Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Message classifications are some of the handiest tools Exchange Online admins can have in their toolkits.
A virtual machine (VM) is an environment, usually a program or operating system, which does not physically exist but is created within another environment. In this context, a VM is called a guest while the environment it runs within is called a host. Virtual machines are often created to execute an...
The Sality malware has reemerged with new capabilities: brute-forcing passwords on wireless access points. Enterprise threats expert Nick Lewis explains how to.
While there are several ways a vSphere administrator can save time and trouble before disaster visits the data center, there are a few measures to take while correcting an issue to keep a problem from growing into a full-blown catastrophe.
Workflow is a term used to describe the tasks, procedural steps, organizations or people involved, required input and output information, and tools needed for each step in a business process.
While the sharing economy is changing conventional models, downsides can loom, including quality control and effective protection of workers' rights.
DaaS providers tout hosted desktops as more efficient and secure than traditional VDI, but cloud security concerns persist. Companies looking to do DaaS have to trust their provider's staff and back-end security measures without first-hand insight.