Is eDirectory a better alternative than Active Directory for the enterprise? Add your voice to the discussion in this special eDirectory forum. There isn’t much to compare when reviewing the merits of ...
SALT LAKE CITY — As part of its underlying vision for a single, unified network, Novell’s eDirectory has quietly emerged as a central piece of technology for bridging access to Web-enabled network ...
Houston’s Blue Lance software has been almost exclusively a third-party supplier to the NetWare aftermarket ever since it was founded in 1985. While the company has extended its reach into the Windows ...
Anyone care to venture on this? I use both the latter but keep hearing every now and again some very interesting things that can be done with LDAP. For example, having samba authenticate against ...
For some reason this part off the install is slipping of my brain.<BR><BR>What is it asking me to do?<BR><BR><BLOCKQUOTE class="ip-ubbcode-quote"><div class="ip ...
Last spring when Novell rolled out “Novell Security Manager powered by Astaro (NSM),” I took the company to task because it appeared that the security appliance was more comfortable with Microsoft’s ...
middleware products. The Fujitsu eDirectory login also is versatile, allowing users to access eDirectory running on Windows, Linux, or Netware. It can co-exist with other authentication services ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
The fingerprint matching technology aims to tighten security and make it easier for the correct people to access the eDirectory system, which is used around the world for accessing and developing ...