- Coase, Product Companies, and Professional Services
- Nov 9, 2001
- If your product company wants to provide professional services to your customers, can you outsource this function? Not yet, but you may not have to wait too long for that option, says Thomas Lah.
|
- Collaboration Is Key for Green IT
- Apr 17, 2009
- Collaboration among many stakeholders is a must for green data center technology. John Lamb describes how to help make this collaboration happen.
|
- Commerce Server 2000: Creating the Store Foundation
- Feb 15, 2002
- Gopal Sreeraman shows you how to create a B2C site using the Commerce Server solution site Retail, and how to create a Business Desk site to manage this commerce site. He also explores the changes made by Site Packager due to the unpacking process.
|
- Comparing Open Source Licenses: GPL vs. BSDL
- Feb 3, 2006
- David Chisnall compares the two most popular software licenses in the free and open source software (F/OSS) communities: the GNU General Public License (GPL) and the Berkeley Software Distribution License (BSDL). Each has advantages, but the distinctions are sometimes quite subtle.
|
- Comparing Site Server and CommerceServer 2000 – What’s New?
- Nov 30, 2001
- Commerce Server 2000, the next generation of e-commerce applications, shows that Microsoft is learning what it takes to deliver a solid application for the sell-side.
|
- Computer Forensics: Tracking an Offender
- Nov 30, 2001
- Learn to collect and analyze evidence found in a compromised computer system.
|
- Computer Networks -- Anatomy of a Classic
- Oct 24, 2003
- Andrew S. Tanenbaum, author of Computer Networks, talks about his classic book and what he sees as the most significant developments in networking today.
|
- Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
- Jun 9, 2006
- This chapter will focus on using a concentrator to terminate other types of remote access sessions, including PPTP, L2TP over IPsec, and WebVPN. The remainder of this chapter will focus on the configuration of the concentrator to support these types of remote access VPN implementations.
|
- Confidence Games in Software Engineering
- Mar 17, 2006
- Have you heard the pitch for the tool that gives a 600% productivity improvement, or the new programming language that will solve all of your problems? Matt Heusser explains that confidence games abound in software development - and suggests what to do about them.
|
- Configuration for Transparently Redundant Firewalls
- Sep 21, 2001
- It's both possible and practical to configure redundant firewalls to provide continued operation despite router or firewall failure, and with minimal impact on security.
|
- Configuring an HP-UX Kernel
- Jun 24, 2005
- This chapter covers the kernel-related commands, gives some examples of using the commands to modify and build kernels, and gives an overview of kcweb, the web-based system administration tool.
|
- Configuring Boot Disks
- Mar 15, 2002
- This sample chapter presents a reference configuration of the root disk and associated disks that emphasizes the value of configuring a system for high availability and high serviceability and outlines the methods used create such a system.
|
- Configuring PIX Firewall IPSec Support
- Feb 22, 2002
- This chapter will teach you how to configure PIX Firewall IPSec using preshared keys for authentication and test and verify PIX Firewall IPSec.
|
- Configuring SSL on BEA WebLogic Server 8.1
- Apr 29, 2005
- Using the Secure Sockets Layer (SSL) protocol is a relatively simple way to help protect your private information from spying eyes. Jon Svede shows how easy it is to set up SSL on BEA WebLogic Server 8.1.
|
- Configuring the Cisco PIX Firewall for CA Site-to-Site
- Dec 28, 2001
- This sample chapter explains how to configure Cisco Secure PIX Firewall certificate
authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
|
- Configuring the PIX Firewall for SSH (Secure Shell)
- Feb 15, 2002
- Let author, educator, and security specialist David W. Chapman Jr. demonstrate how easy it is to configure and troubleshoot secure remote access to your PIX Firewall.
|
- Configuring the Secure Shell
- Nov 12, 2004
- This chapter will help you configure SSH for your company to the security specifications of your particular network.
|
- Considerations Before Migrating to Windows XP Professional
- Aug 13, 2001
- Migrating to another operating system from your current one is fraught with challenges that are best met through deliberate planning. This article profiles the issues you need to resolve before migrating to Windows XP Professional.
|
- Consolidation in the Data Center
- Dec 20, 2002
- This article introduces various types of consolidations you can perform - servers, applications, storage, shared services, networks, and people resources - and describes some of the benefits of each type of consolidation.
|
- Consolidation Methodology
- Sep 5, 2003
- This article outlines the major phases of the consolidation methodology developed by Sun Professional Services.
|