Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
The Open Banking Working Group has suggested information about products and customer transaction data should be open to improve service comparison and drive competition
Project planning is a discipline for stating how to complete a project within a certain timeframe, usually with defined stages, and with designated resources.
Underwater datacentres can help providers save on land costs and cooling, but at what cost to the environment?
how to migrate vitual machine from xen server to physical machine
With reduced hardware costs and more flexible lanes in the physical architecture, 25 Gigabit Ethernet may offer answers in oversubscribed data centers.
Weak consumer demand and high inventories blamed for falling PC sales in Asean, which mirror Asia-Pacific trend
Chiltern Railways, part of the Arriva network, tests out an enhanced trackside Wi-Fi network to improve connectivity for passengers on its trains
The BCS believes criminalising reckless disclosure would reassure the public in how data is managed under planned surveillance laws
In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text.
Angie's List automated and improved the process of reference checking with SkillSurvey, and used the software to obtain anonymous evaluations of people seeking work.