Standards  >   Network Protocols  >   Routing Protocols  >  

Border Gateway Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Border Gateway ProtocolWhite Papers (View All Report Types)
 
Simplify Your Route to the Internet: Three Advantages of Using LISP
sponsored by Global Knowledge
WHITE PAPER: Uncover the ins and outs of the Location ID separation protocol (LISP): what it is, how it works, how it compares to BGP, and the top three advantages it provides. View now to get help deciding if this protocol can truly help simplify the route to the internet in your organization.
Posted: 29 Jan 2013 | Published: 29 Jan 2013

Global Knowledge

Enabling Carrier-class Communications with EX Switches
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains why a high-performance, highly available and secure network is essential for supporting a wide array of traffic types and a diverse user community.
Posted: 21 Oct 2008 | Published: 21 Oct 2008

Juniper Networks, Inc.

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

Demystifying VLAN Trunk Protocol
sponsored by Global Knowledge
WHITE PAPER: This detailed white paper will help you uncover the truth about the often-misunderstood Virtual Local Area Network (VLAN) Trunk Protocol, or VTP. Discover an in-depth overview of how VTP works and see how you can overcome VTP challenges to minimize network outages and more – read on to get started.
Posted: 10 Jan 2013 | Published: 31 Dec 2012

Global Knowledge

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

From Cold to Hot: Lead Nurturing Programs That Generate Sales
sponsored by Vtrenz, Inc
WHITE PAPER: This white paper explains the importance of lead nurturing–in the lead management process. It discusses best practices for nurturing leads in today's competitive business environment, and offers advice for implementing a lead-nurturing program.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Vtrenz, Inc

Wireless LANs Standards: Where Are We Now?
sponsored by Burton Group
WHITE PAPER: Not all standards are created equal. Some are technically elegant but achieve little market adoption. Others are broadly deployed.
Posted: 18 Jul 2008 | Published: 13 Nov 2006

Burton Group

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

Unified Physical Infrastructure (UPI) Strategies for Thermal Management
sponsored by Panduit
WHITE PAPER: This white paper demonstrates how air sealing grommets can be used to close raised floor cutout spaces and improve data center cooling efficiency. Solutions that achieve the highest level of sealing effectiveness support network uptime goals by contributing to maximum cooling efficiency and providing superior cable management.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Panduit

Cisco Service Provider Next Generation Networks
sponsored by Global Knowledge
WHITE PAPER: In this white paper discover how the Cisco Service Provider Next Generation Networks (IP NGN) works and how service providers are benefiting from this technology. Explore examples of configurations for different platforms and contrast the differences in the types of operating systems.
Posted: 22 Feb 2012 | Published: 22 Aug 2012

Global Knowledge

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

The Four Elements of EIGRP
sponsored by Global Knowledge
WHITE PAPER: EIGRP has been used successfully for many years by enterprises of all sizes, using mostly Cisco devices. It converges as fast as any other internal gateway protocol and provides features that facilitate design, implementation, and troubleshooting. Download this resource to learn more.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

The 10-Minute Guide to Cloud Encryption Gateways
sponsored by CipherCloud
WHITE PAPER: Learn about the innovative solutions that have been developed to address the security concerns regarding business applications in the cloud.
Posted: 03 Sep 2014 | Published: 31 Dec 2013

CipherCloud

Not All SOA Gateways Are Created Equal
sponsored by CA Technologies.
WHITE PAPER: Most service-oriented architecture (SOA) gateways offer similar functionality: they address security and performance issues that arise when using XML-based messaging protocols. However, not all SOA gateways are created equal, as the total cost of ownership (TCO) can vary greatly.
Posted: 06 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Technical guide on Web Security Gateways
sponsored by SearchSecurity.com
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

