ClientClient Resources

Limitations of VDI

Before deploying VDI, it is important to understand the limitations of the technology.

   
ClientClient Resources

The architecture of VDI

The architecture for VDI is really very simple and the basics do not differ between the various VDI vendors. 

   
ServerClient

Getting to grips with VDI

Virtual Desktop Infrastructure (VDI) is being promoted as the solution to all that ails the desktop. The truth is somewhat different.

   
NetworkClientTelecoms

Managing Skype in business

Skype means free or cheap calls but it’s based on peer-to-peer file sharing principles. How can you tame consumer VoIP tools for use in a business network?

   
ClientTelecoms

Setup Mobile email with Lotus Domino

You can deliver email from Lotus Domino Server 8.0 to smartphones in several ways, but if you want push email it’s going to take more work.

There are a variety of ways you can give users access to email and personal information that’s hosted on Lotus Domino Server 8.0 from their mobile phone. What you’ll pick for a given customer depends on the mobile operating system and Internet browser on the specific devices they use.
   
ClientBusiness Continuity

Recovering and protecting data on Mac and Linux desktops

Make sure all of your clients’ computers have a backup plan, whatever operating system they run.

   
ClientTelecoms

Setting up Google Gmail Mobile in Google Apps

With Google Apps businesses can combine the Gmail service with their own domain names. Here’s how to get it up and running and provide mobile email without a mail server.
   
ServerNetworkClient

Netbooks: Networking and Managing a Linux portable

Linux netbooks are cheap, popular and probably on a customer site already. How can you connect them to an existing network and make them work with Windows servers and applications?

 
   
ServerSecurityClient

Centralising anti-virus protection for business

Disinfectant for the desktop, with less swabbing. Many small businesses’ anti-virus software strategies are a mess: here’s how you look after it for them, with minimal fuss.

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

Need to fit more memory, a new hard drive or a replacement optical drive to a Mac? Even if you're experienced with Macs it can be tricky to deal with the range of cases and connectors used in different models, and if you only deal with a handful of Macs across all your clients it’s hard to stay up to date. This site has installation videos going back to the G4 PowerBook and G3 blue&white desktop Mac.
http://eshop.macsales.com/tech_center/installation_2.cfm read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources

RECENT COMMENTS