Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Storage and the cloud don't always go hand in hand. That's where in-memory computing comes in. Expert Christopher Tozzi explains how to take advantage of these new cloud options.
A series of potent, record-setting DDoS attacks hit several targets last week and apparently used IoT malware to infect and leverage a large number of internet connect devices.
Project and Portfolio Management software from SAP can help companies manage business ideas and lighter projects that don't require tight financial controls. Here's a look.
Cloud service providers are being asked by IT execs to lay bare their security, data integration, compliance and performance capabilities -- and to have an exit strategy.
Software-defined WAN is poised to take the wide area network by storm, simplifying operations and reducing costs. Here's what you should know about the new SDN-based approach.
SDN is valuable, but uses extend to other parts of the network for increased network flexibility, dynamic traffic flow, decreased latency and QoS.
Expert Dan Sullivan examines the Juniper Networks JSA Series Secure Analytics product family, which provides log analysis, threat analysis and compliance reporting for larger enterprises.
The BlackEnergy malware has evolved from DDoS launching to a crimeware tool to an APT. Learn more about its changes and new defense measures for combatting the threat.