Searching all of Tech Target| 73,557 results for "a2a"

SearchDataCenter

By Bernie Klinder News Feb 28, 2005

Step 2: Reserve a location

Here's Step 2 of the eight key steps you need to consider when building a data center or server room. Continue Reading

Search400

Evaluate Mar 03, 2003

Dropping a column in DB2 7.2

This is a simple way to drop a column in DB2 7.2 for those who do not use a third-party software solution. Continue Reading

SearchCIO.com.au

By Lisa Phifer Problem solve Oct 15, 2006

Creating a WPA2 compliant network

Our expert, Lisa Phifer, goes through the basic principles of creating a WPA2 compliant network. Continue Reading

Search400

By Kent Milligan Evaluate Aug 16, 2005

Import a text file to a DB2 table

One user writes, "I need to "import" a text file located in the user computer to a DB2 table in the database, what's the best way to do this?" DB2 expert Kent Milligan offers some advice. Continue Reading

SearchCIO.com.au

By Dennis Fisher News Apr 09, 2007

WEP crack makes WPA2 a must

A new paper highlighting the weakness of Wired Equivalent Privacy (WEP), a prominent WiFi security tool, is a call to all users to switch to the more secure Wi-Fi Protected Access 2 (WPA2). Continue Reading

SearchNetworking

By Lisa Phifer Problem solve Oct 12, 2006

Creating a WPA2 compliant network

Our expert, Lisa Phifer, goes through the basic principles of creating a WPA2 compliant network, in this Q&A. Continue Reading

TheServerSide

Jun 01, 2000

Selecting a J2EE Vendor

This paper attempts to act as a review guide for organisations doing a seeking a vendor that provides technologies centred around the J2EE brand created and maintained by Sun Microsystems. It attempts to act as a ... Continue Reading

SearchAWS

Get started May 28, 2014

Connecting to a new EC2 instance

Amazon's free tier EC2 instance is a great sandbox for dev projects. After you've set up your servers, it's time to configure them. Continue Reading

SearchSecurity

May 26, 2009

Lesson 2: How to build a secure wireless infrastructure 2

In Lesson 2 of Wireless Security Lunchtime Learning, you'll learn how to build a secure wireless infrastructure by understanding the myriad security standards and features that Wi-Fi products boast, as well as how ... Continue Reading

SearchNetworking

By Lindi Horton Problem solve Jan 09, 2006

What are the advantages of a KVM switch over a Layer 2 or Layer 3 switch?

What are the advantages of a KVM switch over a Layer 2 or Layer 3 switch? Continue Reading