Novell Home

Novell Communities

Welcome to the Novell Communities. Consider this an exclusive invitation to get sideways social with Novell users, experts and commentators and discover best practices, innovative ideas, or ask a question. Come share your voice, read the latest news, help someone solve a challenge. Join the conversation on social media.


Overcome BYOD Roadblocks in Your Enterprise With Novell

Incorporating a BYOD policy into your enterprise can open up many new doors for your company: It can increase productivity, save money, and create a happier and healthier workforce. Unfortunately, incorporating a strong and reliable BYOD policy that governs acceptable use policies for laptops and remote PCs is not easy without the right technology.

Top Reasons to Invest in a Service Desk Solution

Picture this: While one of your employees is sitting at his workstation, he receives a file marked “important” from his client. But the employee can’t open the file and get to work because he is missing a vital plug-in, which he must obtain from IT.

GroupWise Trusted Application Test Script

Inspired by Marvin Huffaker’s excellent article about how to test a GroupWise Trusted App login via IMAP, we created this bash script to help administrators test Trusted App authentication directly from a Linux server.

Want to Protect Your Remote PC Endpoints? Focus on Securing Your Data

Each remote endpoint in your enterprise, whether it is a laptop or desktop computer, is like a virtual door that leads directly to your organization’s data. When left unsecured through lackadaisical endpoint management policies, these endpoints can pose a major security threat to your organization.

Is Your IT Department Losing the Battle Against Workstation Application Management?

Your IT staff is at its wits’ end trying to keep up with the demands of its end user application deployment, management and migration. There are simply too many on-premises and remote employee workstations to look after, each with its own set of endless and complicated software management requirements.

Top Three Reasons to Invest in Remote Data Encryption

Each user endpoint in your organization is like a door that leads directly into your enterprise. Just like your company protects its physical location using a robust security system, it needs to take the same measures online in order to prevent a data breach from occurring.

Consultants Corner: Quick Tip: GroupWise Mobility Service Installation Notes

In this quick tip, I will provide one of my lists for GroupWise Mobility Service. This list is what I use to build single or multiple GroupWise Mobility Service servers. I always follow this list for my implementations and it has made all the GroupWise Mobility Service installations easy.

The Future of Novell Collaboration

Rick Carlson, Senior Director of Product Management breaks down the future of Novell’s collaboration offerings. Take a look now …

The GroupWise Blog – Same Insight, Same Passion, New Voices

GroupWise is bigger than any one person, and the GroupWise Blog will still be your space to hear all the latest and greatest news about GroupWise, and have your voice be heard in return. Dean may have been its Master of Ceremonies, but in many ways the GWBlog has always belonged to you — our partners, users, administrators, and customers.

Take the Hassle out of Patch Management with Automation

Trying to keep data assets and software safe online is like trying to keep water out of a sinking boat. Just like water will penetrate even the smallest crack of a boat, malware will easily enter into a system that is not properly equipped with the right security measures.

ENGL Z-Remote BETA

ENGL Z-Remote is a standalone remote management tool for ZENworks 11 Configuration Management. Z-Remote is designed for help desk technicians who need to remote manage devices quickly and efficiently without requiring access to ZENworks Control Center.

Are Your IT Assets Spiraling Out of Control?

You’ve spent the last few years piecing together your network—making for a hodgepodge of assets. Now, you have a mix of hardware and software from a variety of different vendors, and no way of knowing what’s being used…

Novell Endpoint Management: Your File Sharing Enforcer

By now most of the IT world understands the issues with uncontrolled file sharing, and more than one Novell blog post has discussed those problems. Most organizations would like their employees to avoid using free, unsecure applications such as cloud file sharing. And yet most people are using those apps anyway.

Want to Give Your IT Department Superpowers? Try Virtualizing Your Apps

Is your IT department jumping through hoops trying to make sure all of your distributed end users have access to essential applications and services? Your IT team members may be talented, but they’re not superheroes.

The Many Definitions of Mobility

If there’s one thing the IT world is agreed on, it is that mobility is important. Yet every IT vendor seems to have a different take on mobility. Let’s take a look at some of the most common ways of defining it and what each of them means.

© 2015 Novell