Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Vendors often publish numbers for 'usable' capacity versus 'effective' capacity. Can you explain this and how can you plan flash capacity needs with these numbers in mind?
Big data analytics is the process of examining large amounts of different data types, or big data, in an effort to uncover hidden patterns, unknown correlations and other useful information.
In this news recap, executives assess analytic success and marketers realign their technology spending priorities.
Microsoft celebrates 30 years of the Windows operating system when it ships Windows 10 this fall. Here's a look at Windows history -- bumps and all.
Video: Sophos' Chester Wisniewski explains why targeted malware and the presence of Windows XP are the biggest threats to point-of-sale security.
Randy Trzeciak reviews recent data breach incidents and details the insider threat prevention controls that may have thwarted those attacks.
Video: Cryptography Research Inc. president Paul Kocher details how the ongoing NSA encryption-cracking scandal affects trusted crypto algorithms.
Tenable CSO Marcus Ranum says he's surprised at how little information the NSA seems to have about which documents were stolen by Edward Snowden.
New Cisco CTO Martin Roesch says the Cisco product roadmap for network security will include a robust NGFW using Sourcefire technology.