Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Data centers in shipping containers caught on as Microsoft deployed a data center in the equivalent of a parking garage. But should you be considering this option in your future data center design? Learn what two experts think about data center containers, and how and where they are a good fit to...
In order to stop metadata snooping by law enforcement and hackers, a proposed spec aims to improve DNS privacy with TLS.
The Internet of Things is coming; is your security program in place? If not, it's time to start the planning process.
With the expansion of the IoT market, protecting the company's data and IP is more important than ever. Here are four ways organisations can put security at the core of the IoT value proposition
There are five key information security risks associated with the internet of things that businesses can and should address
Microsoft’s Azure cloud platform has gone well beyond mere virtual machines and orchestrated workflows. It can now also power internet of things applications
News roundup: As Internet of Things concerns become an enterprise reality, one vendor is quick to offer IoT services to combat the risks. Plus: 1% of users create 75% of the risk; Target pays up; Apple devices improperly secured in the enterprise.
A plethora of new security tools aimed at DevOps shops suggests IT pros are getting their sea legs with DevOps and security in 2016.