Searching all of TechTarget| 191,294 results for "useful"

Conversations: Why is SNDTCPSPLF used?

See all conversation search results provided by ITKE.

SearchCloudApplications

By Joel Shore Evaluate Jun 01, 2016

We're using cloud computing for this?

What we can do with technology is limited only by our imaginations. Otherwise, we might still be carrying tape cassettes or CDs. Let's look at how the cloud is being used in ways that some might ... Continue Reading

SearchAWS

By Trevor Jones News Jul 15, 2016

AWS acquisition to attract more developer use

The latest AWS acquisition fills a gap in the developer experience on its platform by potentially folding in IDE tools, as it tries to simplify the experience for customers. Continue Reading

SearchCIO

By Francesca Sales News Jul 01, 2016

Blockchain use cases and how to get going

Blockchain observers talk a lot about the widespread impact the technology will have on various industries, but pinpointing use cases and putting them into action isn't so easy. In July's CIO Decisions, dive... Continue Reading

SearchCIO

By Sue Troy Get Started Jun 07, 2016

Blockchain tech and the consumer use case

Microsoft has been working closely with its large enterprise customers to help them map out blockchain strategies. But, as you might expect, the company is not ignoring blockchain in the consumer ... Continue Reading

SearchCIO

By Jason Sparapani News May 31, 2016

Working with robots: Get used to it

People will be working with robots in the future, said academic Tom Davenport at the recent MIT Sloan CIO Symposium. They should start preparing now. Continue Reading

ComputerWeekly

By Karl Flinders May 26, 2016

Santander uses blockchain for international payments

Bank is using blockchain to underpin its latest app, which enables customers to make international payments 24 hours a day, which clear the next day Continue Reading

SearchSecurity

By Nick Lewis Get Started Jul 22, 2016

How does Locky ransomware use DGA in its attacks?

Locky ransomware has borrowed features from Dridex malware, which focused on attacking banks. Expert Nick Lewis explains Locky's techniques and how to detect it. Continue Reading

SearchVirtualDesktop

Evaluate Jul 22, 2016

Comprehensive guide to using cheap thin clients for VDI

Raspberry Pi devices and Google Chromebooks are among the lowest-cost VDI thin clients, but zero clients and cheap repurposed PCs are viable alternatives. Dive into this guide on cheap thin clients to find out more. Continue Reading

SearchCloudComputing

By David Linthicum Evaluate Jul 19, 2016

Build a cloud redundancy strategy using multiple providers

No cloud platform is perfect; there is always a risk of an outage or data loss. Consider a multicloud model to ensure redundancy and backup. Continue Reading

SearchSolidStateStorage

By Brien Posey Evaluate Jul 18, 2016

Should using flash backup be an option for your organization?

There are many factors -- beyond the obvious ones of cost and performance -- that determine whether you should choose a flash storage backup option. Continue Reading