A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store. Continued…
Quote of the Day
“There is no doubt that email can be problematic in businesses, particularly in large enterprises. The sheer volume of email messages, sprawling distribution lists and the unsuitability of using email to transfer and collaborate on documents are real issues.” – Paul Cunningham
Understanding message queues in Exchange 2007 Queue Viewer
Read how Exchange Server 2007 message queue types guide mail flow through a transport pipeline and learn how to monitor the Queue Viewer to prevent issues.
The best email security gateways: A buyer’s guide
Learn how the best email security gateways work, how they protect enterprises from emails threats and how to select and buy them.
Email attacks that threaten networks and flood inboxes
Several types of email attacks plague user inboxes and the enterprise network. It’s up to the email admin to thwart intruder viruses and spam.
Detecting and Combating Malicious Email
In this excerpt of Detecting and Combating Malicious Email, authors Julie JCH Ryan and Cade Kamachi discuss the elements of an email structure and touch on how attackers can use these elements to trick unwitting victims.
New technology competes to become email replacement
Collaboration services such as Slack seek to displace email where others have tried and failed. Is a viable email replacement on the horizon?
OpenConfig is a working group and network communication model that seeks to standardize network management interfaces and APIs across vendors. Continued…
Quote of the Day
“Software-defined networking has matured from a science experiment into deployable, enterprise-ready technology in the last several years, with vendors from Big Switch Networks and Pica8 to Hewlett Packard Enterprise and VMware offering services for different use cases.” – John Burke
Yahoo, Verizon execs: Prepare your networking team for SDN and DevOps
Verizon and Yahoo talked about the need for networking team members to look toward SDN and DevOps at ONUG’s fall 2016 conference.
How to assess the benefits of SDN in your network
The proposed benefits of SDN are becoming clearer, as are the questions you should ask about an SDN deployment to address your networking issues.
Could OpenConfig resolve automation struggles?
In this SDN blogs roundup, OpenConfig could make automation easier and why enterprises should keep it simple when solving network problems.
DevOps or SDN? You’ll need them both to work together
When it comes to DevOps or SDN, do you really need to choose one over the other? Most IT shops will need both. SDN will be the ultimate DevOps tool set, while DevOps will make IT pros SDN-ready.
Where SDN and DevOps tools meet
Combining SDN and DevOps tools will mean the network can play a key role in IT orchestration and an application-aware, responsive infrastructure.
Human capital management (HCM) is an approach to employee staffing that perceives people as assets (human capital) whose current value can be measured and whose future value can be enhanced through investment. Continued…
Quote of the Day
“The HCM system journey doesn’t stop at go-live, so thinking about how the system will be managed in the immediate and long-term periods after the go-live should be in the project plans from the start.” – Luke Marson
Vendors showcase five new HCM technologies
Executives from SAP, Halogen Software, ADP and two other vendors took the stage to describe new HCM technologies developed during the past year.
Seven keys to a successful global HCM implementation
A proactive and strategic approach to your HCM implementation helps ensure success. Here’s advice on managing a global human capital management rollout.
Tokyo firm enters human capital management software race in U.S.
A Japanese vendor prepares to enter the U.S. with human capital management software, while ADP and Workday offer improved payroll integration.
Your guide to successful HR and HCM software implementation
Successful HR and HCM software implementations require a holistic strategy. Our essential guide leads you through one, from research to user adoption.
Steps to take before implementing a cloud-based HCM system
The efficiencies of a cloud-based HCM system can provide a wealth of value, but before you make the move, you need to evaluate your current HR infrastructure.
Born digital, in reference to people, is a description of individuals who have grown up with the current state of ubiquitous computing and communications, typified by technology like smartphones, social media and near-continuous Wi-Fi networks. Continued…
Quote of the Day
“Millennials’ technology expectations have been shaped by smartphones, Facebook and digital media — in other words, by easy and ubiquitous connectivity.” – Beth Stackpole
Liquor distributor turns to SD-WAN to support digital operation
Liquor distributor Republic National Distributing Co. finds Silver Peak SD-WAN less expensive than Cisco and Citrix for supporting its digital operation.
