Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Government must address the fundamental concerns raised by expert witnesses, MPs and Lords about the draft Investigatory Powers Bill, says TechUK
After several years leading the charge at G-Cloud, Tony Singleton will join the Department for Business, Innovation and Skills (BIS)
IT boss at Bahraini national carrier views mobility as a way to keep costs down and improve customer experience
Telia Eesti selects Adva Optical Networking technology to sit at the core of its national backbone network
A zombie VM is a virtual machine that is created for a particular purpose, such as development or testing, that is forgotten when it is no longer needed for that purpose. As a result, it continues to consume resources while performing no useful work.
Torque is a twisting or turning force that tends to cause rotation around an axis; it can also be thought of as the ability of something that is rotating, such as a gear or a shaft, to overcome turning resistance.
At Computer Weekly’s first CW500 meeting of 2016, CIOs gathered to discuss the role of the CIO, business change, cloud uptake and skills
Important clarity is lacking in a number of areas in the draft UK surveillance bill, says the joint parliamentary committee appointed to examine it
Erstwhile customers are putting large networking deals on hold in an uncertain financial climate, claims Cisco CEO Chuck Robbins
Static and dynamic analysis, whether manual or automated, are designed to find Web application security vulnerabilities. Dan Cornell explains how to uncover bugs through security testing.