Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Tom Nolle explains why microservice architecture should not be considered ready-made for the cloud and how developers should approach a combination of the two.
A partner programme that makes it easier to get rebates and become a top tier partner has been rolled out globally by Symantec
In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works.
The cyber threat to nuclear facilities is indicative of the threat to much of all critical infrastructure, says cyber security expert Alan Woodward
Can my company implement the COBIT framework for compliance? What does it entail?
In this excerpt of Hacking and Penetration Testing with Low Power Devices, author Philip Polstra describes "The Deck" -- a custom Linux distribution -- that breaks the traditional penetration model by providing pen testers an OS that runs on low-power ARM-based systems.
AMD has recently unveiled its latest processor and is hoping the channel can help drive up its footprint in the enterprise