Discussions

  • machine authentication

    Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials.

    Margaret Rouse3,000 pointsBadges:
  • With Dell Open Networking, choose your own OS, overlay

    The Dell Open Networking story is expanding with a new partnership and reference design that simplifies the use of a Midokura virtual network overlay running on Dell open switches with Cumulus OS.

    rivkalittle1,455 pointsBadges:
  • How to mimic Google’s cloud model in your own environment – Top cloud computing providers: Where are they now?

    Now that you're up-to-date on the successes and missteps of several recognized cloud providers, here's another resource on a cloud model we think you might find helpful. Access this exclusive new resource from SearchCloudComputing.com's editorial team and learn why copycatting Google's cloud model...

    ITKE352,420 pointsBadges:
  • Download this checklist for facility design and IT ops – Top technological trends hitting the data center soon

    Now that you're an expert on the new trends coming to the data center in the near future, check out this downloadable checklist that serves as an invaluable tool for evaluating various hosting or colocation candidates, while also considering new designs for an on-premises data center. Access this...

    SteveBige013,255 pointsBadges:
  • What technological challenges occur with continuous delivery?

    What technological challenges will an Agile team face as they implement continuous delivery? Read this expert answer to find out.

    SearchSoftwareQuality2,130 pointsBadges:
  • Hyper-convergence, vRealize among top terms of 2014

    2014 is coming to a close, but there were plenty of product and technology definitions that stood out this year, including 'vRealize,' 'containers' and more.

    RLanigan250 pointsBadges:
  • bandwidth

    Bandwidth is generally either (1) the amount of data that can be carried from one point to another in a given time period (usually a second)

    ITKE352,420 pointsBadges:
  • Step-by-Step Guide: How to repair Exchange-related IIS virtual directories

    Exchange Server depends on Internet Information Server (IIS) virtual directories for a number of functions related to Outlook Web Access, Outlook Mobile Access and ActiveSync. IIS virtual directories are generally stable, but can become corrupted by inappropriate administrative action. This...

    ITKE352,420 pointsBadges:
  • documentation

    In computer hardware and software product development, documentation is the information that describes the product to its users. It consists of the product technical manuals and online information (including online versions of the technical manuals and help facility descriptions).

    ITKE352,420 pointsBadges:
  • SAP Basis training tutorial

    This guide gives you best practices for SAP Basis administration, shows you pitfalls to avoid and provides Basis troubleshooting advice.

    ITKE352,420 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following