Pages
- How to make the most of your Microsoft 365 investment
- SiteMap
- Professional Services Terms
- NCE Managed Services Terms
- Managed Services Terms
- Supply of Goods Terms
- Master Services Agreement
- Privacy Policy
- Blog
- Back-up & Disaster Recovery
- Free consultation
- Contact Us
- Careers
- Meet Our Team
- Cloud Services
- Virtual Desktop
- Disaster Recovery
- Business Intelligence
- Productivity & Collaboration
- Mobility Security
- Azure and Hybrid
- Product Portfolio
- Modern Cloud Solutions
- Homepage
Categories
Posts
- 4 handy Microsoft Teams features to take advantage of
- Reducing the costs and complexity of data back-up and disaster recovery
- Penetration testing: a huge asset for small businesses?
- Harness the Power of Data with Microsoft Azure
- Patch Management: Your Guide to Windows Autopatch
- How managed IT services can solve common business challenges
- The 2023 Guide to Azure VMware Solution
- MFA Fatigue Attacks: What are they and how can your business combat them?
- Navigating the Cloud
- 5 reasons why SMBs should be using Microsoft Azure
- What the new Cyber Essentials requirements mean for your business
- Key Differences Between Spam and Phishing
- Common Mobile Device Management Challenges and How to Solve Them
- 9 Steps to Ensure Success in Cloud Migration
- The Growing Importance of Business Intelligence (BI)
- What is Microsoft Enterprise Mobility + Security? Your Guide to EM+S
- How to recover from a cyberattack
- 5 ways technology can lower overall business expenditure
- Private Cloud vs. Public Cloud vs. Hybrid Cloud: Differences Explained
- Top Cybersecurity Considerations for Accountancy Firms
- The 2023 Guide to MDM and MAM with Microsoft Intune
- What processes can be automated within your business?
- What is a Zero-Day Exploit? How to keep your business protected
- Is your business ready to move to the cloud?
- Why your business needs a holistic security solution
- How your business can benefit from Azure Virtual Desktop in 2023
- Cost Considerations When Moving To The Cloud
- 5 Technology New Year’s Resolutions for Businesses
- Hacking Humans: How to protect against social engineering attacks
- Top 5 Technology Trends for 2023
- EDR vs MDR vs XDR: What’s right for your business?
- How could RPA help your business grow?
- Common Cloud Management Problems and How to Solve them
- Why Multifactor Authentication is Essential for All Businesses
- Make The Most of Microsoft SharePoint With These 8 Tips
- What is Double Extortion Ransomware? Your Ransomware Questions Answered
- The Environmental Impact of Moving to Cloud Computing
- How To Ensure Success in a Digital Transformation Project
- Top 7 Use Cases for Azure Virtual Desktop
- Protect your business from the evolving threat of phishing attacks
- Top 9 Microsoft Azure Services for Businesses in 2022
- Top 9 Tips to Work Smarter in Microsoft Teams
- Power BI: Empower Your Business with Data Visualisation
- Microsoft Azure vs. On-Prem: What’s best for your business?
- The Growing Importance of IT Support for your Business
- Types of Malware and How to Protect your Business
- What is application modernisation and why is it necessary?
- How businesses are making the move to a passwordless future
- What value does a unified communications solution add to your organisation?
- Common IT Challenges in the Education Sector
- Are your Microsoft 365 mailboxes backed up?
- What is Azure Active Directory? Complete Guide for SMBs
- How to Avoid These 5 Common Cloud Migration Challenges
- Why are Small Businesses Investing in Penetration Testing?
- Automate Business Processes Easily with Microsoft Power Automate
- Why do businesses outsource their IT? Benefits & Considerations
- What does the future of business telephony look like?
- 5 Common Cybersecurity Myths Your Business Should Be Aware Of
- Why are businesses are moving to Microsoft Business Central?
- Digital Transformation in the Insurance Sector: Key Technologies and Insights
- What’s next for Digital Transformation?
- What is Data Loss Prevention? Why is it essential for your business?
- What your business needs to know about Tenant-to-Tenant Microsoft 365 Migrations
- The 6 worst cyberattacks of 2022 (so far)
- Containers vs Virtual Machines (VMs): Which is right for your business?
- Are you getting the most value from your cloud investment?
- What are insider threats and how can you defend against them?
- Six common IT challenges for fast-growing businesses
- How Azure Virtual Desktop solves common business challenges
- Business Continuity vs Disaster Recovery: Key similarities and differences
- What more can your business do to combat ransomware?
