Searching all of TechTarget| 177,333 results for "using"

Conversations: Why is SNDTCPSPLF used?

See all conversation search results provided by ITKE.


By Ed Tittel Evaluate Jan 18, 2016

The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and implementing virtual private network (VPN) clients in the enterprise. Continue Reading


By Stephen J. Bigelow ,Meredith Courtemanche ,Dan Sullivan Evaluate Jan 15, 2016

Evaluating the uses for converged infrastructure

Now that we have significant exposure to converged infrastructure and hyper-converged products, more is known about how -- and where -- these products work best. This three-part guide looks at potential uses for ... Continue Reading

Stay Safe From Attacks

Sponsored Dec 11, 2015

How to Use a Threat Intelligence Service

The is a new breed of threat intelligence services but how can enterprise security teams use these capabilities to detect and mitigate targeted threats? Continue Reading


By Cameron McKenzie Get Started Jan 29, 2016

How to use Java conditional statements effectively

Our first tutorial on learning Java left room for improvement. Here are ways to use Java's if, else and switch statements more effectively. Continue Reading


By Eamon McCarthy Earls News Nov 19, 2015

When to use a packet capture appliance

This week, analysts explore best cases for packet capture appliance use, network automation and "worst practices" in network security. Continue Reading


By Eddie Lockhart Manage Nov 13, 2015


By Brad Irby Manage Oct 27, 2015

Why should I use a build server?

Because apps can be built on a developer's local machine, some question the usefulness of a build server. However, Brad Irby points out that they provide some distinct advantages. Continue Reading


By David Turbide Evaluate Dec 16, 2015

Why aren't more companies using RFID for inventory tracking?

Radio frequency identification tags have a number of benefits over the bar code, but the latter continues to be the go-to for manufacturers. Here's a look at the reasons for that. Continue Reading


By Tom Nolle Evaluate Feb 09, 2016

Containers vs. VMs: Which should you use for cloud?

Before going all in with containers, it's critical to understand how the technology differs from VMs in terms of private, public and hybrid cloud deployment. Continue Reading

Better Info Governance

Sponsored Dec 04, 2015

Using Information Governance to Mitigate Risk

As greater challenges emerge in today’s data-centric business environment, organizations are placing more emphasis than ever upon risk mitigation. Not only are IT executives looking for ways to reduce their ... Continue Reading