Active Directory, AS/400, Business Intelligence, Career Development, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Systems Management, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
In social business, everyone’s an expert these days -- even the frauds. But what are some of the social media rules that could make the difference between success and failure?
Collaborative communities are now a cornerstone of social business, for product development, customer service and more. But corralling them isn't as easy as it sounds, says an expert.
At the Ritz-Carlton, there's no need to bring all social media channel audiences together into a common community, says Allison Sitch, vice president of public relations at the hotel company.
There are at least two key points in a software project when requirements should be defined. One point people often miss is during feasibility analysis, and failure to define requirements at this stage can doom a project.
Learn the most effective way of defining requirements for users' end experience.
Mark Hinkle cautions against IT professionals becoming single-vendor dependent and touts the position of open source technologies in the operating system and flashy gadgets realms
Rising interest in virtualization could mean the decline of traditional software pricing plans. Meanwhile, virtualization leaders VMware and Microsoft are facing tough new competition from open source alternatives.
Hacker attacks against SIP-based VoIP may have been rare so far, but as VoIP use grows, service providers need to be ready to secure their voice networks as they route traffic without using the public switched telephone network.
Roundup: Get the latest news on social networking security and stay up to date on the tactics, methods and techniques that cybercriminals are using to break into Twitter, Facebook, and other social network accounts to steal data.