Spam doesn’t have to be a way of life; add to the built-in spam tools in Exchange Server with services that can almost banish spam from the inbox.
We IT professionals are seeing more and more Apple Mac computers on our comfortably Windows-based networks. In the past, it’s been easy to ignore them – after all, in many cases they belonged to just one or two users, none of whom tended to be an influential manager or executive. But today it’s just as likely to be the boss with a new Mac.
The best thing about Spacemonger (www.sixty-five.cc/sm, $24.95) isn’t that its intuitive display of how space is used on a hard drive allows you to pinpoint what’s taking up the space on your hard drives in a matter of seconds. The screen area shows a colour-coded and hierarchical treemap where the size of the box for each directory or file is in proportion to the space it takes on the drive. Hover the mouse over any element to see a popup with more detail, and scroll the mouse wheel to zoom down to level of individual files.
The trend towards converged security requires companies to keep their eye on physical premises. Here's how to specify and deploy an IP-based video surveillance solution for your small business clients.
Encryption is at the top of the business agenda following a spate of embarrassing data breaches. How can you design and implement encryption systems to suit your customers’ needs without making life harder all round?
Microsoft’s Desktop Optimization Pack includes two virtualisation tools, one for Windows itself and one for individual applications. what is involved with setting these up, and what are the benefits and downsides?
Staying on top of customer servers without making a visit using logs, scripts and consoles – and how Windows Server 2008 helps
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010