Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
A cascading style sheet (CSS) is a Web page derived from multiple sources with a defined order of precedence where the definitions of any style element conflict.
Chat abbreviations are commonly used in e-mail, online chatting, online discussion forum postings, instant messaging, and in text messaging (SMS). This comprehensive list will help you navigate the jargon, slang and unfamiliar acronyms.
Sharing files is a very common practice, but you may be doing it in a non-secure way. This tip will explain how to safely share an Excel 2007 workbook and how to keep it safe, too.
Solutions architecture has gained a reputation for being difficult to define. Even so, best practices unique to solutions architecture have emerged.
Security is often considered as an afterthought in the software development lifecycle. But organizations need to keep up with vulnerabilities as they move to more agile DevOps practices. Read on for some best practices in building a security conscious culture.
In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate.
There are a number of strategies enterprises are taking to keep security on pace with faster development cycles. These include earlier code reviews, leveraging PaaS with built in security, and using cloud services for static and dynamic security analysis.
Eliciting performance requirements from business end users necessitates a clearly defined scope and the right set of questions. Expert Mary Gorman explains how to effectively gather information.
Organizations are starting to consider cloud IDEs as a practical alternative to traditional desktop IDEs and associated tool chains. Read on for some of the best practices for getting the most from this transition.