Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
IT observers caution organizations against data for data’s sake, urging instead a focus on the best technology for the business problem at hand.
Two surveys found that many companies are moving to become more data-driven and that "big data" initiatives are among the items on their to-do lists.
Learn how testers and QA engineers have started to get more involved in software design.
Legal teams play a key supporting role in successful information security programs. Expert Mike Chapple reviews three areas where infosec pros and lawyers should work together, and offers tips to foster effective collaboration.
You’ve invested heavily in video conferencing. Was it worth it? New analytics tools try to answer that question by reporting on video conferencing usage.
Jon Toigo explores the renewed interest in software-defined and hyper-converged storage, and an important partnership between Huawei and DataCore Software.
A chief information security officer is becoming a necessity to organizations. Expert Mike O. Villegas explains why and how to communicate this need to other executives.
Why cybersecurity hiring is the real cyberwar.
Move beyond prevention to fast detection to combat a stealthy social engineering attack.