Business Continuity

Staying up while you recover: Double-Take Cloud provides easy server protection

Building a backup and disaster recovery service can be time consuming and costly. You need access to a data centre where you can site racks, servers, storage and have sufficient bandwidth to support the service. Alternatively, you could just take advantage of the cloud and leave your cloud supplier to take care of all that.

   
Business Continuity

Lessons in Space and Time

Sponsored Feature - Filing cabinets cost money  
When financial climates take a turn for the worse, businesses look for ways to reduce overheads, maximise resources, and increase profitability.
   
Network

Network monitoring is good for business

What you need to keep customer networks running; free network management tools perform basic tasks on smaller networks but pay-for tools give you more data and customisation options.

   
Server

SQL Server: diagnosing and fixing performance issues

Many SMEs have applications that run on SQL Server. In the more recent versions, SQL Server 2005 and 2008 is largely self tuning so it may well run for months unattended. However, performance issues can still raise their ugly head.

   
ServerNetworkClient

Netbooks: Networking and Managing a Linux portable

Linux netbooks are cheap, popular and probably on a customer site already. How can you connect them to an existing network and make them work with Windows servers and applications?

 
   
Server

Building clusters with Windows Server 2008

Microsoft has upgraded the Cluster Service in enhanced-capability editions of Windows Server 2008 and the whole process of creating and managing clusters has been made much simpler.

   
ServerClient

Sharepoint Comes of Age

Giving your customers a computing environment that will do exactly what they want is one of the best ways to make them happy, and one of the most effective ways to achieve this is with a combination of Microsoft SharePoint and Office.

   
Fluff

Dirtection Inc: episode 7

In which the Secret Service gets to grips with bonkers boffins and hallucinogenic horseflies.

   
Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
Network

Configuring the anti-spam tools in Exchange 2007

Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay. Configure the anti-spam tools in Exchange 2007 with our step-by-step guide.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

If you're supporting en users who need to transfer files by FTP occasionally, explaining how to use FTP every time can get frustrating. Map an FTP site as a custom network location and they can do it through the familiar Explorer window. If you only have a couple of machines you can choose Tools >Map Network Drive… in Explorer and click the link 'Connect to a Web site that you can use to store your documents and pictures' to open a wizard that creates a network location. Select 'Choose a custom network location', type in the FTP address and fill in the user name and password. You can also create mapped drives and network places on the Environment tab of the user's Active Directory object - but if you have a lot of users to set up, put it in the logon script for the user profile under Active Directory Users and Computers.
If you're running into problems with Group Policy Objects, check this handy summary of the rules at http://support.microsoft.com/kb/555991/en-us. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS