• The Business

    Do you get your cut from the cloud?

    Cloud computing stands to be the most significant transformation for the IT industry in a generation. Analysts predict that within a few years, almost all companies will run at least some of their IT in the cloud; a minority will run all their computing that way.
    read more
  • Security

    Danger, USB!

    USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
    read more
SecurityClient

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

   
ClientClient Resources

The architecture of VDI

The architecture for VDI is really very simple and the basics do not differ between the various VDI vendors. 

   
The Business

Partner Focus: Peter-Hortensius-Lenovo

The computer maker Lenovo has 9% of the worldwide PC market, and in 2009 it ranked as the world’s fast-est-growing PC company. In the three months to December 31st, Lenovo grew sales by 42%, against an industry av-erage of 17%. We asked Lenovo what that means for small business resellers.

   
ServerNetworkClient

Managing networks with System Center Essentials 2007

Microsoft’s System Center tools manage everything from updates to virtualisation. Now there’s a version that will help you manage an entire SME from one screen.

   
ServerNetworkBusiness Continuity

Failover, not fall over - how to keep running when the hardware fails

Failure is not an option in business and redundancy is the solution. You can offer customers systems that keep running when the hardware fails.

Server failure used to mean widespread panic and a scramble to find backup tapes and a spare server to restore onto. Inevitably this meant business interruption, user frustration and even data loss. Recovering from a backup can take hours; even planned maintenance can take the server down during business hours leaving users unable to work. Today there is no excuse for this situation.

   
SecurityNetwork

Configuring routers correctly

Your client needs a router to connect them to the Internet – but unless it is configured correctly, it could represent a significant security loophole.

   
The Business

Partner Focus: Aamir Paul, Dell

Aamir Paul, director, Advanced Systems Group SMB, EMEA, at Dell

Small businesses depend more than ever on technology, but also face a growing challenge when it comes to managing their IT assets.

   
The Business

Automated sales tools

Marketing collateral, sales tools, and automated reports can save a lot of time in preparing quotations. But will they alienate your customers or win you business?

   
ServerTelecoms

Getting to grips with Exchange 2010

The new Exchange Server is here – is it time to move your clients to the latest version of Microsoft’s messaging platform and how much work does that mean for you?

   
Business ContinuityThe Business

How to write an IT service-level agreement

A service-level agreement manages expectations and improves communication when you’re starting your relationship with a customer as well as when things go wrong.

 

 
   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

If you're supporting en users who need to transfer files by FTP occasionally, explaining how to use FTP every time can get frustrating. Map an FTP site as a custom network location and they can do it through the familiar Explorer window. If you only have a couple of machines you can choose Tools >Map Network Drive… in Explorer and click the link 'Connect to a Web site that you can use to store your documents and pictures' to open a wizard that creates a network location. Select 'Choose a custom network location', type in the FTP address and fill in the user name and password. You can also create mapped drives and network places on the Environment tab of the user's Active Directory object - but if you have a lot of users to set up, put it in the logon script for the user profile under Active Directory Users and Computers.
If you're running into problems with Group Policy Objects, check this handy summary of the rules at http://support.microsoft.com/kb/555991/en-us. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS