Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Robert Lemos looks at next-generation security information and event management (SIEM) analytic tools and cloud-based systems.
New Aruba controllers for the branch office provide WLAN management, WAN intelligence and a firewall in one appliance.
Combining data from a variety of sources with better analytics can reduce workloads.
CIO Deepak Agarwal cut costs by nearly half in a major ITconsolidation a few years ago. Here, he talks about recent efforts to update outmoded legacy apps.
Banks are rushing to fix sloppy authentication processes at the heart of rising Apple Pay fraud. Experts also worry about potential fraud with other mobile payment systems.
Should your legacy IT systems stay or go? CIOs tasked with this decision might find eliminating past-their-prime systems to be the kindest cut of all.
Desktop patch management is subject to its share of myths. Our expert penetrates the fog around waiting on software patching and Windows XP security.
A firewall should be the first line of defense to protect your IBM i system, but not the only security measure you take. Rich Loeber counsels you to not ignore the enemy within. Build strong object level controls and restrict *ALLJOB access.