How Millennials’ technology expectations can help save manufacturing
Millennials’ technology expectations will need to be met if manufacturing is to court this talent source to fill its skills gap. Here’s what to know.
People are biggest hurdle in workplace transformation
Citrix’s Michael McKiernan offers advice on how CIOs can help employees get used to a workplace transformation in this SearchCIO video interview.
Want to sell cloud computing? Focus on Millennials
Cloud computing has reached a mature state in the small and medium-sized business sector, where Millennials have emerged as top buyers.
Millennials and technology are reshaping IT departments
Millennials are forcing organizations to reconsider their attitudes towards smartphones, tablets and the cloud. To younger workers, this technology is simply a part of life.
In computer programming, an engine is a program that performs a core or essential function for other programs. Engines are used in operating systems, subsystems or application programs to coordinate the overall operation of other programs. Continued…
Quote of the Day
“Business rules engines are usually architected as pluggable software components that separate the business rules from the application code. This separation helps reduce the time, effort, and costs of application maintenance.” – Alex Berson
Overview of Business Rules Engines
Learn how to successfully navigate the business rules engines.
A search engine that ‘makes’ data-driven business decisions
Search engine technologies can mine enterprise data for making data-driven business decisions. Sid Probstein of Attivio discusses the company’s graph engine and how it works.
Powering a more efficient enterprise search engine
To power an enterprise search engine that locates relevant, valuable results, companies are turning to new technologies like analytics and search-based apps.
Spark vs. Hadoop: Is big data engine a replacement part?
Strata + Hadoop World 2015 attendees offer a range of views on Spark vs. Hadoop, looking at whether Apache Spark may replace its vaunted predecessor.
Cisco analytics engine helps maintain app health in big data centers
The latest Cisco analytics engine examines 1 million traffic flows a second to help network administrators maintain application performance.
Quantum computing is an area of study that focuses on developing computer technology that is based on the principles of quantum theory. Following the laws of quantum physics, a computer would gain enormous processing power through the ability to be in multiple states and to perform tasks using all possible permutations simultaneously. Continued…
Quote of the Day
“Besides transforming material science, quantum computing could lead to significant developments in artificial intelligence and allow for search or analysis of much more data than can be handled by today’s most powerful machines.” – David Cory
Can IBM fast-track quantum computing via the crowd?
IBM hails its new cloud-enabled quantum computing service as the birth of the quantum age of computing. Also in Searchlight: Facebook rewards 10-year-old for ethical hacking.
IBM takes on quantum computing; how CIOs can hone customer-centric design
IBM is seeking to speed innovation and discover new use cases for quantum computing.
Google snaps up startup in push to master computer vision
With its purchase of Moodstocks, a machine learning-based image recognition startup, Google keeps pushing into the next frontier — computer vision. Also: C-level exit at Microsoft.
Three CIO communication tips that will change the way you lead
Mark Jeffries argues that knowing these three communication assumptions will turn CIOs and senior IT leaders into better communicators.
Emerging tech trends point to new era of digital business
This year’s hype cycle on emerging tech trends whittles down 2,000 technologies to the 30-plus CIOs should consider when building out their IT roadmap.
Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter’s Law.” In other words, time estimates for how long anything will take to accomplish always fall short of the actual time required — even when the time allotment is increased to compensate for the human tendency to underestimate it. Continued…
Quote of the Day
“Once you realize that time is your most important asset, it becomes clear that you have to be stingy about what you take on.” – Kevin Beaver
Time management strategies for the IT pro
To get the most out of your IT career, time management skills are critical for IT professionals to have. Hone your talents with these time-management best practices and get the most out of every working minute.
Can time management improve productivity of QA testers?
QA time management is not a contradiction in terms. Expert Amy Reichert shares her secrets with QA testers to end testing procrastination forever.
