Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
David Linthicum reviews the benefits of database choices from Amazon Web Services and the advantages of leveraging object storage like Simple Storage Service as a storage category.
Hybrid cloud storage startup Cirtas Systems pulled its product off the market last month, leaving users to seek a way to back out compressed, encrypted data from their cloud SANs.
Analyst Arun Taneja explains why the first step in moving data to the cloud is to determine how easy it will be to extract it.
According to WatchGuard, seven out of 10 restaurants, hotels and other businesses don't take the necessary steps to secure their guest Wi-Fi networks.
Expert Ed Tittel explains why all organizations, no matter their size, need to protect endpoints with antimalware products.
The top 10 UC news highlights of the year point to trends in cloud-based UC, collaboration tools, WebRTC and mobile applications that enterprises can't ignore.
If you're going to use block storage for cloud-based applications, there are some factors to consider. Andrew Reichman covers six in this expert answer.
A reported 43% of Microsoft XML users are running vulnerable versions of the software. Security expert Michael Cobb discusses how to mitigate the risks.