Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
SharePoint Online development is far different from SharePoint on-premises development. It's the elephant in the room, one expert said.
Microsoft is staking its future in the cloud. But if you are weighing SharePoint Online vs. on-premises, here's how the two differ.
Malware using seemingly real digital certificates is becoming more prevalent. Expert Nick Lewis discusses how to detect fraudulent certificates.
Using the fault tolerance feature in vSphere keeps critical workloads running without interruption, but an administrator needs to be sure the hardware and network are fine-tuned for optimal performance.
A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic -- a user can have as much or as little of a service as they want at any given time; and the service is fully managed by the...
There are many questions to consider when moving data management to the cloud, including the cost implications of cloud-based e-discovery services.
While vSphere administrators will want to be sure their storage array supports VMware's vStorage APIs for Array Integration, there are some restrictions to keep in mind when setting up storage acceleration.
Amazon Web Services launched two availability zones in Frankfurt, Germany, offering regulatory refuge and more options for disaster recovery.
Creating a strong password policy in AWS is one step to protect data. If managed properly, multi-factor authentication adds another layer of protection.
Counter-Googling is the use of the search engine to find information about the party that would traditionally be the searcher (such as a potential customer) by a party that would ordinarily be the subject of the search, such as a business. Common applications of counter-Googling include an...