Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
As multi-tenant and hosted UC models emerge, enterprises must read between the lines to select the right service delivery model for UCaaS.
In an ever more dangerous world, your trusty VPN has a more important role than ever.
In building a SharePoint 2013 search-based application, you can create powerful search functionality that incorporates internal and external data.
Microsoft is staking its future in the cloud. But if you are weighing SharePoint Online vs. on-premises, here's how the two differ.
Testers often complain that software requirements specifications are too vague, but verbose requirements can have the negative impact of being so wordy that they can't be followed.
Locking down unnecessary services is an excellent way to prevent security holes in Windows client workstations. So says Jonathan Hassell in his review of 88 different Windows XP services. He also gives the thumbs up or down on which should be enabled.
Testing applications for security purposes is such a basic, important safety measure that most security professionals wouldn't think twice about it. Explore your options for pen testing, vulnerability analysis, fuzzing and more in this application security testing learning guide.