• Telecoms

    Stopping Spam for Exchange Users

    Spam doesn’t have to be a way of life; add to the built-in spam tools in Exchange Server with services that can almost banish spam from the inbox.
    read more
  • The Business

    Social networking for your business

    Once considered a fad for teenagers, social media tools have become accepted components of any business’s marketing strategy. Dell is on Facebook; SAP is on LinkedIn; IBM has a large presence on the animated virtual world Second Life. Should you be there, too?
    read more
The Business

Microsoft Support Lifecycle

Microsoft Support Lifecycle
When a new service pack is released, Microsoft will provide either 24 months of support for the previous service pack (for Windows) or 12 months for all other products. Keep an eye on what will need updating when, to stay in support.

   
ServerBusiness Continuity

Turn DPM and Windows Storage Server into an appliance

Combine windows storage server and add windows system center data protection manager and you can get a backup and dr appliance you can build – or a service you can sell.

   
Network

Should you move customers to 802.11n?

802.11n has been ratified. And best of all, the release contains no incompatibility with the draft versions. Many laptops and other network devices have implemented 802.11n draft for the past couple of years. So should you upgrade any remaining 802.11g or 802.11b devices in customer networks?

   
ServerNetworkBusiness Continuity

Rebuilding a NAS appliance RAID array

Disks fail, and RAID arrays need rebuilding. Be prepared for the worst – and keep your clients’ data safe.

   
Client

Deploying Virtual Desktops using VDI and VMware ESX Server

There is no question that 90% of the work in deploying VDI is in the planning and preparation.

   
ClientClient Resources

Limitations of VDI

Before deploying VDI, it is important to understand the limitations of the technology.

   
Network

Network monitoring is good for business

What you need to keep customer networks running; free network management tools perform basic tasks on smaller networks but pay-for tools give you more data and customisation options.

   
Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
The Business

Partner Focus: Robert Epstein, Microsoft

A good working relationship with Microsoft is often the lifeblood of any IT consultancy or reseller business. Microsoft still sells the vast majority of its products through the channel, but recent moves into cloud-based services have led some firms to worry that Microsoft might bypass them, and sell directly to SMEs.

   
ServerSecurityNetwork

Security in the Virtual world

Many organisations need help expanding their data security policies to embrace virtual IT environments

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

You want the PCs you support to have the right time for more reasons than keeping the users happy; for one thing, if every PC has a slightly different time, finding which version of a file was updated most recently gets much more complicated. Get your head around the Windows Time Service at http://technet.microsoft.com/en-us/library/cc773013.aspx, get the commands for making a PC get its time from the domain at http://technet.microsoft.com/en-us/library/cc758905.aspx and if you want a an alternative time server use uk.pool.ntp.org to get the time from a random time server in the NTP Pool Project (read about the project at http://www.pool.ntp.org/use.html) read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS