• Telecoms

    Skype and SIP

    Many businesses are now using VOIP SIP connections to deliver IP telephony to user desktops or IP phones. However, until recently the popular low-cost Skype VOIP service hasn’t been compatible with SIP telephony, ?without using third-party tools like those from 3CX.
    read more
  • The Business

    Social networking for your business

    Once considered a fad for teenagers, social media tools have become accepted components of any business’s marketing strategy. Dell is on Facebook; SAP is on LinkedIn; IBM has a large presence on the animated virtual world Second Life. Should you be there, too?
    read more
Business ContinuityThe Business

How to write an IT service-level agreement

A service-level agreement manages expectations and improves communication when you’re starting your relationship with a customer as well as when things go wrong.

 

 
   
SecurityNetworkClient

Protecting Networks

Security is changing: smart clients and remote working mean that the security perimeter is getting closer to the server. How will you protect your clients’ networks tomorrow?

   
Server

Monitoring servers remotely

Staying on top of customer servers without making a visit using logs, scripts and consoles – and how Windows Server 2008 helps

   
Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
The Business

Social networking for your business

Once considered a fad for teenagers, social media tools have become accepted components of any business’s marketing strategy. Dell is on Facebook; SAP is on LinkedIn; IBM has a large presence on the animated virtual world Second Life. Should you be there, too?

   
ServerSecurityTelecoms

Mobile email with Linux email servers

Not every business runs Microsoft Exchange. Maybe the company isn’t based around a Microsoft infrastructure or Exchange is too expensive or they use something else for historical reasons.
   
Client

Deploying Virtual Desktops using VDI and VMware ESX Server

There is no question that 90% of the work in deploying VDI is in the planning and preparation.

   
ServerNetworkThe Business

Planning an Upgrade with MAP Toolkit 4.0

Keeping up with technology changes is a challenge for both consultants and their customers. Server virtualization is now fully integrated into Microsoft’s platform, with the advent of Hyper-V in Server 2008.
   
ClientTelecoms

Setup Mobile email with Lotus Domino

You can deliver email from Lotus Domino Server 8.0 to smartphones in several ways, but if you want push email it’s going to take more work.

There are a variety of ways you can give users access to email and personal information that’s hosted on Lotus Domino Server 8.0 from their mobile phone. What you’ll pick for a given customer depends on the mobile operating system and Internet browser on the specific devices they use.
   
ServerNetworkBusiness Continuity

Storage: Buy, Build or Restore?

Over the last 20 years we have seen the cost of hardware and software plummet. For the most part, smaller companies can now run the same computing solutions as large companies.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

If you're supporting en users who need to transfer files by FTP occasionally, explaining how to use FTP every time can get frustrating. Map an FTP site as a custom network location and they can do it through the familiar Explorer window. If you only have a couple of machines you can choose Tools >Map Network Drive… in Explorer and click the link 'Connect to a Web site that you can use to store your documents and pictures' to open a wizard that creates a network location. Select 'Choose a custom network location', type in the FTP address and fill in the user name and password. You can also create mapped drives and network places on the Environment tab of the user's Active Directory object - but if you have a lot of users to set up, put it in the logon script for the user profile under Active Directory Users and Computers.
If you're running into problems with Group Policy Objects, check this handy summary of the rules at http://support.microsoft.com/kb/555991/en-us. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS