Searching all of TechTarget| 79,505 results for "2"

Conversations: Connection between Oracle 11g & D2K 6i

See all conversation search results provided by ITKE.

SearchAWS

By Ofir Nachmani Get Started Aug 31, 2015

ComputerWeekly

Sep 03, 2015

Data Breach Readiness 2.0

Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches. Continue Reading

SearchAWS

By Ofir Nachmani Get Started Aug 31, 2015

MicroscopeUK

By Simon Quicke Sep 03, 2015

3D printer market stalls in Q2

The results from some of the leading manufacturers had already made grim reading and Context has added some analysis to the current state of the 3D printer market Continue Reading

SearchAWS

By Ofir Nachmani Get Started Aug 31, 2015

Meet the family of AWS EC2 instance types

AWS EC2 instance types offer an array of options for compute power. Get to know the nine types of Elastic Compute Cloud instances to help your business succeed. Continue Reading

SearchSecurity

By Madelyn Bacon News Aug 18, 2015

From CCSP to CISSP: A look at (ISC)2 cybersecurity certifications

Video: Cybersecurity certifications are not in short supply, but (ISC)2 still dominates the field with CISSP and the new CCSP certification from its CSA partnership. Continue Reading

SearchStorage

By Aditya Gune Evaluate Aug 12, 2015

Oracle FS1-2 storage array system

Oracle FS1-2 SAN arrays can scale to petabytes and ship complete with data storage features, such as replication and auto-tiering. Continue Reading

ComputerWeekly

By Eeva Haaramo Aug 10, 2015

The IT supporting Finland’s Angry Birds 2

The sequel to online game Angry Birds has been developed to withstand huge usage volumes, supported by scalable, cloud-based technology Continue Reading

SearchSecurity

By Randall Gamby Get Started Aug 03, 2015

Which authentication method is better: 2FA or MFA?

Which authentication method is better for securing enterprise devices and systems: two-factor authentication or multifactor authentication? Continue Reading

SearchMobileComputing

By Steve Damadeo Evaluate Jul 27, 2015

How 2-in-1 tablets fit into the enterprise

Enterprise users who want to be freed from their PC but maintain that functionality can turn to the burgeoning 2-in-1 market. Continue Reading