Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, Database, DataCenter, DB2, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Security awareness training initiatives such as online tutorials, newsletters, MP3s and prizes get the security message across to users.
HP offers no assurances that it will keep its PC division or continue to provide service to customers. Despite this uncertainty, the company launched its new zero client.
A mobile workforce that uses the cloud needs their company to think about end-user segmentation to determine the best devices for their needs.
News roundup: Heartbleed vulnerabilities, point-of-sale malware and phishing scams are nothing new, yet numerous companies continue to fall victim to them. Shouldn't the lesson be learned by now? Plus: HTTP Shaming, Dropbox improvements and more.
A successful DAM system is more than just a place to offload rich media. John DeMarco of 3M discusses how to make digital asset management a valuable part of a company's strategy.
SharePoint has become ubiquitous in the enterprise, but organizations can overlook security. Learn SharePoint security best practices in this article.
If your organization is serious about managing risk and total asset protection, then physical-logical convergence is a necessary step.
Endpoint security and control for devices like thumb drives, SIM cards and mobile devices can no longer be ignored.
Unified threat management devices consolidate several network security functions into one product. This article evalutes six UTM appliances; each had to act as a firewall and virtual private network and provide antivirus, Web content filtering, intrusion prevention and antispam protection.
Our enterprise desktop expert answers a question about some third-party tools for eliminating duplicate files in Windows desktops.