• HP jump-starts sleepy software biz with CIO dashboard

    HP’s new IT Executive Scorecard dashboard is targeted at CIOs and their C-level peers in an attempt to revive the company’s IT Performance Management portfolio.

    Alex Barrett3,400 pointsBadges:
  • What does the Nvidia, VMware and Google partnership mean for VDI?

    Nvidia, VMware and Google have teamed up to deliver quality graphics on low-cost Chromebooks. Though the devices' enterprise readiness has been questioned in the past, this collaboration could garner a double take.

    mjones1675 pointsBadges:
  • Microsoft challenges VMware vCloud Director with SCVMM 2012

    Microsoft's System Center Virtual Machine Manager 2012 could take on VMware's vCloud Director and its private cloud computing management vision.

    Beth Pariseau7,195 pointsBadges:
  • VMware pros boot ESXi off USB flash drives

    Installing ESXi on memory-based thumb drives and SD cards has gained steam among forward-looking VMware administrators.

    Alex Barrett3,400 pointsBadges:
  • USB thumb drive security best practices spelled out by NIST

    The National Institute of Standards and Technology's own policies and technical requirements on USB thumb drive security furnish other federal agencies with a de facto set of best practices.

    ITKE345,300 pointsBadges:
  • What do you wish you’d put into your internal or external SLAs?

    CLongbottom235 pointsBadges:
  • Set accurate service-level agreement metrics

    SLAs do no good collecting dust in an office drawer, nor are penalties effective. Make sure your SLA fits with the business' present and future needs.

    CLongbottom235 pointsBadges:
  • Windows registry forensics: Investigating system-wide settings

    Information security forensic investigations can be a big job, but Windows registry command tools can make it easier. From querying autostart programs to getting the goods on every USB device ever connected to a particular Windows machine, these tools can streamline an investigation. Ed Skoudis...

    searchsecurity20,935 pointsBadges:
  • Web browser extension security: Mitigating browser plug-in threats

    Application security expert Michael Cobb discusses the risks of Web browser extensions and what enterprises can do to counter browse plug-in threats.

    searchsecurity20,935 pointsBadges:
  • Basic elements of Microsoft network virtualization

    Microsoft network virtualization may not get the same market mindshare as the competition, but you can pull off a software-driven, multi-tenant network for the cloud using Hyper-V and Systems Center 2012.

    Brien Posey9,405 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.