Active Directory, AS/400, Business Intelligence, Career Development, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
The 2012 Gartner ADC Magic Quadrant indicates a mature market with room for innovation around deployment options, software-defined networking and cloud optimization.
SearchEnterpriseWAN.com spoke with IT networking industry veteran and analyst Jim Metzler about the pros and cons of virtual application delivery controllers and WAN optimization controllers and where virtualization is headed in the enterprise wide area network. Read this Q&A to learn the...
A virtual application delivery controller offers cost savings and higher agility. However, testing the solution in your production environment is key to ensure a proper fit.
Human resources application services provider Workscape uses application delivery controllers for routing of its Internet-facing applications as well as for SSL acceleration and load balancing.
Collaborative communities are now a cornerstone of social business, for product development, customer service and more. But corralling them isn't as easy as it sounds, says an expert.
Data center infrastructure efficiency (DCIE) is a metric used to determine the energy efficiency of a data center. The metric, which is expressed as a percentage, is calculated by dividing IT equipment power by total facility power. (Continued...)
Companies are increasingly using enterprise collaboration tools to brainstorm ideas in a secure, recordable fashion, internally and beyond the perimeter of a company's four walls.
To keep your network data secure, read this introduction to firewalls. You'll understand what they are, how they work, which types exist, which ones to buy and how to audit network traffic through this guide.
A tty command in Linux and other Unix-like operating systems is a shell command that can be entered interactively or as part of a script to determine whether the output for the script is a terminal (that is, to an interactive user) or to some other destination such as another program or a printer.