Discussions

  • Finding unused databases in Lotus Notes and Domino

    Organizations often have hundreds of Notes/Domino databases across many servers, only a few of which have significant usage. Learn how to find and remove unused databases to reduce the disk space and complexity of your Notes/Domino environment.

    searchdomino4,660 pointsBadges:
  • Microsoft Click-To-Run

    Microsoft Click-to-Run is a methodology used to download and maintain current Microsoft products including versions of Office 2010 and Office 2013.

    Margaret Rouse2,685 pointsBadges:
  • long-tail intrusion

    Long-tail intrusions include advanced persistent threats (APT). However, sometimes intrusions achieved by simpler methods and malware may be used as the starting point of a long-tail intrusion and continued by downloading new code by means such as Trojans hidden by root kits and code targeting zero...

    Margaret Rouse2,685 pointsBadges:
  • voluntary severance package

    A voluntary severance package is a financial and benefits-based incentive offered to motivate employees to leave a company of their own accord. The employee has the option of accepting the package or continuing to work, although at the risk that their position may be terminated in the...

    Margaret Rouse2,685 pointsBadges:
  • Cyber Monday

    Cyber Monday is a marketing event created to promote online sales. The day falls on the Monday after Black Friday, which directly follows American Thanksgiving Day.

    Margaret Rouse2,685 pointsBadges:
  • bioprinting

    Although bioprinting is still in the experimental stage and is currently used primarily in scientific study rather than applied science, the possibility of creating functional replacement tissues or organs could one day transform medical treatment.

    Margaret Rouse2,685 pointsBadges:
  • breach detection system (BDS)

    Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred. Enterprise IT uses BDS to protect against the variety of advanced threats, especially unidentified malware.

    Margaret Rouse2,685 pointsBadges:
  • attack surface

    An attack surface is the total sum of the vulnerabilities in a given computing device or network that are accessible to a hacker. Anyone trying to break into a system generally starts by scanning the target’s attack surface for possible attack vectors, whether for an active attack or passive...

    Margaret Rouse2,685 pointsBadges:
  • Choosing a next-generation firewall: Vendor comparison

    Next-generation firewalls are becoming a must. Read our comparison of application-aware firewall options available from the leading firewall vendors.

  • How did you get started in the IT networking field, especially that first job when you had no professional experience?

    Ed Tittel4,875 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following