Client

Is Windows 7 Ready for Small Business

The Service Pack 1 rule is a good one for most operating systems, and not because a new version of Windows usually has as many bugs as benefits.

   
ServerSecurityNetwork

Security in the Virtual world

Many organisations need help expanding their data security policies to embrace virtual IT environments

   
Security

Dealing with a Data Breach

It’s the call no-one wants to get: your client has experienced a data breach, and is worried that customer data may have leaked from the business. It is your job to fix the problem as best you can, and give the client peace of mind. There are four key steps in incident management.
   
The Business

Selling White Label Services

Reselling services represent a significant – and growing – part of the business for many IT consultants. Margins on IT hardware, and to a lesser extent, software, have fallen steadily. The fees that can be charged for higher-value work, such as code customisation and application testing, have also come under pressure, not least because of competition from suppliers in markets such as India or Eastern Europe and Russia.

   
Business Continuity

Backing up Exchange

Like any other database, Exchange needs a little TLC if you want to recover from any downtime.

   
Client

Deploying Virtual Desktops using VDI and VMware ESX Server

There is no question that 90% of the work in deploying VDI is in the planning and preparation.

   
Client

GPO for IE8

If you’re using Active Directory and Group Policies to administer computers on customer networks, suggest they adopt Internet Explorer 8 to get more than 100 new Group Policies that you can use to maintain a stable configuration.

   
Security

Danger, USB!

USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?

   
Fluff

Dirtection Inc: episode 1

There are 322 types of keyboard fluff. This is the story of one of them.

If it hadn’t been for the piece of fluff, the whole business with the horseflies, the vicar and the postmistress might have turned out very differently. It was a particularly interesting piece of fluff, as it happens, which is why I stole it. Well, I’m not sure ‘steal’ is quite the right word, really. More a case of borrowing. I would have given it back if asked. But, as is so often the case with fluff, nobody asked.
   
The Business

Social networking for your business

Once considered a fad for teenagers, social media tools have become accepted components of any business’s marketing strategy. Dell is on Facebook; SAP is on LinkedIn; IBM has a large presence on the animated virtual world Second Life. Should you be there, too?

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

You want the PCs you support to have the right time for more reasons than keeping the users happy; for one thing, if every PC has a slightly different time, finding which version of a file was updated most recently gets much more complicated. Get your head around the Windows Time Service at http://technet.microsoft.com/en-us/library/cc773013.aspx, get the commands for making a PC get its time from the domain at http://technet.microsoft.com/en-us/library/cc758905.aspx and if you want a an alternative time server use uk.pool.ntp.org to get the time from a random time server in the NTP Pool Project (read about the project at http://www.pool.ntp.org/use.html) read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS