Stories by Ian Yates

  • Xposure: Getting the right eXsposure

    The editor asked me to write a few words about XSP. I guess it must be the whole "X" thing that has got her chasing around looking for X-stories. She suggested that "XSP" stands for "eXSPosure", but being a Web kinda guy, I thought I'd better fire up the webferret (www.ferretsoft.com) and find out if she's right.

  • Remote control

    Ian Yates looks at the latest ways to provide your customers with remote access without necessitating they become Internet service providers

  • ZIPpadee doo dah

    Highly competitive removable storage may just be a godsend for a reseller looking for a bit of extra margin on that PC sale. And one thing you can be sure of - you won't be firing blanks.

  • Eternal Servitude

    The meteoric growth of the server market is creating new opportunities for those interested in box moving to sell, upsell and service at all levels of the market.

  • Who do you want to be on the Net today?

    Novell has released software it says allows Internet users to control their own online identity. digitalme is designed to make it easier, and safer, to respond to the user surveys often required to enter a Web site, Novell officials said.

  • East of Java

    Every day, it seems, another developer announces a new Java software product. This year alone, nearly 500 Java applications and development tools were added to a list of Java products compiled by Sun Microsystems. But while the number of commercially available products continues to grow, the Java software market is hamstrung by problems. Ian Yates looked into what's holding Java back

  • FEATURE Servers

    Selecting a server to supply to the SME market will depend on the existing focus at your shop. If you are an independent sort of reseller or systems integrator, or even if you are traditionally focused on one or two brands, it won't hurt to know what the opposition might be offering your customers. You may even decide to add another vendor to your armoury. Ian Yates weighs the options.

  • Would you notice if you were being penetrated?

    Probably. But if the penetration was computer-based, would you notice? When your customer's office is burgled, it's fairly obvious when you arrive that things are a tad more untidy than usual.