Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Use this FAQ to learn about Windows 7 hardware requirements and notebook compatibility factors, and find out when you should recommend 32-bit vs. 64-bit architecture.
ICT (information and communications technology - or technologies) is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and...
Change management is a systematic approach to dealing with change, both from the perspective of an organization and on the individual level. A somewhat ambiguous term, change management has at least three different aspects, including: adapting to change, controlling change, and effecting change. A...
SN blogs: Analysts this week discussed why big data analytics needs to be reassessed and why Lenovo's response to Superfish spawned consumer distaste -- and distrust.
How can we make sure our VoIP phone system can grow with our company? Telephony expert Jon Arnold explains how the flexibility of VoIP allows it to keep pace with growth.
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user... (Continued)