Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
How can digital companies protect their IP against a tidal wave of smart-phone boosted piracy? Is digital rights management software effective enough, or is it better to adapt your business model?
Reverse engineering can reveal all of the source code in your .NET applications. Expert Dan Cornell recommends code obfuscation as a protective measure.
As a NoSQL database management system, Riak NoSQL is designed to enable storage of and access to various types of unstructured data.
Reverse engineering mobile apps help pen testers find weaknesses and hidden malware, but the various mobile platforms and different versions make automation difficult, according to one expert.
Gartner’s Bill Gassman says organizations should tap pattern recognition to make the most of growing data volumes.
Cloud-integrated storage is a good way to move data to the cloud, but users should be aware of these four caveats before implementing the technology.
European datacentre operators must take a proactive approach to preventing cyber attacks as hackers increasingly target their facilities
Access pattern recognition in the cloud is becoming an enterprise risk. Expert Michael Cobb explains how the Melbourne Shuffle can improve access pattern security.