Tutorials »

  • Vista on a stick: How to flash install your OS

    In a world where there's too much to do -- and too little time to do it in -- we're always looking for shortcuts. So when we stumbled upon <a href="http://kurtsh.spaces.live.com/blog/cns!DA410C7F7E038D!1665.entry" target="_blank">a blog entry</a> by Kurt Shintaku over on Windows Live Spaces that promised to let us install Vista from a flash drive instead of an optical disc, there was certainly interest.

  • Security survival tips for the Web 2.0 world

    Corporate response to the influx of Web 2.0 technologies is as varied as companies themselves. Here are some tips for developing security policies and practices that best fit your company, from restrictions on social sites to rules on mini devices and instant messaging. Plus, we offer expert tips for communicating these new Web 2.0 policies to workers.

  • Getting up to speed with VoIP

    One reader asks: "My company is expecting to make the move to VoIP in the next year or so. I would like to learn some basics before the move is made and hopefully be able to ask the rights questions as the selection is made. Without hocking the family jewels, is there a way that I can build some experience?"

  • Advice for starting server virtualization

    Virtualization -- the move to go from real, physical hardware to virtual hardware -- is being seen as one of the "next big things" in IT. There are more virtualization options for IT departments than ever before, including open-source applications from Xen and Virtual Iron; Microsoft's Virtual Server taking off like wildfire; and the venerable VMware products.

  • Simple steps to greening your data centre

    As heavy power users, IT departments have a key part to play in reducing greenhouse gas emissions. And apart from the environmental impact, they need to make sure they don't exhaust their capacity. A recent Gartner report notes that 50 percent of data centres will have insufficient power and cooling capacity by 2008.

  • Here's how to build your own Yahoo Pipe

    Want an easy way to find an apartment near a specific location, or track items on eBay in a certain price range, or see all the news that interests you in one place?

  • Connecting a building to the campus LAN

    One reader asks: "I have been asked to connect a building to our network that isn't currently connected. While this building, albeit a small one, is a stone's throw from two other buildings, the decision was made when the fiber backbone was installed between the building to not include this building because it was due to be torn down in the near future. That was several years ago and before my time but the building still exists. I have now been asked by a department head to provide costs estimates for connecting connecting the building to the network. After consulting the drawings for the fiber backbone, there is conduit running to the building but only phone lines were run to the building. Only a couple of people are expected to be in this building at any given time. What will be the best option for connecting this building to the network?"

  • Using TLS protocol in Exchange Server

    The popularity of wireless LANs is increasing as is the use of wireless Internet access points, so the need for secure and encrypted e-mail exchanges is becoming more critical. While there are many implementations of e-mail encryption, one of the most popular e-mail servers is Microsoft Exchange 2003 Server which has built-in encryption capabilities.

  • 10 tech-management tips

    Ten simple tips to manage your enterprise technology.

  • Mining the Deep Web: Search strategies that work

    Just because a Web search engine can't find something doesn't mean it isn't there. You may be looking for info in all the wrong places.

  • Selecting a Domain Name

    If you want to market your products and services online, one of the most important initial steps is selecting a domain name.

  • Use less paper, save money

    A few years ago, there was lots of excited chatter about how we were on the brink of becoming a paperless society. No longer would offices be cluttered up by reams of reports. Faxes would be replaced by electronic communiques. Even items that it seemed would have to be printed because they required a physical signature would disappear as we learned to trust digital signatures on e-mails.

  • More telecom contract tips

    OK, you're in the home stretch. You've issued your telecom RFP, assessed the responses and concluded your contract negotiations. You've got rates you can live with and services that represent a net improvement over what you're getting now. You're done, right?

  • Structuring your telecom sales strategy

    Techies usually hate dealing with sales folk, because we seem to come from different worlds. Engineering is about honesty: Either that bridge will hold or it won't. Sales is about deceit (or so we geeks assume): Lie to the customer and cash the commission.

  • The devil's guide to Windows Vista security

    Microsoft, as you probably know, has spent a lot of time and millions of dollars to make Windows Vista more secure and ultimately to protect users from themselves.

  • Powerline: the next big thing?

    For many moons now, PC publications have talked about ways to connect devices wirelessly. As far as wired connections went, innovations have seemed thin on the ground. However, a way of physically connecting devices using something called Powerline -- a concept that has been around for three or four years -- is now making its presence felt in the U.K.

  • Kernel space: Buried in warnings

    The 2.6.19-rc4 prepatch release did not go quite as well as the developers might have liked; some confusion over the return type for an internal function led to an undesirable mixing of pointer and integer types in the depths of the block layer. As it turns out, gcc noticed this problem and duly issued warnings about it, but nobody saw them before the mistaken patch was merged and the resulting kernel shipped. This is, in other words, a problem which should have been easily avoidable.

  • Go wild with widgets

    Have you embraced the widget movement yet? If not, you will.

  • Fighting security threats from IM and rogue Web access

    Businesses of all sizes today are graduating from the first stage of Internet use, dominated by e-mail, to a new stage characterized by increasing use of the Internet for research and of instant messaging (IM) to supplement telephone and e-mail for communications both inside the company and with clients and business partners.

  • Ten tips to secure client VPNs

    If you have given your trusted employees and key contractors remote access to your network via a client virtual private network (VPN), congratulations! By now, you have seen the productivity and cost benefits from allowing collaboration that surmounts geographical separation.

  • Key to omnichannel CX is customisation

    In order to achieve success with omnichannel customer experience strategy, companies need to utilise user personas, while maintaining excellence across all channels, according to customer transformation service expert, Brad Starr.

    Interactive Intelligence

    Interactive Intelligence is a global provider of enterprise-grade collaboration, communications and customer engagement software and cloud services that help customers improve service, increase productivity and reduce costs.

  • CIO