- Why endpoint security is important for your business
- Your 2022 guide to migrating SQL Server to Microsoft Azure
- Benefits and challenges of outsourcing IT services
- Why a Cyber Essentials certification is important for SMBs
- Business Process Automation: The current state of automation in 2022
- How your business can make the most of the modern workplace
- What is a human firewall and why is it important?
- How businesses can move to a paperless future
- An introduction to Microsoft Power Apps
- The role passwords play in a world of cybercrime
- What is Identity and Access Management (IAM), and why is it important?
- 8 features of Microsoft 365 you might not know about
- Shadow IT: What is Shadow IT and how can businesses combat it?
- 5 reasons why your business should outsource their cybersecurity
- Azure Virtual Desktop vs. Windows 365: Which is right for your business?
- Business Intelligence: 5 ways businesses use Power BI
- Harness the power of AI in your business with Microsoft Azure
- How businesses can stay vigilant in periods of increased global cyber risk
- What is an attack vector? 10 common attack vectors to watch out for in 2022
- Microsoft 365: More than just office applications
- 5 Types of Phishing Attacks (and How to Avoid Them)
- What Azure Active Directory can do for your business
- The importance of Zero Trust in a hybrid work environment
- Why your business needs a disaster recovery plan
- How moving to the cloud can benefit not-for-profit organisations
- Ukrainian Malware Attacks: Fake Ransomware Explained
- Passwordless Authentication: Benefits, Challenges and Deployment Options
- SMB Cybersecurity: Frequently Asked Questions
- Microsoft 365 Business Standard vs. Premium: Which is right for your business?
- How to create a comprehensive security ecosystem
- 5 steps to ensure a successful Azure migration
- The 6 worst cyberattacks of 2021
- Security Stop-Press : 50% Increase In Cyber Attacks On Corporate Networks In 2021
- Why businesses should migrate to SharePoint Online
- 3 ways your business could benefit from Azure Virtual Desktop
- Key challenges of endpoint security
- Tech Insight : What Is A Password Manager?
- Why businesses should implement single sign-on (SSO)
- The 6 worst cyberattacks of 2021
- How to get the most out of the Azure Cloud
- Tech Insight : Email Security
- A Business Continuity Plan : The Essentials
- Digital Markets Act Could Protect Whistleblowers
- Tech News : Self-Powered Mobile Masts Could Beat Remote Off-Grid Challenges
- Security Stop-Press : GoDaddy “Security Incident” Could Affect 1.2 Million
- Tech Tip – Using Windows ‘Hello’ For Easier and Safer Device Sign-In
- 8 Steps To Successfully Implement A BYOD Programme
- How Technology Can Help Businesses Retain Employees And Build A Positive Company Culture
- Windows 11: Is Now The Right Time For Your Business To Upgrade?
- Windows 365 “Cloud PC” From Microsoft
- Domain Security
- The Big Switch-Off
- Facebook (Meta) To Integrate Workplace With Microsoft Teams
- Hybrid Working Results In Move Off-Premise For Tech Infrastructure
- Microsoft Unveils ‘Loop’ Collaborative App
- Top 10 Announcements From Microsoft Ignite November 2021
- Mobile Device Security: 5 common mobile device security threats
- IT Outsourcing: 6 aspects to consider when selecting an IT provider
- Hybrid Working: How technology can support your move to hybrid working
- Tech Insight : What Is A Digital Twin?
- Insiders Testing Android Apps On Windows 11
- Meritum Achieve Microsoft Gold Security Partnership
- Cyber Essentials Plus
- WHY VIDEO CONFERENCING TECHNOLOGY IS A MUST-HAVE FOR HYBRID WORKING?
- REMOTE WORKING FATIGUE AND HOW TO REDUCE AND MANAGE IT
- Choosing the right Microsoft 365 subscription for your non-profit.
- Financial firms seeing success from technology investments
- Microsoft Teams for Teachers in 2021
- Break down remote collaboration barriers with Microsoft Power Apps
- The importance of employee engagement within the financial sector
- The technologies that transform the legal industry
- WVD’s new features: It’s never been easier to introduce Virtual Desktops into your business
- Reactive to proactive: Here’s how to evolve your disaster recovery strategy
- 5 Questions for IT managers in Financial Services
- 4 IT Priorities for Small & Medium Businesses in 2021
- Do you know how hackers attack?
- Why have a disaster recovery plan and what could happen if you don’t?
