Active Directory, AS/400, Business Intelligence, Career Development, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Systems Management, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Brien Posey compares backup using a single, enterprise-grade backup software product vs. choosing a variety of best-in-breed products to address different data protection needs.
Software quality metrics can either tell us what needs work or disguise the real root causes. If you want to play the testing metrics game, you have to play by the rules.
In this video, get a free introduction to Domain 2 of the CISSP exam's "Common Body of Knowledge" covering access control topics like administration, practices, models and more.
Discover the importance of data mining machine learning and find out about fielded applications of data mining and machine learning in this tutorial from the book Data Mining: Know it All.
Cloud security expert Ed Moyle discusses the pros and cons of an open source cloud, as well as running an open source cloud security infrastructure.
Personalization technologies can help enterprises cultivate customer loyalty.
If you're planning on getting your CISSP certification, make sure to test your knowledge of Domain 2: Access Control.
Redundant cloud storage gateways and redundant WAN links help companies avoid protection gaps that could result in outages or data loss.
Jon Toigo says IT resilience and elasticity do not eliminate the need for disaster recovery.