Chapter 11Installation, Customization, and Security
“The great successful men of the world have used their imaginations, they think ahead and create their mental picture, and then go to work materializing that picture in all its details, filling in here, adding a little there, altering this a bit and that a bit, but steadily building, steadily building.
— Robert Collier, motivational author
Once you have decided which software you want to use, it has to be installed and, if desired, it has to be customized. You also need to set all applicable security options.
It is impossible for us to include detailed installation and customization instructions for all the tools that we have referenced (or even a fraction of them). Instead, we have included ...
Get Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.