• Network

    Airmagnet Wireless Spectrum Analyser

    AirMedic is spectrum analysis software designed to help you plan a Wi-Fi network deployment by identifying nearby sources of radio frequency activity which may interfere and affect network per-formance.
    read more
  • The Business

    Partner Focus: Robert Epstein, Microsoft

    A good working relationship with Microsoft is often the lifeblood of any IT consultancy or reseller business. Microsoft still sells the vast majority of its products through the channel, but recent moves into cloud-based services have led some firms to worry that Microsoft might bypass them, and sell directly to SMEs.
    read more
Telecoms

Smartphone data plans for push email and web browsing

Getting a smartphone connected for push email and Web browsing is as easy as signing up for a data plan with an operator and waiting for the network to provision the service. Finding the right data plan for the business can be harder – but it can be more profitable too.
   
The Business

Business Intelligence for Small Businesses with SQL Server

In these times of economic uncertainty, it is vital for your customers to understand how their business is performing. Are they losing customers? If so which ones, and are they gaining others? What do the new customers buy?

 

   
Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
Business Continuity

Database Backup

Databases store the most valuable information for the businesses you work with and they’re the trickiest systems to back up; some of the largest technology companies in the world have got database backup badly wrong. Losing that data can have serious consequences for the business, to say nothing of the embarrassment quotient for you. Here we explain the essentials of backing up and introduce some specialist tools.

   
Security

All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.

   
Network

Configuring the anti-spam tools in Exchange 2007

Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay. Configure the anti-spam tools in Exchange 2007 with our step-by-step guide.

   
Network

Should you move customers to 802.11n?

802.11n has been ratified. And best of all, the release contains no incompatibility with the draft versions. Many laptops and other network devices have implemented 802.11n draft for the past couple of years. So should you upgrade any remaining 802.11g or 802.11b devices in customer networks?

   
Telecoms

Managing iPhones more easily

The iPhone continues to increase in popularity and it’s been more suitable for business since the launch of the 3GS, which added hardware encryption. However, configuring and deploying devices remains an issue. Apple’s iPhone management tools are primitive at best, and awkward for any business trying to manage a fleet of devices.

   
Server

Replicating Active Directory

This is one of the easiest systems to add redundancy to. Active Directory contains all the information about your customer’s users and machines. If this fails, and you have no backup, they have a problem.

 
   
Fluff

Dirtection Inc: episode 3

In which a bit of fluff yields up its terrible secret!

Ethel works in Admin. I generally see her at 11 o’clock in the morning and half-past three in the afternoon. We meet by the drinks machine in the foyer of Building C. The machine dispenses a tasteless brown liquid

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

  businesses Governance, risk and compliance aren't just for big business, and they're not just a burden of red tape. The better the governance, risk and compliance policies of a company, the better it does at business. This guidance from the IT Policy Compliance Group is specifically written for small business; take a look to see what you should be recommending strategically. http://www.itpolicycompliance.com/guidance/smb_special_interests/ read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS