Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
The U.S. government wants to solve the weaknesses in online ID proofing systems, but it needs the help of enterprise and security professionals in order to overcome privacy concerns and other issues.
As enterprise moves forward to provide employees with the apps they need for maximum productivity, everything is on the table for reinvention. A mix of standardized and customized solutions will be required by big business to meet the needs of an internal workforce that is ready to truly mobilize.
Enterprise developers face number of challenges in creating frameworks for building scalable real-time applications that power modern apps like the cars moving in Uber. Read on to find out how new protocols and automatically synchronized database frameworks can help to simplify these kinds of...
Containerization, especially using new and exciting platforms like Docker, is a massive trend in the industry. Find out how to leverage this trend to run applications, host operating systems and gain even more benefits from running in a fully virtualized environment.
Threat experts at RSA Conference 2015 say today's most dangerous attack techniques reflect a shift toward long-duration attacks that are often nearly impossible to detect.
Predictive analytics technology is entering the public realm. But what happens when machine learning is accessible to everyone? Join #CIOChat on April 29 at 3 p.m. EST to discuss machine learning services and their effect on the enterprise.
Sometimes great frameworks like JSF, Wicket or Spring MVC make simple tasks surprisingly difficult to do. With JavaServer Faces, the simple task of invoking a method on a managed bean is actually a bit of a chore. In this tutorial, we tackle that chore together.
Security is often considered as an afterthought in the software development lifecycle. But organizations need to keep up with vulnerabilities as they move to more agile DevOps practices. Read on for some best practices in building a security conscious culture.