Customer relationships are more important than ever in this business climate, but while even small companies save computerised their order books, far fewer are using the tools available to help manage what they know about their customers.
USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
The iPhone continues to increase in popularity and it’s been more suitable for business since the launch of the 3GS, which added hardware encryption. However, configuring and deploying devices remains an issue. Apple’s iPhone management tools are primitive at best, and awkward for any business trying to manage a fleet of devices.
iDRAC6 and Dell Management Console combine into a powerful remote server management tool.
A good working relationship with Microsoft is often the lifeblood of any IT consultancy or reseller business. Microsoft still sells the vast majority of its products through the channel, but recent moves into cloud-based services have led some firms to worry that Microsoft might bypass them, and sell directly to SMEs.
Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010