Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Multifactor consumer authentication is a must-have for financial services firms, but there are a number of different types of multifactor authentication technology from which to choose. In this tip, contributor Judith M. Myerson addresses the pros and cons of several types of multifactor consumer...
A multifactor authentication implementation can be a hard sell to enterprise executives and users alike. In this tip, learn four key strategies to ensure that both groups understand and support the project.
Collaboration tools like Dropbox and Google Drive are taking SharePoint's share of the market, but what can Microsoft do to bolster functionality?
Value-added resellers (VARs) and security consultants can use this tip to get advice on how to add security to email communications through encryption.
Over the course of the last year or so, VoIP blog sites have emerged as valuable and trusted resources for VoIP market trends and strategies. Often cited as sources similarly to industry analysts, some VoIP bloggers have managed to harness the power of this social media and are genuinely...
Encouraged by the promise of cost savings and better efficiency, early adopters are wading into Hadoop as a central reservoir for their analytics data.
Businesses and government agencies work to improve sharing of cyberthreat information.
Object recognition is at the convergence points of robotics, machine vision, neural networks and AI. Google and Microsoft are among the companies working in the area -- Google’s driverless car and Microsoft’s Kinect system both use object recognition.
TDWI analyst Fern Halper offers up expert advice for organizations looking to go beyond basic intelligence practices.