e. the Internet) should reside in perimeter networks. […]

More →

DST 2007: Why we needed to rebase appointments

I thought I wouldn’t need to post about DST 2007 issues after it kicked in on Sunday March 11th this year, but apparently that doesn’t seem to be the case. In a previous post (that I’ve referred to a number of times now) titled “DST 2007: Understanding what needs to be done and how to […]

More →

Enabling POP3 in Exchange Server 2007

As Terry Myerson posted on the Exchange team blog not too long ago (read previous post titled ” Exchange Server 2007 SP1: A bag of goodies!“), the Exchange Management Console will get POP and IMAP management – amongst other features – in Exchange Server 2007 SP1. Till then, the shell is the only option to […]

More →

Computerworld: Microsoft’s ‘MVPs’ say they’re often its sharpest critics

During last week’s MVP Summit, ComputerWorld carried an interesting article on Microsoft’s Most Valuable Professional (MVP) program, titled “Microsoft’s ‘MVPs’ say they’re often its sharpest critics“. As Paul Robichaux noted on his blog, “…and no, I’m not saying this just because he quoted me”. What I found interesting was the ensuing debate in the article’s […]

More →

HOW TO: Remove values from multi-valued properties using Exchange shell

Related to the previous posts “HOW TO: Add additional email addresses to a recipient” and “HOW TO Update multi-valued attributes in PowerShell” – removing one or more values from a multi-valued property is equally easy (though not a one-liner… ). The following example shows you how to remove a domain from the list of BypassedSenderDomains […]

More →

Add additional email addresses to a mailbox

In Exchange 2010/2007, you can use Email Address Policies to generate email addresses for your recipients (mailbox users, mail users, distribuiton groups, public folders, etc.). In Exchange 2003/2000, this was done by Recipient Policies. Policies are a great way to assign standardized email addresses across your organization – for example: <firstinitial><lastname>@<domain>. Users frequently request additional […]

More →