• The Business

    Do you get your cut from the cloud?

    Cloud computing stands to be the most significant transformation for the IT industry in a generation. Analysts predict that within a few years, almost all companies will run at least some of their IT in the cloud; a minority will run all their computing that way.
    read more
  • Security

    Application Whitelists

    Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?
    read more
NetworkClient

Macs in a Windows world

Helping your Apple users become full-time network citizens – without doing a lot of extra work

 

We IT professionals are seeing more and more Apple Mac computers on our comfortably Windows-based networks. In the past, it’s been easy to ignore them – after all, in many cases they belonged to just one or two users, none of whom tended to be an influential manager or executive. But today it’s just as likely to be the boss with a new Mac.

   
Server

The Exchange 2007 Management Shell

The Exchange Management Console gives you a quick and easy way of working with your Exchange 2007 server, but it’s the Management Shell that unleashes the full potential of Exchange 2007.

   
ServerServer Resources

Using vCenter Converter in standalone mode

Taking physical machines and making them virtual is a complex task. That’s why you’ll need tools like VMware’s vCenter Converter to handle the conversion.

   
NetworkClientTelecoms

Managing Skype in business

Skype means free or cheap calls but it’s based on peer-to-peer file sharing principles. How can you tame consumer VoIP tools for use in a business network?

   
Client

Managing virtualisation for the desktop

Microsoft’s Desktop Optimization Pack includes two virtualisation tools, one for Windows itself and one for individual applications. what is involved with setting these up, and what are the benefits and downsides?

   
The Business

Let financing take the strain

Customers are looking for alternatives to bank loans and retained capital to fund IT purchases. Leasing and vendor finance is one option, but how should IT consultants navigate the financial maze?
   
Fluff

Dirtection Inc: episode 8

When boffins go bad. As one gruesome mystery ends, another begins.

   
Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
ClientClient Resources

Lock down shared PCs with Windows SteadyState

When you’re responsible for the smooth running of computers in a small office, one problem you’ll quickly encounter is that of people making changes that cause problems.

   
ServerTelecoms

Managing Mobile Devices: Anywhere, Anytime

Remote support is one of those bugbears that is never going to go away. At least with PCs and laptops you know where you are, and remote desktop tools make it easy to log in and take control of a user’s PC. You can grab logs, check files, and see just what your users see.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

  businesses Governance, risk and compliance aren't just for big business, and they're not just a burden of red tape. The better the governance, risk and compliance policies of a company, the better it does at business. This guidance from the IT Policy Compliance Group is specifically written for small business; take a look to see what you should be recommending strategically. http://www.itpolicycompliance.com/guidance/smb_special_interests/ read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS