Google sees new browser displacing desktop software

Thursday, September 4, 2008

MOUNTAIN VIEW, California (Reuters) - Google Inc is challenging Microsoft Corp with its own Web browser that lets users run many applications that once worked only when installed on local PCs, executives said on Tuesday.

Google introduced a public trial version of its new browser software, Chrome, which is designed to handle not just text and graphics, but more complex computer programs.

Chrome, available in 43 languages in 100 countries at www.google.com/chrome, has been designed to download software and Web pages faster than existing browsers. It even allows users to keep working when one of its windows crashes.

This represents Google's long-anticipated head-on attack on Microsoft and its Internet Explorer, which has three-quarters of the Web-browsing market. Google has backed Mozilla Corp's Firefox browser, which holds about 18 percent of the market.

Google engineers and executives call Chrome a "fresh take on the browser," a 15-year-old technology that is supplanting 25-year-old desktop software as the basic way users interact with computers.

"You actually spend more time in your browser than you do in your car," said Brian Rakowski, group product manager for Google's browser project.

Chrome was seen by analysts as partly a defensive move due to Google's fear that the recently upgraded Internet Explorer 8 (IE 8) could be used to lock out Google. Google's core business of Web search and related advertising depends on browsers.

A Microsoft executive said IE 8 gives users control over how and where they navigate, improves their day-to-day browsing experience, and keeps people safe from new security threats. "Microsoft understands that Web browsing is crucially important for hundreds of millions of people, which is why we invest in Internet Explorer so heavily," Dean Hachamovitch, general manager of Internet Explorer, said in a statement.

CHALLENGE TO MICROSOFT WINDOWS?

Google co-founder Sergey Brin said Chrome was designed to address the shift to using software from within a Web browser rather than as locally installed computer applications running inside Microsoft Windows or some other operating system.

"I think operating systems are kind of an old way to think of the world," Brin told a group of reporters after the news conference at Google's Mountain View, California headquarters. "They have become kind of bulky, they have to do lots and lots of different (legacy) things."

Google believes any task done in a standalone desktop computer application can be delivered via the Web and Chrome is its bet that software applications can be run via a browser.

"We (Web users) want a very lightweight, fast engine for running applications," Brin said.

"The kind of things you want to have running standalone (on a computer) are shrinking," he said, adding that he still edits photos on his computer rather than using a Web program.

GOOGLE BORROWS FROM APPLE, FIREFOX

Chrome borrows liberally from other browsers running open-source software code, including Apple Inc and Firefox, and company officials said they planned to fully share Chrome code with other developers. "We have borrowed good ideas from others," Google Vice President of Product Management Sindar Pichai said. "Our goal here was to bring our point of view, but do it in a very open way."

Because Chrome relies on Apple's open-source WebKit software for rendering Web pages, it can run any application that runs on Apple's Safari Web browser, Pichai said.

"If you are a webmaster, and your site works in Apple Safari then it will work very well in Google Chrome," he said.

Greg Sterling, a Web analyst with Sterling Market Intelligence, said Google's entry into the browser market has echoes of the bruising "browser wars" of the late 1990s, when Microsoft crushed Web pioneer Netscape Communications.

But while the competition between Microsoft and Google is likely to produce many improvements for consumers, the likely fallout from the battle will be other browser makers that have only recently begun to pry market share away from Microsoft.

Sterling said Firefox could become a victim of "friendly fire" from Google as many of its users are the same early adopters who are most likely to switch and try a new browser.

"Firefox has softened up and paved the way for Google. Without Firefox, Chrome would not be possible," Sterling said.

Brin said Google planned to continue to work closely with Mozilla, whose primary financial backing has come from Google in recent years. He said he hoped to see future versions of Chrome and Firefox become more unified over time.

Chrome organizes information into tabbed pages. Web programs can be launched in their own dedicated windows.Among Chrome's features is a special privacy mode that lets users create an "incognito" window where "nothing that occurs in that window is ever logged on your computer," according to a Google promotional guide.

iYogi Announces Launch of Monitoring and Performance Tool For SMBs

Wednesday, August 27, 2008

iYogi – a leading provider of technical support services with horizons in the US, UK, Canada and Australia – today announced the launch of its exclusive server monitoring tools for small businesses. The new product offers integrated technology solutions to surmount the users’ unique IT support requirements thereby enabling them to derive and share information, data, enable network performance analysis, and security trends critical to plan and mana ge their set of servers – 24x7.


Uday Challu, iYogi’s CEO commented, “Holding a significant niche for itself in the computer support industry, iYogi has always known to be on the forefront of adapting breakthrough technology to exceed customer service expectations. This time we have developed a tool offering value-add functionality which will help small business customers maximize the business outcomes of IT.”


iYogi’s monitoring tool provides real time observation and monitoring solutions to ensure more robust and reliable IT support and infrastructure for small buinesses. Small Business owners also get a comprehensive assesment of their IT environment to meet technology needs with the scalability for future growth and create preventative measures based on quick analysis of network device alerts, pre-failure indicators, performance benchmark and security issues.


The new Monitoring and performance tool will provide small business with the opportunity to test all technical and non-technical aspects of their servers and help them to strengthen overall IT infrastructure. The array of services will include: Patch Management, Security Auditing, Site Inventory, Real Time Alerting Script Based Management, and Rights Management Services for all critical server issues.


“Irrespective of the business being small or large, when the consumer chooses iYogi, he leverages the potential of an elite taskforce of Microsoft Certified System Engineers and Cisco Certified Network Associates, ready to service their critical assets, using the most advanced network asset tracking and Performance monitoring”, adds Challu.


Another factor where the Company aims to distinguish itself from its competitors is product pricing. Embracing the concept of service quality, iYogi offers competitively priced technical support services at no-haggle, low prices.


As for its small business support, the Company has integrated its exclusive Monitoring and Alerting Services under one price umbrella of just $480 annually. per server i.e. $49.99 per month. The price is certainly hard to find anywhere else.


For more information on iYogi Small Business Support, visit http://www.iyogibusiness.com/



Contact Details:
Company Name: iYogi Technical Services Pvt Ltd
Address: iYogi Inc.
12 Desbrosses Street
3rd Floor
New York, NY 10013
Toll Free no:1-800-237-3901
Work Number: 1-212-229-0901
Fax Number: 1-888-867-2715
E-Mail: awadhesh.singh@iyogi.net

iYogi Secures $9.5M in Series B Funding Led by SAP Ventures, With Follow-on Investment from Canaan Partners and SVB India Capital Partners

Friday, July 25, 2008

iYogi Secures $9.5M in Series B Funding Led by SAP Ventures, With Follow-on Investment from Canaan Partners and SVB India Capital Partners
iYogi, a Direct-to-Consumer and Small Business Technical Support Provider, Paves the Way for Personal Offshoring to Become India’s Next Success Story

New York, 24 July, 2008: Personal Offshoring, which is driving the next wave of India’s outsourcing success story, got a huge boost today when iYogi - a remote technical supportprovider from India - raised $ 9.5 million in Series B financing from SAP Ventures, a division of SAP AG, Canaan Partners and SVB India Capital Partners, a venture fund affiliate of Silicon Valley Bank.

iYogi (www.iyogi.net) delivers technical support services directly to consumers and small businesses and is the first, global, technical support brand based out of India. The company offers its customers an unlimited, annual service subscription for $119.99 per desktop that includes support for a wide range of technologies, including PC hardware Microsoft Windows operating system, software applications, peripherals and multifunctional devices.

“Personal Offshoring has created new investment opportunities in India with incredible growth potential,” said Doug Higgins, partner at SAP Ventures. “It is very exciting to see companies like iYogi challenging the traditional enterprise-focused offshore-service delivery model by creating a consumer-focused, direct-to-customer personal offshore model. iYogi is one of the fastest-growing companies in this market segment, and we look forward to working with them to create India’s next success story.”

