Top Eight Features in Windows Server 8 - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Top Eight Features in Windows Server 8-2 Next

Microsoft has completely redesigned the Server Manager as a multi-server management tool that also combines formerly separate administrative utilities into a single interface. A dashboard shows the various servers in the network according to their roles or any other logical groupings. From the Server Manager, administrators are able to drill right down into running (and problematic) services on individual machines. For certain operations, it is also possible to select multiple servers to execute them with a single click of the mouse.

Microsoft's upcoming Windows Server 8 has started gaining some prominence since the software giant previewed it at the BUILD conference. Its cloud-based paradigm and focus on large-scale deployments is self-evident, and at least one executive from Microsoft has called Windows Server 8 "the most cloud-optimized OS" developed by the Redmond-based company.

For now, its availability as a developer preview on MSDN means that various in-depth assessments of its capabilities are starting to roll in. It is clear even at this early stage that the next server operating system from Microsoft is a technically sophisticated one, and crammed with capabilities that bring many previously enterprise-only capabilities to small and mid-sized businesses.

This slideshow highlights some of the top features businesses can expect from Windows Server 8.

More Slideshows:


Password Misuse Could be the Root Cause of Hacking SpikePassword chaos amongst IT staff and apathy about password security amongst their senior management is creating a security nightmare.

The Six Dumbest Hacks of All Time While hackers can be dangerous, not every hacker is a Kevin Mitnick.

Seven Tips to Protect Your Google WalletEven with Google Wallet's built-in identity theft protections, you still need to be wary of hackers.

 

Related Topics : Server Operating Systems, Apache, Linux Kernel, Solaris, UNIX

 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.