Robert Sheldon Contributor - SearchSQLServer SearchMobileComputing Multifactor authentication isn't a security cure-all 19 Dec 2014 SearchMobileComputing Location-based mobile management raises employee privacy concerns 05 Dec 2014 SearchMobileComputing MDM puts mobile geofencing, geolocation services on the map 05 Dec 2014 SearchOracle The seven deadly sins that lead to an Oracle audit 03 Dec 2014 SearchOracle Oracle cloud strategy is to coexist with on-premises 14 Nov 2014 SearchMobileComputing How mobile remote desktop apps work 10 Nov 2014 SearchSQLServer Pricing out the new Windows Azure SQL Database 05 Nov 2014 SearchSQLServer SQL Azure automatic backup keeps it 'business as usual' 17 Oct 2014 SearchMobileComputing Apple iOS 8, iPhone 6 improve IT security and control 06 Oct 2014 SearchMobileComputing Rooted Android device risks include network access, data theft 25 Sep 2014 SearchMobileComputing Behind every good mobile device security policy is an educated staff 22 Sep 2014 SearchSQLServer New Azure SQL subscription model has performance levels 02 Sep 2014 SearchEnterpriseDesktop Office Telemetry reports on Office 2013 docs and apps 21 Jul 2014 SearchOracle The evolution of Oracle Fusion Cloud Services 16 Jul 2014 SearchEnterpriseDesktop Windows 9 features may address unified apps and the cloud 16 Jul 2014 SearchCloudComputing IBM Cloud Marketplace one-stop shop for every XaaS need 11 Jul 2014 SearchEnterpriseDesktop How to perform a Windows XP upgrade to Windows 8.1 17 Jun 2014 SearchSQLServer In-memory from xVelocity to the memory-optimized columnstore index 28 May 2014 SearchVirtualDesktop Choosing among VDI vendors: Know your needs 22 May 2014 SearchSQLServer SQL Server 2014 columnstore index: the good, the bad and the clustered 13 May 2014 SearchMobileComputing Five alternatives to Microsoft for mobile office applications 12 May 2014 SearchMobileComputing What Microsoft EMM offers and how it compares 28 Apr 2014 SearchEnterpriseDesktop Five laptop finder products offer security after a device loss 23 Apr 2014 SearchOracle Oracle gets away from relational DB with NoSQL database architecture 18 Apr 2014 SearchSQLServer Using Power BI to enhance SQL Server self-service business intelligence 31 Mar 2014 SearchSQLServer Managing data with Enterprise Integration Management and SQL Server 31 Mar 2014 SearchOracle Oracle has a new security tool for Database 12c, data redaction 27 Mar 2014 SearchOracle Oracle 12c's heat map tool and data optimization can improve storage 25 Mar 2014 SearchSQLServer Some new Windows Azure integration features in SQL Server 2014 24 Mar 2014 SearchEnterpriseDesktop Where will XP stalwarts go after the end of Windows XP support? 05 Mar 2014 SearchEnterpriseDesktop Ensure compliance with Windows BitLocker encryption using MBAM 2.0 04 Mar 2014 SearchMobileComputing What IT pros need to know about the Android 4.4 KitKat OS 28 Feb 2014 SearchOracle Using Oracle Business Accelerators could speed up ERP deployment 28 Feb 2014 SearchSQLServer Five Windows Azure alternatives for SQL Server 28 Feb 2014 SearchMobileComputing Can Samsung Knox security make devices safe enough for Fort Knox? 14 Feb 2014 SearchMobileComputing Delivering mobile apps through enterprise app stores and private clouds 12 Feb 2014 SearchMobileComputing App delivery techniques: Virtualization and Web-based apps 12 Feb 2014 SearchSQLServer The SQL Server 2012 Fast Track Data Warehouse reference architecture 31 Jan 2014 SearchSQLServer Five SQL Server 2012 business intelligence features 31 Jan 2014 SearchOracle Oracle in-memory database option: Potential licensing and hardware costs 28 Jan 2014 SearchMobileComputing What Dropbox for Business has to offer admins and users 28 Jan 2014 SearchEnterpriseDesktop Use new Windows 8 Group Policy settings to control the Windows 8.1 UI 03 Jan 2014 SearchEnterpriseDesktop IT turns to third-party Active Directory audit tools for Windows data 18 Nov 2013 SearchOracle The Oracle big data strategy: Weighing appliance vs. commodity 18 Nov 2013 SearchSQLServer SQL Server views: Creating indexes and adding base data 25 Oct 2013 SearchSQLServer SQL Server views: What they are and how to create them 24 Oct 2013 SearchSQLServer SQL CONSTRAINT clauses: FOREIGN KEY, CHECK and DEFAULT 17 Oct 2013 SearchSQLServer SQL CONSTRAINT clauses: PRIMARY KEY and UNIQUE 17 Oct 2013 SearchSQLServer Set database constraints using SQL Server Management Studio Table Designer 17 Oct 2013 SearchSQLServer Using SQL Server Management Studio Table Designer to create a table 17 Oct 2013 SearchEnterpriseDesktop Windows 8.1 biometrics support increases security, but do you need it? 16 Oct 2013 SearchEnterpriseDesktop Microsoft Safety Scanner and MSRT can complement malware defenses 07 Oct 2013 SearchSQLServer Well-tested dbForge Schema Compare, a solid performer 18 Sep 2013 SearchSQLServer SQL Examiner: Loaded with extras 18 Sep 2013 SearchSQLServer Five third-party schema comparison tools 18 Sep 2013 SearchSQLServer Choosing a schema comparison tool 18 Sep 2013 SearchSQLServer SQL Compare: Often the experts' first choice 18 Sep 2013 SearchSQLServer Cross-version compare and sync with xSQL Schema 18 Sep 2013 SearchSQLServer Compare and synchronize with ApexSQL Diff 18 Sep 2013 SearchMobileComputing Are MDM tools as secure as you think? 21 Aug 2013 SearchSQLServer SQL 2014 features: Partitioned indexes and memory-optimized tables 20 Aug 2013 SearchSQLServer SQL 2014 features: Extended buffer pool and columnar indexes 20 Aug 2013 SearchEnterpriseDesktop Office 2013 security features for the enterprise include digital signatures 14 Aug 2013 SearchSQLServer SQL Server 2014 overview part 2: Availability and scalability features 08 Aug 2013 SearchSQLServer SQL Server 2014 overview part 1: In-memory, cloud integration features 08 Aug 2013 SearchSQLServer Configuring and implementing a SQL Server contained database 19 Jul 2013 SearchSQLServer How to start and set up SQL Server Audit 09 Jul 2013 SearchSQLServer The lowdown on SQL Server auditing tools 08 Jul 2013 SearchEnterpriseDesktop Comparing Windows Defender in Windows 8 vs. third-party malware tools 02 Jul 2013 SearchMobileComputing Why the COPE model isn't a slam-dunk alternative to BYOD 01 Jul 2013 SearchMobileComputing BYOD vs. COPE: Why corporate device ownership could make a comeback 01 Jul 2013 SearchEnterpriseDesktop Using Active Directory activation and other new Office 2013 tools 31 May 2013 SearchSQLServer SQL Server virtualization: When it's just not a good idea 30 May 2013 SearchEnterpriseDesktop New Office 2013 features can help IT pros as much as end users 24 May 2013 SearchMobileComputing Six enterprise cloud storage and file-sharing services to consider 06 May 2013 SearchEnterpriseDesktop UEFI vs. BIOs in Windows 8 for desktop startup 06 May 2013 SearchMobileComputing BYOD pros and cons: Spend less on devices, more on support 13 Mar 2013 SearchSQLServer When to consider SQL Server Enterprise Edition 14 Feb 2013 SearchMobileComputing How iPhone encryption and data protection work 11 Feb 2013 SearchSQLServer SQL Server Standard Edition: Why it's worth the cost 30 Jan 2013 SearchITChannel Data as a Service opportunities for solution providers 25 Jan 2013 SearchSQLServer SQL Server editions: Is Microsoft SQL Server Express right for you? 23 Jan 2013 SearchMobileComputing BYOD privacy: Is Big Brother watching? 18 Jan 2013 SearchITChannel DBaaS pros and cons for solution providers 21 Dec 2012 SearchITChannel HP Enterprise Data Warehouse Appliance addresses massive data needs 05 Dec 2012 SearchEnterpriseDesktop Java malware, fileless malware pose threats to desktop security 04 Dec 2012 SearchITChannel Zenprise Mobile Manager stops sneaky devices 16 Nov 2012 SearchITChannel MobileIron Advanced MDM application 16 Nov 2012 SearchITChannel Mobile device enrollment Fiberlink MaaS360 16 Nov 2012 SearchITChannel Microsoft Windows Intune dashboard 16 Nov 2012 SearchITChannel RIM Blackberry Mobile fusion unified solution 16 Nov 2012 SearchITChannel Guiding customers to an enterprise mobile device management solution 16 Nov 2012 SearchITChannel Exploring MDM solutions for SMBs and enterprise customers 16 Nov 2012 SearchITChannel SAP Afaria mobile environment 16 Nov 2012 SearchITChannel Symantec Mobile Management keeps you in control 16 Nov 2012 SearchEnterpriseDesktop Windows XP end of support: What are the risks for users? 06 Nov 2012 SearchMobileComputing How to develop a monitoring system for mobile cloud-based applications 01 Oct 2012 SearchITChannel Microsoft Sync Framework services for mobile device data management 19 Sep 2012 SearchSQLServer Best practices for preventing a SQL injection attack 17 Sep 2012 SearchSQLServer More new features for SSIS 2012: Connection managers and more 24 Aug 2012 1 2 3 4 5 6 7