Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Change management is a systematic approach to dealing with change, both from the perspective of an organization and on the individual level. A somewhat ambiguous term, change management has at least three different aspects, including: adapting to change, controlling change, and effecting change. A...
SN blogs: Analysts this week discussed why big data analytics needs to be reassessed and why Lenovo's response to Superfish spawned consumer distaste -- and distrust.
How can we make sure our VoIP phone system can grow with our company? Telephony expert Jon Arnold explains how the flexibility of VoIP allows it to keep pace with growth.
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user... (Continued)
An identity management access (IAM) system is a framework for business processes that facilitates the management of electronic identities.
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code.