Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Former CIA and NSA director General Michael Hayden came out in favor of strong encryption but representatives in Congress and the Senate are continuing to pursue encryption backdoor legislation.
The uncanny valley is a common unsettling feeling people experience where androids (humanoid robots) and audio/visual simulations closely resemble humans in many respects but are not quite realistic.
A hacker took advantage of insufficient authentication protocols within the DoJ to perform a social engineering attack resulting in leaked info on 20,000 FBI agents.
EDI services have managed to become an integral part of many organizations' B2B processes, but APIs may be a smart alternative -- even if many businesses don't know it yet.
Milton Keynes smart city project selects ThingWorx to provide a rapid application deployment environment
In the week it revealed in its latest results that hardware sales were poor and then sold off its x86 server business to Lenovo, Billy MacInnes takes a look at IBM's hardware strategy