Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Security expert Michael Cobb offers pointers on how to assign risk values during a security risk assessment.
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands.
Many app-refactoring tools have catches: They either don't work on Web apps or they need source code access. But with a new product from startup PowWow, you can deliver Windows and Web applications to devices without access to the source code.
During the 17th annual Cisco Partner Summit 2013, company executives put the spotlight on three key topics for partners: Opportunities in the midmarket The importance in the cloud The imperative to begin transitioning to a "hybrid IT" business model today In reference to point #3, what do you think...
More and more IT departments are deploying, managing and even creating mobile applications. Using the right strategy, mobile apps can be a boon to employee productivity.
In this Ask the Expert, IDC analyst Vernon Turner advises CIOs on the near-term impact of the IoT on data centers and the upgrades they'll need to handle the flood of IoT data.
A cloud application (or cloud app) is an application program that functions in the cloud, with some characteristics of a pure desktop app and some characteristics of a pure Web app.
Attackers used spear phishing emails to swipe credentials from several ICANN staff members and accessed the non-profit organization's systems.
In this excerpt of The Basics of Information Security, author Jason Andress outlines methods for improving operating systems security.
Two new resources released over the past month reinforce the notion that companies are becoming more focused on getting real business value from their analytics initiatives.