Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
Get total application control with Windows Group Policy Preferences.
802.11n has been ratified. And best of all, the release contains no incompatibility with the draft versions. Many laptops and other network devices have implemented 802.11n draft for the past couple of years. So should you upgrade any remaining 802.11g or 802.11b devices in customer networks?
MAC spoofing is one of those odd tricks: it’s not very useful most of the time (and it can be extremely awkward in a well-managed environment) but sometimes it’s the only technique that will solve the problem.
There are three types of storage you can provide to your customers: Direct Attached Storage (DAS), Network Attached Storage (NAS) and Storage Area Networking (SAN). What you choose will affect the cost, the solution and the levels of support and services you can offer.
Cloud computing stands to be the most significant transformation for the IT industry in a generation. Analysts predict that within a few years, almost all companies will run at least some of their IT in the cloud; a minority will run all their computing that way.
RIM’s little smartphones are some of the most popular devices on the market – but BES is complex and costly. How can you get customers online without the cost of a full BlackBerry server?
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010