“Our focus on the customer experience has helped us achieve a 93 percent satisfaction rate across more than 50,000 customers,” said Uday Challu, CEO of iYogi. “We are delighted to have the support of three terrific investors as we increase our market share and continue to provide the best technical support experience possible for our customers.”

iYogi will use the funds to fuel its expansion into 12 new regions, including the United States, the United Kingdom and Canada, and to increase its delivery of new services including PC recovery, anti-virus/spyware, data back-up and PC optimization.

“As consumer technologies grow in sophistication, consumers will be seeking the kind of home IT support services – including remote services offered by companies such as iYogi – to help them solve their most complex problems,” said Kurt Scherf, vice president and principal analyst, Parks Associates. “In primary research, we found more than one-third of consumers are willing to pay for competent and professional remote support services, and 60% express a strong interest in software solutions – what we refer to as ‘PC Dashboards’ – that automate many basic PC performance enhancement and troubleshooting features, solving many PC-related problems before they even are noticed by end-users.”

iYogi had previously raised $3.1 million in Series A financing from Canaan Partners and SVB in April of last year. “iYogi is one of the most promising investments for Canaan Partners,” said Alok Mittal, managing director of India at Canaan Partners. “Third-party, vendor-independent technical support is an exciting new service category, witnessing explosive growth. Customers are looking beyond the traditional vendor-provided support to remote channels for better problem resolution, faster service, and greater overall satisfaction. iYogi has created an incredible value proposition and price offering for its customers that is hard to beat.”

”Several next generation outsourcing companies from India are delivering a range of personal offshoring services for individuals and small businesses in the U.S. including online tutoring, tax preparation, remote executive assistance and research services,” said Suresh Shanmugham, managing director of SVB India Capital Partners, a venture fund affiliate of Silicon Valley Bank. “iYogi has leveraged the technical skills available in India along with process expertise to scale as a global technical support provider for millions faced with increasingly complex technology”.


About SAP Ventures
SAP Ventures invests in innovative and disruptive software and services companies globally. We pursue opportunities across all stages for outstanding financial return. Our goal is to bring substantial benefit to all parties by facilitating interaction between portfolio companies and SAP and its ecosystem of customers and partners. SAP Ventures has a successful track record of building industry-leading companies by partnering with outstanding entrepreneurs and top-tier venture capital firms since 1996. For more information, visit www.sapventures.com.

About Canaan Partners

Canaan Partners is a global venture capital firm specializing in early-stage information technology and life sciences companies. Founded in 1987, Canaan Partners has $2.4 billion capital under management and has invested in more than 240 companies, completed 63 mergers and acquisitions, and brought over 50 companies public. The firm catalyzes the development of innovative mobile, Internet, CleanTech, networking, semiconductor, enterprise software and services, biotechnology and medical technologies to build next-generation market leaders. Canaan was an early investor in Acme Packet (APKT), Aperto Networks, BharatMatrimony.com, Blurb, DoubleClick (DCLK), ID Analytics, Match.com and SuccessFactors, along with dozens of other market-leading companies. Canaan is headquartered in Menlo Park, California and also has offices in Connecticut, India and Israel. For more information visit: www.canaan.com.

SVB India Capital Partners Fund and Silicon Valley Bank

SVB India Capital Partners Fund is a $54 million equity fund that is focused on Indian companies and co-invests across industries and stages with top-tier venture capital firms. Silicon Valley Bank is the premier commercial bank for emerging, growth and mature companies in the technology, life science, private equity and premium wine industries. Founded in 1983 and headquartered in Santa Clara, Calif., the company serves clients around the world through 27 U.S. offices and five international operations. Silicon Valley Bank is a member of global financial services firm SVB Financial Group, with SVB Analytics, SVB Capital, SVB Global and SVB Private Client Services. More information on the company can be found at www.svb.com.

About iYogi

iYogi is the first direct-to-consumer and small business technical support service from India. Providing an annual unlimited subscription to technical support for $119.99 per year, iYogi now boasts more than 50,000 customers. The company employs 450 professionals servicing customers in the U.S., U.K., Canada fast expanding to 12 new geographies across the globe. iYogi’s resolution rate of 87 percent and customer satisfaction rate of 93 percent are amongst the highest published benchmarks in the industry. For further information, please visit www.iyogi.net.

SAP and all SAP logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries. All other product and service names mentioned are the trademarks of their respective companies

Any statements contained in this document that are not historical facts are forward-looking statements as defined in the U.S. Private Securities Litigation Reform Act of 1995. Words such as “anticipate,” “believe,” “estimate,” “expect,” “forecast,” “intend,” “may,” “plan,” “project,” “predict,” “should” and “will” and similar expressions as they relate to SAP are intended to identify such forward-looking statements. SAP undertakes no obligation to publicly update or revise any forward-looking statements. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations The factors that could affect SAP's future financial results are discussed more fully in SAP's filings with the U.S. Securities and Exchange Commission ("SEC"), including SAP's most recent Annual Report on Form 20-F filed with the SEC. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates.

The information contained herein is subject to change without notice. iYogi shall not be liable for technical or editorial errors or omissions contained herein.

SAP and all SAP logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries.
All other product and service names mentioned are the trademarks of their respective companies.

Any statements contained in this document that are not historical facts are forward-looking statements as defined in the U.S. Private Securities Litigation Reform Act of 1995. Words such as “anticipate,” “believe,” “estimate,” “expect,” “forecast,” “intend,” “may,” “plan,” “project,” “predict,” “should” and “will” and similar expressions as they relate to SAP are intended to identify such forward-looking statements. SAP undertakes no obligation to publicly update or revise any forward-looking statements. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations The factors that could affect SAP's future financial results are discussed more fully in SAP's filings with the U.S. Securities and Exchange Commission ("SEC"), including SAP's most recent Annual Report on Form 20-F filed with the SEC. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates.



Contact:



Company Name:
iYogi Technical Services Pvt Ltd

Address:
iYogi Inc.
12 Desbrosses Street
3rd Floor
New York, NY 10013

Toll Free no: 1-800-237-3901

Work Number: 1-212-229-0901

F ax Number: 1-888-867-2715

Security paradox for enterprises

Monday, July 14, 2008

Adam Kleemeyer discusses the most appropriate security options resellers should consider when putting together Unified Communications solutions for their Remote support services customers.

The very openness and ubiquity that makes IP networking such a powerful business enabler can also expose it to a significant threat. The ports and portals that welcome Remote support services sites, mobile users, customers, and business partners into the trusted internal network are also welcoming to those who may compromise the network’s security.

Security breaches – and the business disruptions they causes – represent a key concern for your customers. In the past, they relied on intranets primarily for email and file exchange, and they used the Internet as their web storefront. With Unified Communications, since IP networks are being entrusted to carry the essential functions of conducting business – customer contact centres, voice, Unified Messaging, conferencing, and more – there’s a heightened requirement for protection.

Removing the obstacle

Now that IP networks offer the robustness and quality of service that voice service requires, enterprises have been quick to capitalise on the benefits of Unified Communications. Converging voice and data over IP maximises network efficiency, streamlines the architecture, reduces capital and operating costs, and opens up new service opportunities.

The IP-based multimedia architecture makes it easy to extend service to Remote support services sites and home offices over cost-effective IP links, and makes it easy to deploy, reconfigure (add/move/change) and repair service. Unified Communications enables rich, new multimedia services, such as web-enabled multimedia contact centres, Unified Messaging, presence andRemote support services-based call management.

However, there are factors that need to be considered in deploying a VoIP solution. As the lines blur between internal and external resources, the network reaches more audiences and touch points, carries more mission-critical services, and adds more distributed servers and intelligent clients. It also becomes increasingly vulnerable to security threats.

The typical enterprise internal network extends to supply chain partners, telecommuters, Remote support services access users, web users, application service providers, disaster recovery providers and more. That means that the network may also be more accessible to hackers, cyberthieves, disgruntled employees, and others who would misappropriate network resources. Worse yet, although estimates vary on what percentage of security breaches are internal, most sources consider that figure to be more than 50 percent.

Organisations have been understandably concerned about securing this new multimedia environment, in which proprietary company information flows across shared facilities, public places, open airwaves and unknown users. It’s clear that security must be a key focus in any VoIP deployment.

Security for IP multimedia networks should be achievable, affordable and manageable. Confidentiality, integrity, and authentication of critical multimedia resources must be ensured while maintaining service continuity, feature richness, performance and availability. Security features should be transparent to the user, standard-based, simple to administer, uniform across products and cost-effective.

Finally, security should be implemented consistently across the solution.

As a trusted reseller, it’s your responsibility to deliver on that promise with a secure Unified Communications solution that:

• Protects the integrity of network infrastructure and communications by preventing unauthorised access;

•Increases network reliability by preventing disruptions from attacks on user services, network hardware or network management systems; and

• Prevents theft of intellectual property and abuse of resources from eavesdropping and toll fraud

A layered security strategy

A layered defense approach to network security applies multiple security approaches at multiple network levels – much like protecting your property with sentries and gates at several places.

The approach applies multiple enforcement tactics – such as authentication, encryption, packet filtering and signature-based inspection – at multiple network zones – such as access endpoint, network perimeter, network core and transport links.

A layered approach minimises the possibility that a single point of failure could compromise overall security. If a primary layer of security is breached, the secondary or tertiary layer of defense is there to thwart the attack.

This gives a cross section of the security layers, with several enforcement approaches in action. This layered approach applies directly to a VoIP solution as follows:

The core network layer protection includes the devices that monitor for unwanted behaviour or traffic patterns, and respond – this would include Intrusion Detection and Prevention Systems. The network protection approach could also apply policies that authorise devices onto the network (such as the 802.1x protocol) as well as ensuring that DoS-like traffic could be detected and shut down, and prevent devices from IP address spoofing.

Protection around the communications layer would include the ability to encrypt your voice traffic with SRTP (Secure Real-Time Transport Protocol), and signalling traffic with UNIStim or TLS (Transport Layer Security) encryption.

Source: crn.com.au/Feature/4670,security-paradox-for-enterprises.aspx

Test Your Remote computer services IQ: How Do You Rate?

Friday, July 11, 2008

Your company maintains a top-notch information security program. To capitalize on this strength, your marketing manager wants to build an ad campaign promoting your airtight information security. Your company is in an information-intensive industry, so this might lead to a competitive advantage with little downside. True or False?

Information security is a dynamic field and, although [many] professionals have become much savvier on the subject, keeping track of the latest best practices can be a daunting task. How current are you? Take this quiz on information security basics to find out.

1. Because no single antivirus program can protect against all viruses, you can enhance protection by installing several different antivirus programs from trusted vendors. True or False?

2. Your company maintains a virtual private network (VPN) that allows off-site employees to connect to the company network via the Internet. The VPN uses the latest and most secure encryption available, encoding all data from the Remote computer services all the way to the office server. By loading the VPN software on public remote computers, like those at hotel business centers, you can transact sensitive and confidential business over your company network with a high level of confidence in the security. True or False?

3. Wired Equivalent Privacy (WEP) encryption on Wi-Fi networks, which was cracked several years ago, should be avoided at all costs. True or False?

4. Using Wi-Fi Protected Access (WPA) encryption and media access control (MAC) address filtering on your Wi-Fi access point does not provide sufficient protection for transacting sensitive and confidential business via the Internet from your wireless device or remote computer. True or False?

