Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
IBM joins forces with Microsoft to support the other’s cloud platforms with their respective enterprise apps. Whether the software gains can cover IBM’s hardware losses remains to be seen.
The new AWS Directory Service has user directory management that spans hybrid clouds, but invites comparison to Azure’s Active Directory.
A shadow app is a software program that is not supported by an employee's information technology (IT) department.
Citrix VDI-in-a-Box is all-in-one desktop virtualization software built for small and medium-sized businesses.
A risk, in a business context, is anything that threatens an organization's ability to generate profits at its target levels. Business risks are broadly categorized as pure risks, which are negative events over which the organization has no control, and speculative risks, which are potential...
An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or external, or whether or not they are controllable...
The Cyber Security Industry Alliance is shifting from educating businesses to targeting members of Congress in its push for tougher data security and data breach notification laws.
Security training and education is one of the first investments made by an organizations after poor audit results or a data breach, experts say.
SN blogs: This week analysts highlight the next generation of cyber security, which includes identity management tools as well as strengthening people skills.