Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Jon Toigo discusses why, despite their benefits, high-availability features are not a full replacement for a good disaster recovery plan.
Channel partners in the financial services sector find opportunities in regulatory compliance, cybersecurity, managed services and cloud computing.
SCVMM offers a wide variety of configuration options but some settings can be overlooked or are unknown because they don't appear directly in the management console.
Mobile phones do not interfere with medical equipment in hospitals, according to research conducted by a US hospital group.
AWS has improved its security features and offers a slew of resources for hardening its cloud. But admins still play a part in preventing breaches.
Why don't users seem to appreciate typical software QA testing status reports?
Dell DL AppAssure integrated backup and recovery appliances have been refreshed with two new systems that target entry-level customers.
News roundup: New research highlights the changing nature of DDoS attack frequency and methodology. Plus: New malware strains double in second half of 2014; two new address bar spoofing vulnerabilities.
At the ICMI Contact Center Expo, users were interested in how to make their centers more efficient while serving customers in whatever channel they choose.