Active Directory, AS/400, Business Intelligence, Career Development, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Systems Management, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
In the market for a load balancer or a full-blown application delivery controller? SearchNetworking's How to Buy series shares what you need to know.
Deduplication backup products differ in how they recognize and reduce duplicate data. Because vendors implement deduplication differently, the fear, uncertainty and doubt surrounding deduplication products has increased, with questions about when to deploy what product. Here's what you need to know...
Now that disk is being used as a primary backup target in more enterprise shops, companies need to reevaluate what role, if any, multiplexing should play in their future backup plans. Here are some questions to ask to help you decide if multiplexing still makes sense technically and financially.
Newer and not-so-familiar backup products may offer some functional and operational advantages over the big three backup programs.
Brien Posey compares backup using a single, enterprise-grade backup software product vs. choosing a variety of best-in-breed products to address different data protection needs.
Software quality metrics can either tell us what needs work or disguise the real root causes. If you want to play the testing metrics game, you have to play by the rules.
In this video, get a free introduction to Domain 2 of the CISSP exam's "Common Body of Knowledge" covering access control topics like administration, practices, models and more.