- Cybersecurity essentials for businesses in 2021
- A guide to surviving full-time remote working
- An Easy Guide To Securing Remote Work
- How could Windows Virtual Desktop help your business survive COVID-19?
- Windows Virtual Desktop: Secure and Scalable
- What is Windows Virtual Desktop
- Nowe Centrum Usług Chmurowych w Krakowie!
- Passwordless authentication in Office 365
- Meritum Cloud Złotym Partnerem Microsoftu!
- Nowe Centrum Usług Chmurowych w Krakowie!
- Srebro dla Meritum Cloud! Nowe certyfikacje od Microsoft.
- Niezwykle udany warsztat Meritum Cloud w Londynie!
- Fantastyczne wydarzenie Power BI!
- Why the digital workplace needs the right tools
- The keys to increasing productivity – Teamwork and Security
- The future of work – a modern workplace with Microsoft 365
- Brace yourself – Windows and SQL Server 2008 and 2008 R2 end of support is coming
- We are on Azure Marketplace!
- Citrix Desktop Director 2.1
- Citrix Desktop Studio on XA6
- Fantastic Power BI event!
- Azure Files – let’s share a file
- Another great event by Meritum Cloud!
- Meritum Cloud announces Microsoft Silver Small and Midmarket Cloud Solutions Competency
- Migrating a WordPress site to Azure App Services
- Meritum Cloud Announces Cloud Services Centre in Krakow
- Meritum Cloud Announces Microsoft Gold Partner Status
- EUC Consulting is now Meritum Cloud
- Skype for Business Call Queues and Auto Attendants
- Move your Office 365 data to the UK
- Microsoft Bookings
- Configure Microsoft Bookings
- How to enable Azure Preview Features
- Hide an application and display a message to the user in RES One
- Implementing Skype for Business on XenApp
- Citrix Provisioning Services Target Device Unattended Install
- Script to Resize Citrix AppDisk on vSphere
- Why we attend E2EVC Conference
- XenApp Auto Scaling Script
- Powershell Script to get SQL Mirroring Configuration for XenApp 6.x
- PowerShell Script to notify you when a server has finished rebooting
- XenApp 6.x to XenApp 7.x App Migration Script
- How to resolve SystemArgumentException: The path is not of a legal form error in Citrix Receiver
- The file nstrace1 isn’t a capture file in a format Wireshark understands
- Citrix StoreFront High Availability and Aggregation – A dual site Active Active design
- Visio tips for creating good Citrix Diagrams
- XenDesktop 7 Rolling Reboot Script
- NetScaler Gateway Dual Factor using Yubikey
- NetScaler Gateway Dual Factor Authentication using SMS2
- Atlantis ILIO RAM Sizing Calculator for RDSH
- How to pass URLs to Published Internet Explorer
- AppSense Dynamic Start Menu and App-V 5 Integration
- XenApp 6.5 vs XenDesktop 7 App Edition
- PowerShell Script to Uninstall all Versions of Citrix Client and Install Citrix Receiver 3.x
- PowerShell Script To Find Folder Redirection Errors
- XenApp PowerShell Basics
- Full list of Citrix Client Uninstall Strings
- How to find which Citrix Receiver command line options were used during install
- How to install Citrix Receiver Enterprise 3.4 with Preconfigured PNAgent URL
- How to change the FQDN of Citrix Access Gateway Enterprise Edition
- PowerShell script to get installed applications
- PowerShell Script to change local Administrator Password on XenApp servers
- PowerShell script to create multiple published applications for testing
- Desktop Director RES AM Runbook
- What is XenApp – Part II
- Migrate from XenDesktop 4 to XenDesktop 5.x
- Windows 7 Blue Screen When Installing AppSense Agents
- Access Gateway 401 – Unauthorized: Access is denied due to invalid credentials
- Customizing Citrix Access Gateway
- PowerShell XenApp Application Report
- Citrix Desktop Studio – object reference not set to an instance of an object
- There was an error while attempting to mount the NFS share
- How To Set Up XenDesktop Machine Creation Services
- Access Gateway Enterprise HTTP 500 Internal Server Error
- What is Citrix XenApp? – Part I
- XenApp Shortcut Settings
- Initializing the Citrix data store failed
- XenApp Content Redirection
- XenApp slow logon troubleshooting and optimisation
- Citrix Access Gateway Enterprise Port Configuration
- Group Policy Export
- Migrating a WordPress site to Azure App Services
- Azure Automation State Configuration