Video Screencast Help

Search

Search results

I know some of you guys and gals are looking at new remote support tools - here are the sanitized results of my bake off. I tested Bomgar, GoToAssist and LogMeIN as they were the three largest and well suited for my 25k desktops, 600 tech support ...
Article by sdmayhew | 17 Feb 2016 | 2 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
Trends in Trust on the internet of Things We are all happy with how technology is making our lives easier and fulfilling. Most of the internet population is however not aware that the moment you turn on a device connected to internet or ...
Article by dion_alken | 22 Apr 2015 | 0 comments
Summary This document details the steps that we follow for all surplus and Asset Recovery Services (ARS) activities for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and adjust, review, and apply to your ...
Article by ziggy | 18 Nov 2014 | 0 comments
If you want to have pre installtion check,Health checkup, recommendations and collect logs for support. Then please go through the document so that you can learn how to run a Sym help tool Attachment Size Sym Help ...
Article by Samir-Ahmed | 12 Aug 2013 | 6 comments
1 Introduction Smartphones have been widely adopted by organisations for day to day business and operational use, and employees can often access their work related data by connecting to corporate networks using their Smartphones. Many ...
Article by Vikas Rajole | 21 Mar 2013 | 12 comments
De-Militarized Zone or the DMZ is the portion of the network which has two main specifications: 1-      Contains servers and services which are accessible from outside of the network. 2-      Any access to these servers and transaction with them ...
Article by Farzad | 19 Mar 2013 | 7 comments
This paper discusses the need for business continuity practitioners to make incident management a focal element of their programme.   Particularly during the first few minutes and hours of a business disruption, an established incident ...
Article by Courtenay Enrig... | 29 Jan 2013 | 0 comments
Hi Everybody,                       You may be facing lot of problems with a virus infected systems in your  IT environment. Here is a tool which will help your endpoints to recover after a massive virus outbreak. If the endpoints are  heavily ...
Article by Samir-Ahmed | 13 Jan 2013 | 1 comment
When Erik Hughes, the Principal Product Manager on SWV asked me to write an article on our PolicyPak utility for SWV, I wasn’t exactly sure how to start. As a Group Policy MVP I often think about the big picture problems around desktop management. ...
Article by Jeremy Moskowitz MVP | 08 Nov 2012 | 0 comments