Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
For AWS shops, news of another reboot in the EC2 fleet shows the cloud provider is staying on top of its security responsibilities.
Developers put security second in the software development process. SecOps rolls the continuous threat testing and monitoring makes it a priority.
Despite a few weaknesses, Crystal Reports for Enterprise gives SAP BI users a few more tools over standard Crystal Reports -- including more speed -- writes Jamie Oswald.
Encryption can to help secure data and meet HIPPA requirements, but the technology blocks sight of network activity by blinding IDSes and IPSes. Learn how to have an effective encryption and IDS/IPSe solution simultaneously.
Haven’t shopped for an IDS/IPS in a while? Karen Scarfone details important recent innovations to IDS/IPS technologies.
A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
In this installment of the Risk Management Guide, Shon Harris provides step-by-step instructions on conducting a risk analysis.
Your cloud network strategy will depend heavily on the type of cloud architecture you're using and for what purpose.