SearchSecurity.com

A Closer Look at Scale-Out NAS and Object Storage
sponsored by SwiftStack
EGUIDE: In this expert e-guide, examine these three NAS technologies to help you decide which is best for your file storage needs. Additionally, learn what using an object storage system over a traditional array can provide such as scalability and flexibility.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SwiftStack

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies

Secure Web Gateway Overview: Implementation Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!
Posted: 10 May 2013 | Published: 10 May 2013

SearchSecurity.com

SwiftStack Filesystem Gateway Architecture
sponsored by SwiftStack
WHITE PAPER: Access this white paper to find out about a storage solution that exposes object-stored data as SMB/CIFS or NFS files to file-based applications creating a unified storage system capable of active archiving, disaster recovery, content distribution, and management and migration services.
Posted: 16 Sep 2014 | Published: 31 Aug 2014

SwiftStack

Cisco Unified Communication Manager - Digit Manipulation
sponsored by Global Knowledge
WHITE PAPER: Review why we would need to modify either the calling-party or called-party number, or both, to accommodate the various dial-plans that a phone call might encounter. We will also reviewed the tools available to us, as well as the various locations the modifications can be performed.
Posted: 18 Jun 2013 | Published: 02 May 2013

Global Knowledge

The Four Elements of EIGRP
sponsored by Global Knowledge
WHITE PAPER: EIGRP has been used successfully for many years by enterprises of all sizes, using mostly Cisco devices. It converges as fast as any other internal gateway protocol and provides features that facilitate design, implementation, and troubleshooting. Download this resource to learn more.
Posted: 24 Jan 2014 | Published: 21 Feb 2014

Global Knowledge

Cisco Unified Communications Manager
sponsored by Global Knowledge
WHITE PAPER: Unified Communications has gained status as a widely adopted way of communicating. This technology brings an incredible feature set to even smaller business entities. For most companies, the Cisco Communications Manager Express, or CUCM, can enable comprehensive voice communications with a wealth of advanced features.
Posted: 18 Jun 2013 | Published: 28 May 2013

Global Knowledge

Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

SearchSecurity.com

Secure internet routing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

CW+ Quocirca report: Reaping the benefits of IP geolocation
sponsored by ComputerWeekly.com
WHITE PAPER: As more and more human activity moves online, it is easy to think that geography no longer matters—surely the internet is without borders? Whilst in some cases this is true, more often than not online activity spills over into the real world.
Posted: 21 Oct 2011 | Published: 29 Sep 2010

ComputerWeekly.com

SIP trunking services close cost gaps around mobility
sponsored by Cox Communications, Inc.
EGUIDE: Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Cox Communications, Inc.

The BMC and IPMI Vulnerabilities
sponsored by Avocent
WHITE PAPER: Recent analyst studies have shown that there are potential security flaws in BMCs, also known as service processors, and the Intelligent Platform Management Interface protocol. Read this whitepaper to learn how you can contain the risk.
Posted: 13 May 2014 | Published: 31 Dec 2013

Avocent

Cox Metro Ethernet Services
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper introduces two network solutions, ELAN and MPLS IP-VPN, and helps you to discover which is better suited for your enterprise's networking needs.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Cox Communications, Inc.

New UC Threats Leaving Your UC Platform Vulnerable
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores three emerging security threats that can leave your UC platform extremely vulnerability to security issues.
Posted: 21 May 2012 | Published: 18 May 2012

SearchSecurity.com

Foundational Focus: OSI Model - Breaking Down the 7 Layers
sponsored by Global Knowledge
WHITE PAPER: The OSI model is a conceptual tool used to discuss and describe network functions. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
Posted: 07 May 2013 | Published: 12 Apr 2013

Global Knowledge

The Swiss Army Knife for the Network Analyst
sponsored by Riverbed Technology, Inc.
CASE STUDY: This exclusive case study covers a tool that helped one company with their network and protocol analysis.
Posted: 31 Jul 2014 | Published: 03 Aug 2013

Riverbed Technology, Inc.

Taking a look at Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Gigamon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement