Searching all of TechTarget| 92,174 results for "two"

Conversations: Two levels of private appointments

See all conversation search results provided by ITKE.

SearchCIO

By Niel Nickolaisen Manage Oct 19, 2016

CIO Minute: Two types of mobile apps, two development approaches

In this CIO Minute video segment, CTO Niel Nickolaisen defines two types of mobile apps and discusses the one that CIOs need to take ownership of. Continue Reading

SearchCIO

By Niel Nickolaisen Manage Nov 28, 2016

Crushed by the pace of technology change? Do these two things

Is complexity killing your ability to keep up with the pace of technology change? Niel Nickolaisen offers a path forward. Continue Reading

SearchCloudComputing

By Trevor Jones News Nov 15, 2016

Google cloud consulting service a two-way street

Google received plenty of attention when it reshuffled its various cloud services under one business-friendly umbrella, but tucked within that news was a move that also could pay big dividends down ... Continue Reading

SearchCIO

By Jason Sparapani News Oct 31, 2016

Digitalizing business: The difference two letters can make

Digitizing is not digitalizing, says Gartner's Jan-Martin Lowendahl. The "al" means digital info has been used to create "completely new" business models. Continue Reading

ComputerWeekly

Oct 17, 2016

Bromley signs two-year extension with Liberata

London borough’s contract with Liberata will not end until 2020 as the local authority signs an extension worth up to £22m Continue Reading

SearchMobileComputing

By Craig Mathias Manage Sep 21, 2016

Why mobile two-factor authentication is better than biometrics

Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading

ComputerWeekly

Jul 07, 2016

A tale of two Israeli technology incubators

Computer Weekly looks at two very different technology incubators in Israel Continue Reading

SearchMobileComputing

By Robert Sheldon Evaluate Nov 28, 2016

The Google Authenticator app packs a two-step verification punch

There's a reason two-step verification is everywhere; it's an easy way for IT admins to authorize user accounts. The Google Authenticator app can make it easier to manage single accounts across multiple devices. Continue Reading

ComputerWeekly

By Alex Scroxton Nov 28, 2016

Surrey County Council extends BT PSN contract for two years

Council’s contract for Unicorn network, which provides a fully managed and integrated voice and data communications service, extended to 2021 Continue Reading

ComputerWeekly

By Warwick Ashford Aug 31, 2016

Evidence of DNS tunnelling in two-fifths of business networks

Cyber criminals are capitalising on the failure of many businesses to examine their DNS traffic for malware insertion and data exfiltration, according to Infoblox Continue Reading