Windows 7 RTM review
Windows 7 is ready for the PC manufacturers, but is RTM ready for business?
If you're worried about data loss from laptops and USB sticks, then BitLocker is just what the doctor ordered. Much the same as the Vista implementation (and with the same pointless restriction to Enterprise and Ultimate), Windows 7's Bitlocker quickly encrypts laptop hard drives, preventing unauthorised access to data. Group policies control how keys are managed (including just how recovery keys are stored). Good whole disk encryption should be invisible to the end user, and there's very little performance hit with BitLocker.
Windows 7 extends BitLocker beyond the PC with BitLocker To Go. This encrypts USB keys, something that's increasingly important as USB keys can now store as much data as a hard disk. Group policies can force BitLocker USB encryption on any key connected to a PC on your network, and reader software on encrypted drives enables users to read them on XP and Vista PCs.
XP Mode and R2
Microsoft recently delivered the RC for Windows 7's XP Mode. If you're planning to roll out Windows 7 quickly, but are still unsure if applications are compatible with the new operating system, XP Mode is just the ticket. Based on Virtual PC (and only running in the Professional and Enterprise SKUs of Windows 7, along with the enthusiast-focused Ultimate), XP Mode gives you a virtual Windows XP machine, which integrates with the Windows 7 desktop. Applications running in XP Mode look like any other Windows 7 application the only difference is the Windows XP Luna window look-and-feel.
The new version of XP Mode installs quickly, with a quick guide that walks users through installing and using XP applications. Applications install in a full Windows XP desktop, and then appear in the XP Mode section of the Windows 7 start menu. Regularly used applications now appear in a Task Bar jump list, along with tools for using USB devices with XP Mode applications.
In This Article
Application security fallacies and realities
Web application attacks are the most common vulnerability, so what is the truth about application security?Download now
Your first step researching Managed File Transfer
Advice and expertise on researching the right MFT solution for your businessDownload now
The KPIs you should be measuring
How MSPs can measure performance and evaluate their relationships with clientsDownload now
Life in the digital workspace
A guide to technology and the changing concept of workspaceDownload now