Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
House of Commons select committee on Science and Technology publishes its report into the promise and pitfalls of big data, advocating a data ethics council and more urgency on data privacy
Most US IT professionals are confident in key security controls to detect cyber attacks – but unsure how long it would take automated tools to discover a breach
As half the homes in the Ivano-Frankivsk region plunge into darkness, Trend Micro finds evidence of cyber attack on a mining and a railway company
With hardware and software sales increasingly commoditized, the motivation for building a managed service provider business has never been greater, but getting from Point A to Point B isn't so easy. We explain what the risks are and how to make a successful transition to an MSP business model.
Marks & Spencer and WHSmith have the most user-friendly websites among high street retailers, according to the latest annual study by web consultancy Webcredible.
A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal.
In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage.