SQL Server Merge Replication FTP: the ultimate guide to remote database synchronization

Microsoft SQL Server is a database plenty of features regarding replication, mirroring and failover clustering. All of them are strategies and configurations whose purpose is, with different ways of acting, to make data always available to client applications, in case of crashes and disservices, or simply to replicate data in more geographic locations to increase accessibility and availability performances. In this tutorial we won’t […]

Read More

Advantages and Features of Exchange Server 2016

Exchange Server 2016 has been around for two years now when this article is written, and it already hits its 7th cumulative update. As stated in Microsoft Technet article, Exchange Server 2016 has been made to be more scalable, more efficient in hardware utilization, and more effective in failure isolation compared to its predecessor. Changes […]

Read More

Using OneDrive for Business to work smarter and more effectively

OneDrive for Business is a platform from Microsoft that provides space in the cloud for you to store your work files so you can access it from anywhere using internet connection. You can also share the files easily to your peers within your organization or 3rd parties, and in addition to that, you can manage […]

Read More

Restore Exchange Server using Windows Server Backup

When restoring an Exchange server using Windows Server Backup (WSB) role, the administrator must ensure that the backup is an Exchange-aware VSS-based backup. Having an Exchange-aware VSS-based backup is important to minimize the issue that will occur upon restoring the backup. An Exchange-aware backup can only be created by using plugin WSBExchange that does not […]

Read More

Mount and Browse Hyper-V or vSphere Virtual Disk File

Virtual disk file is equivalent to the physical hard disk of our physical machine. It could contain the operating system that runs on the Virtual Machine itself, as well as the folders and files. When a VM is backed up from the host level, what happens in the background is the VM’s virtual disk file […]

Read More

Defend Your Business against PETYA Ransomware

After WannaCry, the ransomware that brings down many systems around the world last month, a similar cyber threat named PETYA is now going viral. Just like WannaCry, this ransomware locks up the system and force the victims to pay with Bitcoins worth $300 if they want to obtain the key that can be used to […]

Read More

Incremental Backup and Changed Block Tracking

Administrators are very familiar with two types of backup: full and incremental. A full backup works by copying the whole content of a disk. Full backup usually used for initial backup, the backup file size is usually almost the same as the content itself and the process could take long time to complete. On the […]

Read More