• The Business

    Do you get your cut from the cloud?

    Cloud computing stands to be the most significant transformation for the IT industry in a generation. Analysts predict that within a few years, almost all companies will run at least some of their IT in the cloud; a minority will run all their computing that way.
    read more
  • The Business

    Partner Focus: Peter-Hortensius-Lenovo

    The computer maker Lenovo has 9% of the worldwide PC market, and in 2009 it ranked as the world’s fast-est-growing PC company. In the three months to December 31st, Lenovo grew sales by 42%, against an industry av-erage of 17%. We asked Lenovo what that means for small business resellers.
    read more
NetworkNetwork Resources

How to migrate a firewall

How to  migrate a firewall the ITX how to guide

   
Security

All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.

   
Fluff

Dirtection Inc: episode 1

There are 322 types of keyboard fluff. This is the story of one of them.

If it hadn’t been for the piece of fluff, the whole business with the horseflies, the vicar and the postmistress might have turned out very differently. It was a particularly interesting piece of fluff, as it happens, which is why I stole it. Well, I’m not sure ‘steal’ is quite the right word, really. More a case of borrowing. I would have given it back if asked. But, as is so often the case with fluff, nobody asked.
   
ServerBusiness Continuity

Virtualising SBS in the SME: choosing a hypervisor and planning a virtual infrastructure

Virtualisation is a powerful tool. You can use it to consolidate multiple applications on a single piece of hardware, or use several different operating systems at the same time. Often seen solely as the province of the enterprise data centre or the development lab, virtualisation is rapidly becoming a powerful tool for the SME as well, providing new routes to disaster recovery, and helping future-proof legacy applications.

   
Network

Managing and migrating firewalls

Firewalls can provide you with a host of information about what’s going on inside and outside your customer’s network. But that information isn’t necessarily easy to manage and analyse.

   
Business Continuity

Backing up Exchange

Like any other database, Exchange needs a little TLC if you want to recover from any downtime.

   
ClientTelecoms

Setting up Google Gmail Mobile in Google Apps

With Google Apps businesses can combine the Gmail service with their own domain names. Here’s how to get it up and running and provide mobile email without a mail server.
   
Telecoms

Managing iPhones more easily

The iPhone continues to increase in popularity and it’s been more suitable for business since the launch of the 3GS, which added hardware encryption. However, configuring and deploying devices remains an issue. Apple’s iPhone management tools are primitive at best, and awkward for any business trying to manage a fleet of devices.

   
Business Continuity

Staying up while you recover: Double-Take Cloud provides easy server protection

Building a backup and disaster recovery service can be time consuming and costly. You need access to a data centre where you can site racks, servers, storage and have sufficient bandwidth to support the service. Alternatively, you could just take advantage of the cloud and leave your cloud supplier to take care of all that.

   
Server

Replicating Active Directory

This is one of the easiest systems to add redundancy to. Active Directory contains all the information about your customer’s users and machines. If this fails, and you have no backup, they have a problem.

 
   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

2008 Download the Windows Server 2008 Administrative templates from http://www.microsoft.com/downloads/details.aspx?familyid=927fc7e3-853c-410a-acb5-9062c76142fa&displaylang=en&tm to get Group Policy setting information for the items under Administrative Templates.
In Windows Server 2008 and Windows Vista Administrative template files can be either ADMX (language-neutral) files, stored by default in the %Systemroot%\PolicyDefinitions folder or ADML (language-specific) files stored in a language-specific folder within that. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS