Searching all of TechTarget| 194,418 results for "using"

Conversations: Why is SNDTCPSPLF used?

See all conversation search results provided by ITKE.

SearchUnifiedCommunications

By Tsahi Levent-Levi Evaluate Nov 16, 2016

Why aren't more enterprises using WebRTC?

WebRTC support -- and a lack thereof -- has a major effect on the understanding of the technology. Learn why some aren't using WebRTC and its alternative options. Continue Reading

SearchCloudApplications

By Chris Tozzi Get Started Oct 17, 2016

How and why to use system containers in production

System container platforms, such as OpenVZ and LXD, make it possible to run complete operating systems inside of containers. Expert Christopher Tozzi outlines the options. Continue Reading

SearchServerVirtualization

By Nirmal Sharma Evaluate Nov 03, 2016

The advantages to using Microsoft Azure VNet

Microsoft Azure offers two kinds of virtual networks, one of which allows users to create connected Azure services and VMs to improve production-workload testing. Continue Reading

SearchHealthIT

By Reda Chouffani Evaluate Oct 17, 2016

Four uses for artificial intelligence in healthcare

While there are challenges to AI in healthcare, the potential uses include advanced analytics and bots that help patients schedule appointments or provide medication reminders. Continue Reading

SearchSecurity

By Joseph Granneman Manage Oct 13, 2016

How to use hashcat to address authentication vulnerabilities

Authentication vulnerabilities are a constant problem, but testing tools like hashcat can make a significant difference. Expert Joe Granneman discusses hashcat and password cracking. Continue Reading

SearchHealthIT

By Shaun Sutner News Aug 10, 2016

Dentists and meaningful use

It may be time for dentists to sink their teeth into meaningful use. Dentists, while theoretically eligible for the federal EHR incentive program, have for the most part stayed away because there ... Continue Reading

ComputerWeekly

By Steve Evans Oct 10, 2016

How to add network flexibility by using NFV

Fixed network architectures can no longer cope with today’s networking needs Continue Reading

SearchSecurity

Evaluate Dec 01, 2016

How to use threat intelligence metrics to attain relevant data

Threat intelligence services can be valuable, but enterprises must first determine the right threat intelligence metrics. Char Sample explains the best ways to achieve this. Continue Reading

SearchServerVirtualization

By Ryann Burnett Get Started Dec 01, 2016

Familiarize yourself with Microsoft SCVMM features and uses

With Microsoft SCVMM, you can leverage templates and profiles, deploy a Hyper-V cluster and create a database backup plan, among many other virtual environment management tasks. Continue Reading

ComputerWeekly

By Karl Flinders Nov 30, 2016

Mastercard uses artificial intelligence for transaction approval

Mastercard is using artificial intelligence to reduce the number of transactions that are wrongly declined, while maintaining security Continue Reading