5. You receive an e-mail from your company's IT administrator warning that a new security hole has been discovered in your corporate software. The e-mail provides a link to a patch site and directs you to download and install a patch to plug the vulnerability. Before clicking on the link and installing the patch, you should verify the legitimacy of the e-mail. True or False?

6. Your company maintains a top-notch information security program. To capitalize on this strength, your marketing manager wants to build an ad campaign promoting your airtight information security. Your company is in an information-intensive industry, so this might lead to a competitive advantage with little downside. True or False?

7. A trusted IT employee quits the company in a huff. Security escorts him off the premises. To prevent potential mischief, you immediately eliminate the employees login IDs and passwords from the company information systems and disable all other access to company premises, such as his door keycard and security pass. You and the company can breathe easily. True or False?

source : newsfactor.com/news/Test-Your-Information-Security-IQ/story.xhtml?story_id=021000Q2H0VF

Microsoft, Hewlett-Packard, Intel and Persystent to Present at Federal Desktop Core Configuration and remote PC repair Industry Leader Seminars

Friday, June 13, 2008

Persystent Technologies, the leading provider of automated remote PC repair and high-speed software imaging, today announced that experts from Microsoft, Intel, Cisco and Persystent Technologies will be presenting at seminars in Washington, D.C. Microsoft, Intel and Persystent will present at both the Federal Desktop Core Configuration (FDCC) seminar and the PC repair Industry Leader seminar, while Cisco will be the fourth at the FDCC seminar and Hewlett-Packard will be fourth at the remote PC repair Industry Leader seminar.

Persystent's Director of Sales, Will Corkery, will discuss important issues that enterprises and public agencies face today in providing a solution to manage and enforce the FDCC mandate. Persystent has developed the world's only remote PC repair automated repair (pre-boot of the OS), on or off the network, and high-speed software imaging solution that automatically repairs and restores an infected or corrupted PC's operating system and software applications.

The company's flagship remote PC repair and high speed imaging solution, Persystent automatically restores a corrupted PC's operating system, registry, applications and settings to a trusted state to ensure compliance with policy guidelines and governance requirements, empowering organizations with improved service levels and business continuity -- all without human intervention.

http://www.foxriverantiques.com

Source :itbusinessnet.com/articles/viewarticle.jsp?id=411592

Stay Connected With Remote pc tech services -Access Software

Wednesday, June 11, 2008

The workday doesn't end at 5 p.m. anymore. Chances are, you take files home with you to work on using your home PC, and then you tote them back to your office the next morning. In the course of shuttling files back and forth, you've likely run into a particularly frustrating snag at least once--the file you need the most is the one you forgot to bring along.

Remote pc tech services -access software can save the day. We looked at four services that promise to help you reach your PC's precious documents and programs, or share its functions with others, at any time. Two services, offer similar benefits: For a monthly fee you can take Remote pc tech services control of a configured computer from just about anywhere. Symantec's charges just one fee, and offers many IT-friendly features best suited to managing multiple machines in the same network. Finally, Microsoft's free application allows you to share views of your individual applications or your entire desktop with colleagues you invite, or even to permit other people to take control of your PC.

PC Anywhere

Symantec's is typically the favorite of IT departments in larger businesses, and setting it up can take a little techie know-how. But its one-time cost, as compared to the recurring monthly fee charged for services like could make it an attractive option for smaller companies and for on-the-go professionals.

A single license runs $200, and allows you to connect to one computer (the host) from another. (Both PCs must have the software installed.) Symantec offers volume pricing and other licensing options for large installations, and thin clients that allow for remote pc technical services-control connections without full administration options are available for Linux and Mac computers.

Once pcAnywhere is installed and set up, you can fire it up to connect to another computer. If that host is on the same network, it will be located in a 'Quick Connect' list.

If the host is not in the same network, you'll need to know its network name or IP address. In addition to a full remote pc technical services-control session, where you can see and control a host's desktop as if you were at the PC, you can choose to transfer files or perform remote-management tasks such as file or Registry edits without starting a full remote-control session. Many of the available features, such as setting up remote-command queues, are particularly useful for help-desk or IT users.

