• Security

    All-Access Pass

    Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
    read more
  • Server

    Turn DPM and Windows Storage Server into an appliance

    Combine windows storage server and add windows system center data protection manager and you can get a backup and dr appliance you can build – or a service you can sell.
    read more
The Business

Death and ever-more complicated taxes

January 1, 2010 saw the first of five sets of annual changes intended to cut down on VAT fraud and ease cross-border commerce within the EU. Ignorance is perilous…

   
SecurityClient

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

   
Fluff

Dirtection Inc: episode 6

In which the vicar delivers a sermon and the rogue cleaning operative delivers the coup de grace.
The keyboard cleaning profession seldom takes one into ecclesiastical circles, so I’m not sure if it is considered normal for vicars to sit stark naked upon gargoyles while delivering sermons through a megaphone.
   
The Business

Key Partner Programmes

Microsoft Partner Programme https://partner.microsoft.com/UK/

Signing up as a Microsoft partner gives you access to information, technical and pre-sales support, training (online and locally), certification courseware materials, analyst reports, sales and marketing tools

   
Business Continuity

Sponsored feature - The Paperless Office – what’s stopping you?

Over the years, the phrase ‘Paperless Office’ has become something of a distant dream to many businesses.

   
SecurityNetworkBusiness Continuity

Backup goes online and offsite

Remote backup services can offer the speed of disk, the security of tape, and the simplicity of a consumer service. But how do you ensure that remote backup services comply with your clients’ data policies and integrate with their existing IT set-ups?

   
ClientThe Business

Buying Laptops for Small Business

The lowest price isn’t always the best value; paying a little extra for a notebook that’s designed for business could be a better deal.

   
The Business

Do you get your cut from the cloud?

Cloud computing stands to be the most significant transformation for the IT industry in a generation. Analysts predict that within a few years, almost all companies will run at least some of their IT in the cloud; a minority will run all their computing that way.

   
Client

Deploying Virtual Desktops using VDI and VMware ESX Server

There is no question that 90% of the work in deploying VDI is in the planning and preparation.

   
Network

Should you move customers to 802.11n?

802.11n has been ratified. And best of all, the release contains no incompatibility with the draft versions. Many laptops and other network devices have implemented 802.11n draft for the past couple of years. So should you upgrade any remaining 802.11g or 802.11b devices in customer networks?

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

None of your customers are complaining about viruses, their network being slow or strange things happening on their new PDAs and laptops; is it time to take the afternoon off? Maybe, but before you do, make sure things will look as good next week by making sure you know what you’re defending against. Microsoft has a set of resources at http://technet.microsoft.com/en-us/security/cc514043.aspx covering the current threat landscape and showing ways to help protect your clients and their customers, including analyses of data collected from millions of users, strategies, mitigations and countermeasures. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS