Searching all of TechTarget| 2,404 results for "toolkit"

Conversations: Database migration from DB2 to Oracle

See all conversation search results provided by ITKE.

ComputerWeekly

By Caroline Donnelly Aug 11, 2015

Hootsuite moves social media management toolkit to IBM Softlayer cloud

Social media management dashboard maker shifts App Directory to IBM cloud Continue Reading

SearchSecurity

By Nick Lewis Evaluate Mar 25, 2015

What enterprises need to know about the Regin malware toolkit

The sophisticated Regin malware contains features that hackers can adopt into other enterprise malware threats. Expert Nick Lewis explains how to combat this risk. Continue Reading

ComputerWeekly

Aug 06, 2014

HR Technology Toolkit

Leading European & international academic offer insights into HR technology in this in-depth report from HR Zone. Continue Reading

SearchSDN

By Jeff Loughridge Evaluate Feb 09, 2015

Open NFV toolkit Snabb Switch offers virtual Ethernet programming

Snabb Switch, an emerging open NFV toolkit, enables Ethernet function programming in a software switch. Could it leave vendor-developed hardware in its wake? Continue Reading

SearchVirtualDesktop

By Margaret Jones Jul 21, 2014

Microsoft Deployment Toolkit automates VDI images

Automating VDI image creation shrinks the margin of error, combats performance problems and eases image management. At a BriForum 2014 session this week, attendees learned how to automate golden images with the ... Continue Reading

SearchSecurity

By Fernando Gont Get Started Feb 02, 2015

How to evaluate IPv6 network security with SI6 Networks IPv6 Toolkit

Some security pros underestimate the importance of IPv6 network security assessment tools. Expert Fernando Gont offers an illustrated guide on how to use SI6 Networks' free IPv6 toolkit. Continue Reading

SearchContentManagement

Manage Mar 10, 2014

Records management only part of the information governance toolkit

Records management is part of the broader information governance toolkit that involves content of all types, expert Steve Weissman says. Continue Reading

SearchSecurity

By Nick Lewis Problem Solve Mar 06, 2014

Why does the 'Bouncer' attack toolkit utilize whitelisting

Expert Nick Lewis explains the logic behind the 'Bouncer' attack toolkit and its seemingly contradictory use of whitelisting security methods. Continue Reading

SearchSecurity

Manage Dec 16, 2014

Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8, Fourth Edition

In this excerpt of Windows Forensic Analysis Toolkit, author Harlan Carvey discusses what Volume Shadow Copies are and how they affect forensic analysis in Windows 8. Continue Reading

SearchCloudStorage

Get Started Jan 29, 2014

Internal cloud toolkit: Ten questions to ask

Marc Staimer provides storage pros 10 questions they should ask and answer in order to implement a successful private cloud. Continue Reading