When you connect to a host, you see a prompt for a user name and password, both of which you choose when you first set up the host. You can select an existing Windows log-in, but you can't have a blank password. Also, though you can configure a host to set up an encrypted session every time or to switch to encryption during remote control, encryption isn't enabled by default.

pcAnywhere could prove effective for people who want to remotely manage many PCs in the same network, and it's a definite option for large networks with their own IT staff. But it's probably not the best package for connecting to one or two PCs at home or at work across the Internet, as it requires you to open a connection through your home or company firewall directly to the host. Business networks with many pcAnywhere hosts can set up a gateway server (at additional cost) that can act as an intermediary.

GoToMyPC

While pcAnywhere is best for connecting to multiple PCs in the same network, the Citrix service lets you easily connect to a host PC from just about anywhere. But you'll pay for the freedom, as GoToMyPC carries a monthly fee of $20 for one PC or $30 for two, with discounts for annual plans and additional PCs.

After performing a quick software install on a host PC, you can access that computer's desktop from most any other machine with a browser and an Internet connection. Though the software to set up a host requires that the host have at least Windows 2000 or a newer version of Windows, you can connect to that host from a Mac or Linux system, or even some Windows Mobile devices. Also, the host software makes its own connection to Citrix servers, so you don't need to open any firewalls or make any other adjustments. Just point your Java-enabled browser, on whatever PC or device you're using, to log in to your account at gotomypc.com.


Once there you'll see a list of your connected PCs. Choose one and enter its password (each PC gets its own), and a small Java client downloads through the browser and provides full remote control of the host. If you're using a PC that limits which programs you can run, such as a work computer with a strict security policy, you can use a universal viewer that runs completely within the browser. Mac and Linux computers also use the universal viewer.

You may notice a slight delay when you move windows around, but you won't have any trouble working with remote documents or using a Web browser on the host PC. Sound from the remote PC comes through fine, too. But full-screen video or other graphics-intensive tasks will be choppy at best.

To copy files to and from the host, you can drag and drop or use a separate file transfer and synchronization tool. And a simple slider allows for easily adjusting the display to favor either connection speed or appearance.

GoToMyPC uses encryption for all connections, and it allows you to print out a list of one-time passwords for each host. If you want to give other people access to your host PC, you can send a temporary e-mail invitation to share your desktop with a guest. The invitation automatically expires in your choice of 1 to 3 hours, or you can cancel it manually.

Though GoToMyPC isn't cheap, you can give it a whirl with a free 30-day trial for one PC. For businesses that want to provide the service for up to 50 employees, a Pro version offers central administration and billing. A Corporate version allows for more than 50 users.

LogMeIn Pro

LogMeIn Pro's remote-desktop service directly competes with GoToMyPC, and the two offerings are similar in most respects. But a fair bit less, with a monthly fee for one PC of $13. Each additional computer (up to ten) runs an additional $10, with discounts for each PC beyond ten. The service also provides a free trial for 30 days (or for 120 minutes of usage, whichever comes first). A no-cost, feature-limited version of the service, called LogMeIn Free, lacks options such as sound and remote printing.

You can install LogMeIn Pro on a PC running Windows Vista, XP, or 2000, or Windows Server 2003, 98, or Me. Macs with Tiger or Leopard can run LogMeIn Free, but not the Pro version. You can take remote control of a configured PC or Mac from almost any Windows, Mac, or Linux PC, or Pocket PC device.

Similar to the process with GoToMyPC, you start by logging in at logmein.com and choosing from a list of connected computers. But whereas GoToMyPC then launches a Java client outside the browser, LogMeIn runs within the browser, so first you'll need to install an ActiveX control for Internet Explorer or a plug-in for Firefox. You can skip the plug-in and use a less attractive Java interface instead, if you wish (either option allows a full-screen view).

Source : http://www.pcworld.com/businesscenter/article/146588/stay_connected_with_remoteaccess_software.html