Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
With demand growing for more effective monitoring of security-related information, the federal government is calling for tougher IT security testing for compliance initiatives.
What does a next-gen cellular network look like? Meet Scratch Wireless, a Massachusetts startup looking to disrupt the mobile space by providing 'Wi-Fi First' smartphones that rely primarily on hotspots.
Health care providers who have played fast and loose with HIPAA compliance are in for a rude awakening, as a feistier DHHS seeks to enforce stronger HIPAA provisions and penalties.
With critical infrastructure a priority for the Obama administration, the security of SCADA systems against cyberattacks is getting long overdue attention. What you need to know.
To prevent software defects, test the code. But before you do, question every assumption behind the software. No question is too trivial to raise.
The Internet of Things needs a secure, scalable network to succeed. Wi-Fi offers what IT requires for strong enterprise IoT networking.
Delivery of mobile applications has become paramount in today's market. Learn how one company found the perfect mobile development platform.
Compliance professionals and vendors are turning to the Unified Compliance Framework as a common language for overlapping compliance standards.
A peek at Booz Allen's innovation practice, what Etsy looks for in a data analyst and mathematical proof that vampires don't exist: The Data Mill reports.
The Google Aurora cyberattacks should be a wake-up call for enterprise security officers to go beyond regulatory compliance standards.