• Free Chapter – The Gathering Storm: Get your head into the clouds

    Another free chapter download is available on the IT Bookworm Blog. Written by: Peter Fingar Book: Dot Cloud: The 21st Century Business Platform Overview: “In Dot.Cloud: The 21st Century Business Platform, business strategy expert and former CIO Peter Fingar explains the main ideas of Cloud...

    BrentSheets6,925 pointsBadges:
  • System i Managed Hosting Services

    Our clients are looking for a hosting company with System i Experience. Their service needs include High Availability, HR, Digital Storage and Remote Backup. Also seeing a growing interest in Hosted Sharepoint Services. Can you suggest a Midwest based company with significant System i experience...

    Jdr315 pointsBadges:
  • SAS70 audit for Data Center

    The electrical network that feeds the access points, CCTV cameras, intruder detectors, etc. must need to be independent from the electrical system that feeds the computing equipment? Is it right to ask if the logs of access point are backed up and kept in a secure place? what about the videos that...

    Beatrix Kiddo60 pointsBadges:
  • Price versus Value in today’s IT

    Hey folks. I wanted to point out a meaty blog post written by member Derek Kuhr, who writes the Getting past the Geek Speak blog, here on ITKE. Derek started his blog to discuss what it takes to be a great IT pro and this post demonstrates that well. In these economic times, value is important...

    BrentSheets6,925 pointsBadges:
  • Information Systems Security or Computer and Information Science Degree?

    I am roughly one year from graduating with my B.S. in Information Systems Security. So far, I've completed my general education requirements, and am now beginning my core and major classes. Lately, I've found myself second-guessing my decision of ISS: is an ISS degree such a good idea? Or should I...

    Treewhiskey30 pointsBadges:
  • Best practices for approaching an IT Project

    what is the approach of any project?, should it be in details?,what is the approach of Data entry project in telecom company?

    Weli15 pointsBadges:
  • IT User Access Forms

    Who Should sign off on User Access Forms for IT Systems

    01265 pointsBadges:
  • ASP.NET IKM Test

    Does any body have sample question of ASP.NET by IKM ?

    N2009A5 pointsBadges:
  • Cloud Computing set to change roles in IT

    In addition to providing free sample chapters from the latest enterprise IT and development books - the IT Bookworm Blog invites authors of IT books to submit guest posts. I’m pleased to present our first guest post from Peter Fingar, author of Dot Cloud: The 21st Century Business Platform. Enjoy...

    BrentSheets6,925 pointsBadges:
  • How best to control Junior Admins

    Hi all, Need to give new member of team Admin rights, but I'd like to know how you all manage your junior admins? I'd like to give restricted rights and have an audit trail. Environments in Use; - Window server 2003 and Active Directory - Vmware ESX + vcentre - Lotus Domino + Notes I guess most of...

    Pandub130 pointsBadges:
  • Microsoft Alerts Solution Needed

    we are looking for a Microsoft solution for end user alerts, an internal messaging and notification system that allows a central administrator to send out desktop alerts that can't be ignored alerts for meetings, contract ending, we can't centralize this using public calendars cz there isn't an...

    Maryam82100 pointsBadges:
  • Offline Folders or Files Security

    When an administrator login to the user's laptop for administration, does he has access/view to the users offline files? if Yes, then how these files can be secured from viewing/accessing by an administrator? If he doesn't have an access to those offline files, then why he/she can't access to those...

    Maheshmmk835 pointsBadges:
  • Project management advice: executing an implementation schedule

    I am planning to implement a campus wireless network in my organization. The work has been awarded to a contractor. How do I go about the implementation schedule? Can I prepare any chart to keep track of the implementation schedule?

    NetworkingATE1,545 pointsBadges:
  • Unlocking Screensaver password

    1st of all this is a win2k AD Domain w/all XP Clients and the extended GPManager Grouppolicy. Okay, so B/C of HIPAA I have to have my computers screensaver/password protected. Even though I'm forever telling'em to sign off when they leave computers my staff still doesn't do it. Thusly the computer...

    ELPUEBLO0 pointsBadges:
  • WSUS Server multiple instances of computers listed.

    I am very new to the Windows update server (WSUS). I installed and configured the update server and everything seems to be working. I added some settings in my group policy and applied the GP to an OU and went on my way. The clients started to appear in the list of workstations on the WSUS server;...

    Skepticals0 pointsBadges:
  • AS/400 – Object BCHLOG not found error

    Hi All, This is related to MAPICS - Iseries env. I am tryin to debug the job in match mode in a TEST environment. As soon as i release the job , the following message comes "Object BCHLOG not found in *LIBL" and the service job ends in error. When i debug the same job in the LIVE enviroment, I am...

    Vijesh Bhat70 pointsBadges:
  • Linux or Windows for Business? (especially for SMEs)

    Hi, I wanted to know which OS is more suitable for business especially for SMEs? Is it Linux, Windows or both??? Which is superior based on their: Funcitonality Usability Security Relaibility Scalability Efficiency Robustness Portablity Could you provide some links which will detail the above...

    Coolestgolfer5 pointsBadges:
  • “from – to” dates of manufacture for IBM T40 and T42

    Can you tell me the "from - to" dates of manufacture for the ibm t40 and t42?

    Rickg3775 pointsBadges:
  • Necessity of clocking in and out at one specific location

    We are in the process of installing Kronos at our company. We have some employees who work over large areas and we have many Kronos stations for them to clock into. Will it be possible for these employees to clock in at different locations according to their job assignment for that day and are...

    Radioman5 pointsBadges:
  • Audit policy change Eventid 644

    Hi i noticed the username doing the change is always the computer account even if it is changed by a user account. How could we se which user account did it?

    Ditchdog5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following