Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Time value of money is the concept that money acquired sooner or held onto longer has a greater worth or potential worth due to the possible accumulation of interest or ROI while that money is saved or invested.
Using flywheels for data center uninterruptible power supply backup can offer benefits over traditional power storage, including less restrictive cooling and ventilation requirements, a longer lifespan, less maintenance, and more.
An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.
Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware. By taking advantage of permissive security settings, the poster can make the content show up in the user's newsfeed and potentially the newsfeeds of their friends.
The problem-solving skills that many enterprises need to counter threats are hard to identity, let alone multiply.
Developers have adopted agile methods to keep up with the pace of the market, but how can they ensure code stays in good shape?
The only users who should be allowed full access to any data store should be your system administrators. What about everybody else?
A study, funded by the British Academy, aims to explore with technologists what facilitates or inhibits women working in the technology sector and how gender influences technology innovation. Using a cross-country perspective, comparing the UK and France, Dr Rana Tassabehji, senior lecturer in...