Home > Articles > Information Technology

Information Technology

921 Items

Sort by Date | Title

Coase, Product Companies, and Professional Services
Nov 9, 2001
If your product company wants to provide professional services to your customers, can you outsource this function? Not yet, but you may not have to wait too long for that option, says Thomas Lah.
Collaboration Is Key for Green IT
Apr 17, 2009
Collaboration among many stakeholders is a must for green data center technology. John Lamb describes how to help make this collaboration happen.
Commerce Server 2000: Creating the Store Foundation
Feb 15, 2002
Gopal Sreeraman shows you how to create a B2C site using the Commerce Server solution site Retail, and how to create a Business Desk site to manage this commerce site. He also explores the changes made by Site Packager due to the unpacking process.
Comparing Open Source Licenses: GPL vs. BSDL
Feb 3, 2006
David Chisnall compares the two most popular software licenses in the free and open source software (F/OSS) communities: the GNU General Public License (GPL) and the Berkeley Software Distribution License (BSDL). Each has advantages, but the distinctions are sometimes quite subtle.
Comparing Site Server and CommerceServer 2000 – What’s New?
Nov 30, 2001
Commerce Server 2000, the next generation of e-commerce applications, shows that Microsoft is learning what it takes to deliver a solid application for the sell-side.
Computer Forensics: Tracking an Offender
Nov 30, 2001
Learn to collect and analyze evidence found in a compromised computer system.
Computer Networks -- Anatomy of a Classic
Oct 24, 2003
Andrew S. Tanenbaum, author of Computer Networks, talks about his classic book and what he sees as the most significant developments in networking today.
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Jun 9, 2006
This chapter will focus on using a concentrator to terminate other types of remote access sessions, including PPTP, L2TP over IPsec, and WebVPN. The remainder of this chapter will focus on the configuration of the concentrator to support these types of remote access VPN implementations.
Confidence Games in Software Engineering
Mar 17, 2006
Have you heard the pitch for the tool that gives a 600% productivity improvement, or the new programming language that will solve all of your problems? Matt Heusser explains that confidence games abound in software development - and suggests what to do about them.
Configuration for Transparently Redundant Firewalls
Sep 21, 2001
It's both possible and practical to configure redundant firewalls to provide continued operation despite router or firewall failure, and with minimal impact on security.
Configuring an HP-UX Kernel
Jun 24, 2005
This chapter covers the kernel-related commands, gives some examples of using the commands to modify and build kernels, and gives an overview of kcweb, the web-based system administration tool.
Configuring Boot Disks
Mar 15, 2002
This sample chapter presents a reference configuration of the root disk and associated disks that emphasizes the value of configuring a system for high availability and high serviceability and outlines the methods used create such a system.
Configuring PIX Firewall IPSec Support
Feb 22, 2002
This chapter will teach you how to configure PIX Firewall IPSec using preshared keys for authentication and test and verify PIX Firewall IPSec.
Configuring SSL on BEA WebLogic Server 8.1
Apr 29, 2005
Using the Secure Sockets Layer (SSL) protocol is a relatively simple way to help protect your private information from spying eyes. Jon Svede shows how easy it is to set up SSL on BEA WebLogic Server 8.1.
Configuring the Cisco PIX Firewall for CA Site-to-Site
Dec 28, 2001
This sample chapter explains how to configure Cisco Secure PIX Firewall certificate authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
Configuring the PIX Firewall for SSH (Secure Shell)
Feb 15, 2002
Let author, educator, and security specialist David W. Chapman Jr. demonstrate how easy it is to configure and troubleshoot secure remote access to your PIX Firewall.
Configuring the Secure Shell
Nov 12, 2004
This chapter will help you configure SSH for your company to the security specifications of your particular network.
Considerations Before Migrating to Windows XP Professional
Aug 13, 2001
Migrating to another operating system from your current one is fraught with challenges that are best met through deliberate planning. This article profiles the issues you need to resolve before migrating to Windows XP Professional.
Consolidation in the Data Center
Dec 20, 2002
This article introduces various types of consolidations you can perform - servers, applications, storage, shared services, networks, and people resources - and describes some of the benefits of each type of consolidation.
Consolidation Methodology
Sep 5, 2003
This article outlines the major phases of the consolidation methodology developed by Sun Professional Services.

<< < Prev Page 5 6 7 8 9 Next >