Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
In this weekly podcast, our editors discuss how cloud is making disaster recovery, in the form of DR as a Service (DRaaS), more accessible to SMBs.
Read how to find and edit configuration files in your customers' Linux systems by using the shell commands provided in this chapter excerpt.
In Hacking Exposed Windows, by Joel Scambray, you can learn how to prevent malicious attackers from hacking into your network and damaging or stealing the business critical data you have stored in your Windows machines.
How can you find out hands-on if Vista is as secure as it can possibly be? Hack into it, of course. Security expert Kevin Beaver shows you how.
According to Rackspace, OpenStack is the antidote for cloud lock-in. But is that enough to lure away Amazon and Google customers?
Microsoft has relaxed its branding strategy, as it will allow partners to resell white-label Microsoft Azure cloud services under their own brands.
Find information in your customers' Linux systems by using nsswitch.conf to search for information types, including netgroups or networks, and method searches such as dns or nis.
In this week-in-review podcast, our editors discuss the implications of the latest Amazon cloud outage and the human error that caused it.
Rootkit detection and removal is no easy task. Here are five steps to help you identify and prevent rootkits on your systems.
Strong, customer-focused technology leadership and a friendly touch made Paul Harder a SearchCIO-Midmarket.com 2012 IT Leadership Awards finalist.