• Telecoms

    BlackBerry without BES

    RIM’s little smartphones are some of the most popular devices on the market – but BES is complex and costly. How can you get customers online without the cost of a full BlackBerry server?
    read more
  • Server

    Turn DPM and Windows Storage Server into an appliance

    Combine windows storage server and add windows system center data protection manager and you can get a backup and dr appliance you can build – or a service you can sell.
    read more
Client

Managing virtualisation for the desktop

Microsoft’s Desktop Optimization Pack includes two virtualisation tools, one for Windows itself and one for individual applications. what is involved with setting these up, and what are the benefits and downsides?

   
The Business

Hardware Recycling: Making money from green

Dealing with end-of-life hardware can be a burden for it consultants, but managing recycling and trade-ins for clients provides a business opportunity, as well as a chance to help the environment.

   
Server

Managing virtual machines with System Center Virtual Machine Manager and PowerShell

Virtualisation is meant to make your life easier. Instead of racks full of humming hot servers, you’ve got much less hardware doing the same work, simplifying your clients’ networks and keeping the power bills down.

   
Network

How to spoof a MAC address (and why)

MAC spoofing is one of those odd tricks: it’s not very useful most of the time (and it can be extremely awkward in a well-managed environment) but sometimes it’s the only technique that will solve the problem.

   
Client

Blackberry Apps Top Picks

1. If your clients rack up the airmiles then WorldMate Live is an ideal travel companion. It’ll help manage itineraries, keep track of exchange rates and weather and (if you’re using the premium version) even find alternative flights.

   
The Business

Partner Focus: D-Link

IT Expert spoke to Andrew Mulholland, marketing manager at D-LINK, the networking equipment vendor, and asked this channel-focused company how it is winning business from the big names, and how it is boosting its channel programmes.

   
Business Continuity

Sponsored feature - The Paperless Office – what’s stopping you?

Over the years, the phrase ‘Paperless Office’ has become something of a distant dream to many businesses.

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
TelecomsThe Business

Bringing VoIP in house

For business, IP telephony and voice over IP is starting to displace conventional phone services. According to industry analysts Forrester, as many as 47% of businesses in Europe and the US have either deployed, or are rolling out, an IP-based phone system.
   
Network

Network monitoring is good for business

What you need to keep customer networks running; free network management tools perform basic tasks on smaller networks but pay-for tools give you more data and customisation options.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

If you're supporting en users who need to transfer files by FTP occasionally, explaining how to use FTP every time can get frustrating. Map an FTP site as a custom network location and they can do it through the familiar Explorer window. If you only have a couple of machines you can choose Tools >Map Network Drive… in Explorer and click the link 'Connect to a Web site that you can use to store your documents and pictures' to open a wizard that creates a network location. Select 'Choose a custom network location', type in the FTP address and fill in the user name and password. You can also create mapped drives and network places on the Environment tab of the user's Active Directory object - but if you have a lot of users to set up, put it in the logon script for the user profile under Active Directory Users and Computers.
If you're running into problems with Group Policy Objects, check this handy summary of the rules at http://support.microsoft.com/kb/555991/en-us. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS