Searching all of TechTarget| 22,832 results for "affect"


By Scott Sachs Evaluate Feb 02, 2016

How does the virtual contact center model affect the market?

The virtual contact center has become increasingly compelling. Why? Continue Reading


By Scott Sachs Manage Jan 25, 2016

How does social customer service affect contact centers?

As more consumers utilize social media customer service options, organizations are finding it's important to create strategies to handle company responses. Continue Reading


By Sarah Wilson News Jan 18, 2016

COO: VCE converged infrastructure not affected by Dell-EMC

VCE's converged systems cater to a wide array of users, but will still differ from Dell's converged products after the purchase of VCE's parent company, EMC, according to COO Todd Pavone. Continue Reading


By Mike Chapple Evaluate Jan 13, 2016

How the Trans-Pacific Partnership agreement affects security

The Trans-Pacific Partnership agreement has riled up many in the security industry with some of its controversial provisions. Expert Mike Chapple explains its effect on cybersecurity. Continue Reading


By Michael Cobb Problem Solve Jan 12, 2016

How can security vendor hacks affect enterprises?

Several security vendors and providers have been hacked over the last year. Expert Michael Cobb explains how enterprises should prepare for a vendor hack. Continue Reading


By Chris Riley Evaluate Jan 11, 2016

How does application container technology affect CI efforts?

Containers are certainly the new app development craze, but does this new technology help or hinder efforts around continuous integration? Chris Riley examines. Continue Reading


By Mike Chapple Evaluate Nov 19, 2015

How does tokenization technology affect PCI DSS compliance?

Tokenization technology can be confusing. Expert Mike Chapple explains what the difference is between two types of tokens and how tokenization can help with PCI DSS compliance. Continue Reading


By Brian Kirsch Manage Aug 31, 2015

How CPU and memory affect application performance

Application performance will change depending on if you want more cores, better clock speed or what you choose for memory. Continue Reading


By Michael Cobb Problem Solve Nov 13, 2015

How does the Logjam vulnerability affect TLS encryption?

Expert Michael Cobb discusses the TLS protocol flaw dubbed Logjam and explains how to detect if enterprise systems are at risk, as well as how to remediate them. Continue Reading


Jan 19, 2016

Take-up of cloud storage in Europe affected by privacy issues

The cloud storage narrative has been heavily US-biased, with take-up of cloud in Europe modified by concerns over privacy and responses to Safe Harbour’s nullification Continue Reading