• Security

    Danger, USB!

    USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
    read more
  • Telecoms

    BlackBerry without BES

    RIM’s little smartphones are some of the most popular devices on the market – but BES is complex and costly. How can you get customers online without the cost of a full BlackBerry server?
    read more
TelecomsThe Business

Bringing VoIP in house

For business, IP telephony and voice over IP is starting to displace conventional phone services. According to industry analysts Forrester, as many as 47% of businesses in Europe and the US have either deployed, or are rolling out, an IP-based phone system.
   
Client

Is it time for Vista? Solutions for upgrade problems and advice for deployment and maintenance

Operating systems are constantly being updated. Sometimes it’s to deal with security issues, sometimes to improve performance and sometimes to add new, must have, features.

   
Fluff

Dirtection Inc: episode 3

In which a bit of fluff yields up its terrible secret!

Ethel works in Admin. I generally see her at 11 o’clock in the morning and half-past three in the afternoon. We meet by the drinks machine in the foyer of Building C. The machine dispenses a tasteless brown liquid

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
ServerThe Business

GFI tools for management

Keep track of customer servers and workstations with this remote monitoring and management software.

   
SecurityBusiness Continuity

Specifying and supporting disk encryption

Encryption is at the top of the business agenda following a spate of embarrassing data breaches. How can you design and implement encryption systems to suit your customers’ needs without making life harder all round?

   
ClientBusiness Continuity

Recovering and protecting data on Mac and Linux desktops

Make sure all of your clients’ computers have a backup plan, whatever operating system they run.

   
The Business

Death and ever-more complicated taxes

January 1, 2010 saw the first of five sets of annual changes intended to cut down on VAT fraud and ease cross-border commerce within the EU. Ignorance is perilous…

   
Client

Support in the cloud

Skip the traffic and use cloud services to proactively support clients without leaving your office.

   
The Business

Selling White Label Services

Reselling services represent a significant – and growing – part of the business for many IT consultants. Margins on IT hardware, and to a lesser extent, software, have fallen steadily. The fees that can be charged for higher-value work, such as code customisation and application testing, have also come under pressure, not least because of competition from suppliers in markets such as India or Eastern Europe and Russia.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

tools If you're trying to solve connectivity problems at a customer site, you can ask a colleague back at your office to use ping and traceroute to see how the network appears to the outside world; or you can use the tools at http://www.heise-online.co.uk/networks/nettools/ to do it yourself. There are tools for looking up Mac addresses and calculating subnet masks too. If you need a more detailed trace, http://w3dt.net/tools/pathping has a pathping tool.
read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS