The Business

Hardware Recycling: Making money from green

Dealing with end-of-life hardware can be a burden for it consultants, but managing recycling and trade-ins for clients provides a business opportunity, as well as a chance to help the environment.

   
Network

Exchange 2007 safe list aggregation

You can give Exchange 2007 a little spam-fighting help by enlisting all the copies of Outlook on your client’s network.

   
The Business

Partner Focus: Peter-Hortensius-Lenovo

The computer maker Lenovo has 9% of the worldwide PC market, and in 2009 it ranked as the world’s fast-est-growing PC company. In the three months to December 31st, Lenovo grew sales by 42%, against an industry av-erage of 17%. We asked Lenovo what that means for small business resellers.

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
Business Continuity

Sponsored feature - The Paperless Office – what’s stopping you?

Over the years, the phrase ‘Paperless Office’ has become something of a distant dream to many businesses.

   
ServerClientThe Business

Windows 7 upgrade tools

Windows 7 is proving as popular as Microsoft could have hoped and you can expect to have customers ask you to upgrade them. What tools are on offer to help you to help them?

   
Business Continuity

Backing up Exchange

Like any other database, Exchange needs a little TLC if you want to recover from any downtime.

   
ServerServer Resources

Using vCenter Converter in standalone mode

Taking physical machines and making them virtual is a complex task. That’s why you’ll need tools like VMware’s vCenter Converter to handle the conversion.

   
The Business

Partner Focus: D-Link

IT Expert spoke to Andrew Mulholland, marketing manager at D-LINK, the networking equipment vendor, and asked this channel-focused company how it is winning business from the big names, and how it is boosting its channel programmes.

   
ServerNetwork

Mining Logs with Splunk

There’s a lot of information floating around in a network, information that’s being written into log files every minute of every day. Those log files that contain everything you need to know about how the systems you’re managing are running, and how they’re responding to the demands of their users.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

tools If you're trying to solve connectivity problems at a customer site, you can ask a colleague back at your office to use ping and traceroute to see how the network appears to the outside world; or you can use the tools at http://www.heise-online.co.uk/networks/nettools/ to do it yourself. There are tools for looking up Mac addresses and calculating subnet masks too. If you need a more detailed trace, http://w3dt.net/tools/pathping has a pathping tool.
read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS