Source:: Innovaphone

Source:: Innovaphone

Source:: Innovaphone

Windows Server 2016 Lizensierung

Eine neue Version des Serverbetriebssystems von Microsoft ist gerade gestartet und wie immer gibt es auch Veränderungen im Lizenzmodell, die erst einmal verinnerlicht werden müssen. Auf einfache Art und Weise erklärt der neunmalkluge Cali Clever das aktuelle Lizenzmodell in einem kleinen Video:

Noch Fragen? Dann rufen Sie uns doch einfach kurz an und wir klären das für Sie:

Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

By David C. Stuart Today’s digital economy is growing at a phenomenal rate. All modes of commerce from entertainment to finance and retail have moved on-line. You name it; there is an on-line business for it. Not only does selling occur on-line, businesses run their operations online and virtually with cloud-based providers such as Microsoft Azure, Amazon Web Services, […]

Source:: Cisco Security Notice

By David C. Stuart Today’s digital economy is growing at a phenomenal rate. All modes of commerce from entertainment to finance and retail have moved on-line. You name it; there is an on-line business for it. Not only does selling occur on-line, businesses run their operations online and virtually with cloud-based providers such as Microsoft Azure, Amazon Web Services, […]

Source:: Cisco Security Notice

By Talos Group Overview Crash triaging can be a long and complicated process; by using proper tools and having an optimal approach, we can make this a bit easier and less time consuming. In this post we describe a triaging strategy and toolset based on two examples of vulnerability classes: Stack based buffer overflow Heap based buffer overflow […]

Source:: Cisco Security Notice

By Talos Group Overview Crash triaging can be a long and complicated process; by using proper tools and having an optimal approach, we can make this a bit easier and less time consuming. In this post we describe a triaging strategy and toolset based on two examples of vulnerability classes: Stack based buffer overflow Heap based buffer overflow […]

Source:: Cisco Security Notice