All hardware fails – and backup is seen as boring and unreliable. That combination is the perfect opportunity for you to provide a service that provides business continuity and ongoing revenue. But how do you design the right backup system?
Databases store the most valuable information for the businesses you work with and they’re the trickiest systems to back up; some of the largest technology companies in the world have got database backup badly wrong. Losing that data can have serious consequences for the business, to say nothing of the embarrassment quotient for you. Here we explain the essentials of backing up and introduce some specialist tools.
Security back at the top of the exec agenda
In the wake of the recent Sony Playstation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.
Dealing with end-of-life hardware can be a burden for it consultants, but managing recycling and trade-ins for clients provides a business opportunity, as well as a chance to help the environment.
What you need to keep customer networks running; free network management tools perform basic tasks on smaller networks but pay-for tools give you more data and customisation options.
USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
We IT professionals are seeing more and more Apple Mac computers on our comfortably Windows-based networks. In the past, it’s been easy to ignore them – after all, in many cases they belonged to just one or two users, none of whom tended to be an influential manager or executive. But today it’s just as likely to be the boss with a new Mac.
Remote support is one of those bugbears that is never going to go away. At least with PCs and laptops you know where you are, and remote desktop tools make it easy to log in and take control of a user’s PC. You can grab logs, check files, and see just what your users see.
There’s a lot of information floating around in a network, information that’s being written into log files every minute of every day. Those log files that contain everything you need to know about how the systems you’re managing are running, and how they’re responding to the demands of their users.
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010