výsledky řadit dle: relevance | data

libovolné období | posledních 24 hodin | týden | měsíc | poslední rok | Nápověda




11.

Know your storage security fundamentals | 01.12.2006

While encryption is a very important element, it is really only one piece of an overall storage security strategy. There are a...


12.

Network infrastructure clash | 01.11.2006

Network vendors have focused on elements such as IP addresses and TCP ports to provide a high-performance, secure packet-deliv...


13.

On Policies | 01.11.2006

What is the right approach to setting data management policies? The first step is to understand that there is a really a hiera...


14.

All the way from alignment to convergence | 01.11.2006

"I recently reviewed research indicating that CIOs don\t want to hear about aligning IT to the business. That\s old news. Inst...


15.

Devices love Linux | 01.11.2006

Developers in the open source community often begin tinkering with technology as soon as it\s released. The code they produce ...


16.

Google Minis a mighty search tool | 01.09.2006

I tested the latest version of the Mini (the first one was introduced in January 2005), a thin, server-size search appliance, ...


17.

Exploiting everyday end-user behavior | 01.09.2006

And according to Contributor Editor Dan Tynan, typical IT administrators have no shortage of worrisome situations to ponder du...


18.

Belgium adopts a new format | 01.09.2006

Belgium may become the first national government to mandate the use of the Open Document Format (ODF), with a full-scale trial...


19.

The operations albatross | 01.07.2006

Tales of heroic hacks and inspired work-arounds By Neil McAllister, InfoWorld (US) What does it mean to be a hacker? The mains...


20.

IT career: The title | 01.06.2006

Consider a traditional developer with expertise in Java, C++, and .Net. Ask a manager whether his or her employee would be mor...