Welcome to the Novell Communities. Consider this an exclusive invitation to get sideways social with Novell users, experts and commentators and discover best practices, innovative ideas, or ask a question. Come share your voice, read the latest news, help someone solve a challenge. Join the conversation on social media.
Overcome BYOD Roadblocks in Your Enterprise With Novell
Incorporating a BYOD policy into your enterprise can open up many new doors for your company: It can increase productivity, save money, and create a happier and healthier workforce. Unfortunately, incorporating a strong and reliable BYOD policy that governs acceptable use policies for laptops and remote PCs is not easy without the right technology.
Top Reasons to Invest in a Service Desk Solution
Picture this: While one of your employees is sitting at his workstation, he receives a file marked “important” from his client. But the employee can’t open the file and get to work because he is missing a vital plug-in, which he must obtain from IT.
GroupWise Trusted Application Test Script
Inspired by Marvin Huffaker’s excellent article about how to test a GroupWise Trusted App login via IMAP, we created this bash script to help administrators test Trusted App authentication directly from a Linux server.
Popular Topics in Novell Cool SolutionsAnnouncements Collaboration Cool Tools End-user How-to Endpoint Management Expert Views File & Networking Services Filr General GroupWise GroupWise Blog GroupWise Mobility Service (formerly Data Synchronizer) GWAVA Microsoft Exchange Mobility Mobility NetWare Novell Open Enterprise Server Partners PR Blog Supported Technical Vibe Vibe Forms & Workflows Windows ZENworks ZENworks ZENworks Configuration Management ZENworks Mobile Management
Want to Protect Your Remote PC Endpoints? Focus on Securing Your Data
Each remote endpoint in your enterprise, whether it is a laptop or desktop computer, is like a virtual door that leads directly to your organization’s data. When left unsecured through lackadaisical endpoint management policies, these endpoints can pose a major security threat to your organization.
Is Your IT Department Losing the Battle Against Workstation Application Management?
Your IT staff is at its wits’ end trying to keep up with the demands of its end user application deployment, management and migration. There are simply too many on-premises and remote employee workstations to look after, each with its own set of endless and complicated software management requirements.
Top Three Reasons to Invest in Remote Data Encryption
Each user endpoint in your organization is like a door that leads directly into your enterprise. Just like your company protects its physical location using a robust security system, it needs to take the same measures online in order to prevent a data breach from occurring.
Consultants Corner: Quick Tip: GroupWise Mobility Service Installation Notes
In this quick tip, I will provide one of my lists for GroupWise Mobility Service. This list is what I use to build single or multiple GroupWise Mobility Service servers. I always follow this list for my implementations and it has made all the GroupWise Mobility Service installations easy.
The Future of Novell Collaboration
Rick Carlson, Senior Director of Product Management breaks down the future of Novell’s collaboration offerings. Take a look now …
The GroupWise Blog – Same Insight, Same Passion, New Voices
GroupWise is bigger than any one person, and the GroupWise Blog will still be your space to hear all the latest and greatest news about GroupWise, and have your voice be heard in return. Dean may have been its Master of Ceremonies, but in many ways the GWBlog has always belonged to you — our partners, users, administrators, and customers.
Take the Hassle out of Patch Management with Automation
Trying to keep data assets and software safe online is like trying to keep water out of a sinking boat. Just like water will penetrate even the smallest crack of a boat, malware will easily enter into a system that is not properly equipped with the right security measures.
ENGL Z-Remote BETA
ENGL Z-Remote is a standalone remote management tool for ZENworks 11 Configuration Management. Z-Remote is designed for help desk technicians who need to remote manage devices quickly and efficiently without requiring access to ZENworks Control Center.
Are Your IT Assets Spiraling Out of Control?
You’ve spent the last few years piecing together your network—making for a hodgepodge of assets. Now, you have a mix of hardware and software from a variety of different vendors, and no way of knowing what’s being used…
Novell Endpoint Management: Your File Sharing Enforcer
By now most of the IT world understands the issues with uncontrolled file sharing, and more than one Novell blog post has discussed those problems. Most organizations would like their employees to avoid using free, unsecure applications such as cloud file sharing. And yet most people are using those apps anyway.
Want to Give Your IT Department Superpowers? Try Virtualizing Your Apps
Is your IT department jumping through hoops trying to make sure all of your distributed end users have access to essential applications and services? Your IT team members may be talented, but they’re not superheroes.
The Many Definitions of Mobility
If there’s one thing the IT world is agreed on, it is that mobility is important. Yet every IT vendor seems to have a different take on mobility. Let’s take a look at some of the most common ways of defining it and what each of them means.