Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Windows XP users must migrate to Vista before they can install Windows 7. The User State Migration Tool helps simplify this process – but the utility has some limitations.
Inactive or dormant Active Directory accounts can serve as a gateway for attackers. Learn how to identify and clean up inactive Active Directory accounts in this Identity Management and Access Control Ask the Expert Q&A.
Customer service automation brings speed and improved quality to the effort of serving consumers. If poorly managed, it can also do the opposite.
Vendors often publish numbers for 'usable' capacity versus 'effective' capacity. Can you explain this and how can you plan flash capacity needs with these numbers in mind?
A new rule extends HIPAA compliance requirements to covered entities' business associates, forcing them to reexamine data security and privacy.
Every point of network interaction is a part of the network attack surface. Hackers, industrial spies and malware such as worms and advanced persistent threats (APTs) target these points for potential entry to a network they wish to disrupt or capture data from.