Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
WFT Cloud SAP Cost Comparator tool offers information on the uses, tools and research of the cloud and related services, as well as multiple cloud solution calculators, including the Cloud Build Versus Buy Calculator. This SAP Cost Comparator tool provides the total cost of ownership of building...
PerfSpot.com, GroupGain.com and Second Rotation turned to uTest to help test their software and say the on-demand service found bugs they otherwise would have had trouble locating.
Single sign-on (SSO)is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications.
Microsoft celebrates 30 years of the Windows operating system when it ships Windows 10 this fall. Here's a look at Windows history -- bumps and all.
A use case is a methodology used in system analysis to identify, clarify, and organize system requirements; a use case diagram is a graphic depiction of the interactions among the elements of a system.
In addition to letting 900 employees go, some Citrix products will be eliminated as part of a re-organization, with VDI-in-a-Box the first to go.
Security breaches often have privacy implications, but IT must take extra steps to specifically protect mobile users' personal information.
All the major Microsoft productivity apps are available for all the major OSes, but lack of MDM integration and other issues could hinder adoption.