Each month our team of expert editors addresses the changing role of IT by helping savvy technology professionals navigate both the technical and cultural challenges wrought by vendor-hype, user-demands, and technology requirements.DOWNLOAD THIS MONTH’S E-ZINE ISSUE NOW!
How do you arrange the ideal VDI contract? Shop around and pit vendors against each other; never pay full price; and if all else fails, convince the vendor to throw in products or services for free.
Hot desking is the practice of maintaining fewer desks or PCs than there are employees who need them. The model helps cut overhead costs, but it can cause productivity issues if there aren't enough workstations.
There's no magic formula or one-size-fits-all approach to figuring VDI ROI. Look at vendor calculators to see which costs they factor in, but do the calculations on your own.
Microsoft patched two publicly known vulnerabilities in the August Patch Tuesday update. The company also introduced plug-in whitelisting in IE.
It's possible that non-uniform access memory can affect how your Linux VMs run on Hyper-V, so learn about the conditions that could cause problems and what to do to fix them.
You won't be able to secure boot or use UEFI with SUSE VMs under Hyper-V because of certain support issues, so it's important to learn if your enterprise will be affected.
SharePoint can improve the efficiency of your business, but is your implementation providing a positive ROI? Usage reporting can help you find out by tracking who is using SharePoint, how they are using it and why.
Justify the time and expense of creating a governance document by showing what SharePoint has accomplished in your organization.
How does Microsoft's SharePoint rate as a primary enterprise content management system? It's got the features if you are willing and able to build it carefully.
To learn Managed Availability's inner workings, Exchange admins must understand where it stores information and how to access it.
Policy tips in Exchange 2013 remind end users of acceptable use policies and prevent accidental violations before they ever occur.
Security breaches and threats continue to evolve. Is your incident response plan keeping up with the times? Evaluate your risks and current plans to ensure you're prepared for the worst.