How to estimate project completion times
To determine the duration of an individual task or calculate when a project will complete, Lawrence Oliva suggests using your expert judgment, top-down estimating, and parametric formulas such as PERT.
Top 10 time management tips
Do you have a time management problem? Use these ten tips to see if you do and solve the problem.
Prioritize your IT tasks and finally conquer your to-do list
It’s easy to feel overwhelmed by a growing to-do list of IT tasks, but there are easy steps you can take to decide what to tackle first and what can wait.
Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with end users who have unnecessary access privileges. Continued…
Quote of the Day
“All types of organizations are discovering that they need much greater visibility into who can access their key resources — and maintain stronger policies and controls over employees who no longer need to access task-specific information.” – Travis Greene
How IAM can address unstructured content security risks
Unstructured content is difficult to locate and manage. Learn how your enterprise can apply identity and access management and improve security controls.
User provisioning best practices: Access recertification
User provisioning best practices dictate that user access needs to be continually monitored to make sure no one has access to anything they shouldn’t — known as access recertification. Learn more about how to implement this process in this expert tip.
Companies falling behind on IT access governance, survey finds
IT access governance is becoming a major problem, according to a new Ponemon Institute survey. Many enterprises are having trouble keeping pace with access changes as the result of cloud computing, outsourcing and a greater reliance on independent contractors.
Best practices: How to implement and maintain enterprise user roles
Checklist: Learn the steps necessary for a successful enterprise user role management implementation.
Access control compliance and corporate governance considerations
Learn about access control compliance considerations and how to help your client stay compliant when implementing access control technologies.
Data center infrastructure management (DCIM) is the convergence of IT and building facilities functions within an organization. The goal of a DCIM initiative is to provide administrators with a holistic view of a data center’s performance so that energy, equipment and floor space are used as efficiently as possible. Continued…
Quote of the Day
“With DCIM, many corporations have been through the early deployment stage, understand the potential pain points, and realize that successfully deploying DCIM solutions is a lot of work.” – Jennifer Cooke
Evolving DCIM market shows automation, convergence top IT’s wish list
The DCIM market evolves as IT teams look for new capabilities in data center management tools, ranging from greater automation to predictive analytics.
Users, experts speak out about DCIM tools
Users and experts explore their thoughts on the usefulness and future of DCIM tools.
Next-gen DCIM software holds insights for data center groups
DCIM software unifies facilities and IT with comprehensive data center monitoring. Next-gen tools even tell the business about available capacity and green IT.
Early DCIM software users pay more than Johnny-come-latelies
The TCO for DCIM software has dropped by 40% in three years as enterprises find ways to bring IT and facilities teams together in the data center.
DCIM vendors’ promises vs. data center realities
DCIM vendors and products are volatile today, giving some enterprise IT shops pause about whether DCIM’s promised future benefits are worth today’s cost and integration hassles.
Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service. Continued…
Quote of the Day
“It sounds harmless, but don’t be fooled. Sock puppetry on social media outlets is not only unscrupulous, but it may be illegal in some cases.” – Laura Aberle
Using social media so your brand awareness strategy strikes it hot
Visibility, relevance and velocity are three key areas to measure in using social media for your brand awareness strategy.
Using social media for business: Terms you should know
Social media offers new ways for enterprises to collaborate with consumers. Here’s a roundup of terms related to using social media for business, from the basics to newer concepts.
Internal social CRM strategies, personality seen as building brand awareness
Social CRM is still about business strategy and customer satisfaction, but the social part brings a whole new element to traditional CRM. Find out how Dell and three other companies leverage social CRM to build brand awareness with social media tools.
Choosing the right social media branding strategy
Social media branding strategy can help businesses generate publicity and build consumer loyalty, but there’s no one-size-fits-all approach for this component of modern marketing.
Customer engagement strategies hinge on social media savvy
Social media is gaining importance in customer engagement strategies, but many sales teams struggle with how to take full advantage of social tools.