Standards  >   Network Protocols  >   TCP/IP  >  

UDP 500

RSS Feed    Add to Google    Add to My Yahoo!
UDP 500 White Papers (View All Report Types)
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Architecting a Better Network Storage Solution
sponsored by BlueArc Corp.
WHITE PAPER: BlueArc's Titan Architecture is a revolutionary step in file servers with its hardware-based file system. This paper explains the details of the architecture to better understand the unique hardware-accelerated design and the object based file system.
Posted: 10 Mar 2008 | Published: 01 Jan 2007

BlueArc Corp.

IFRS in the Life Sciences: Broad implications
sponsored by Deloitte
WHITE PAPER: This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

PACs for Industrial Control, the Future of Control
sponsored by National Instruments
WHITE PAPER: This white paper explores the origins of the Programmable Automation Controllers (PAC), how PACs differ from Programmable Logic Controllers (PLC) and PCs, and the future direction of industrial control with PACs.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

VOIP Infrastructure for the Evolving Enterprise: How to Control Costs, Mitigate Risk, and Ensure Service Levels in an Ever-Changing Network Environment
sponsored by NET Quintum
WHITE PAPER: There are significant differences in VoIP hardware functionality that affect the cost, risk and consumption of staff resources. This white paper outlines what to consider when selecting a VoIP gateway/switching solutio
Posted: 05 Jun 2008 | Published: 01 Mar 2008

NET Quintum

Next Generation Firewall Test Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Today's Top DDoS Services Providers
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS Protection market with its Wave Report on DDoS Services Providers. Read the report and learn why Imperva was positioned as a leader in the DDoS service providers space.
Posted: 09 Feb 2016 | Published: 22 Jul 2015

Imperva

Test Report: Breach Detection System
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn how one threat prevention solution fared when it comes to effectiveness, reliability, costs, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Next Generation Intrusion Prevention System (NGIPS) Test Report
sponsored by IBM
WHITE PAPER: This white paper presents the recent test results of IBM's latest NGIPS network security solution.
Posted: 17 Feb 2016 | Published: 02 Dec 2015

IBM

Breaking geographical barriers in government with desktop virtualization
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell, Inc. and Intel®

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell, Inc.
WHITE PAPER: This white paper explains how desktop virtualization can help organizations—specifically government institutions—move application processing from a physical desktop to the data center in order to fulfill the "anywhere, anytime" demands of mobile employees.
Posted: 16 Mar 2016 | Published: 18 Sep 2014

Dell, Inc.

Comprehensive Protection from Today's Evolving Threats
sponsored by IBM
WHITE PAPER: In this white paper, explore 6 areas that organizations need to consider when evaluating intrusion prevention measures.
Posted: 16 Feb 2016 | Published: 31 Mar 2013

IBM

Top 10 Reasons to Select CA ERwin® Modeling
sponsored by ERwin
WHITE PAPER: This white paper shows you 10 reasons why you should use a data model to manage your multiple data sources.
Posted: 07 Apr 2016 | Published: 01 Mar 2016

ERwin

Today's Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 09 Feb 2016 | Published: 06 Oct 2015

Imperva

Underground Hacker Markets Annual Report: 2016
sponsored by Dell SecureWorks
WHITE PAPER: Find out which underground services are on the rise and what's most valuable in today's current cybercrime economy. Access this resource now to get inside black market information without breaking the law.
Posted: 20 Apr 2016 | Published: 01 Apr 2016

Dell SecureWorks

Build and Maintain Secondary Data Centers with DRaaS
sponsored by Veeam Software
WHITE PAPER: This white paper details how cloud-based DR can overcome the limitations of traditional secondary sites by providing the necessary resources for failover operations – without any capital costs or the burden of designing, deploying and managing the DR site daily. Read on to examine an overview of a cloud-based DR solution.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Veeam Software

Why So Many are Turning to WAN Optimization Software
sponsored by Silver Peak
WHITE PAPER: Access this exclusive resource to learn how virtual WAN optimization combines the benefits of server virtualization – rapid deployment, ease of management and more – with the established performance and cost gains of WAN optimization.
Posted: 04 May 2015 | Published: 24 Oct 2013

Silver Peak

Communications Security: A Blueprint for Enterprise Session Border Controller Deployments
sponsored by Oracle Corporation
WHITE PAPER: Review the common security issues with collaboration technology and learn how UC-specific security, in concert with traditional security tools, can safeguard your data.
Posted: 26 Apr 2016 | Published: 31 Aug 2015

Oracle Corporation

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Consolidating and Protecting Virtualized Enterprise Applications with EMC XtremIO
sponsored by EMC XtremIO
WHITE PAPER: This white paper describes the components, design, functionality, and advantages of hosting a VMware-based, multi-site virtual server infrastructure consisting of consolidated, virtualized enterprise applications on the EMC XtremIO All-Flash array.
Posted: 22 Mar 2016 | Published: 22 Mar 2016

EMC XtremIO

ESG lab report
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this ESG Lab review to learn more about its hands-on testing of the Juniper SRX5400 with a focus on the performance and scalability benefits of the next-generation I/O card (IOC-II) with the new Express Path capability.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

Juniper Networks, Inc.

Conflicker Working Group - Lessons learned from Conflicker
sponsored by ComputerWeekly.com
WHITE PAPER: In November 2008, Conficker A, the first of five variants of the malware, rapidly began infecting computers which had failed to install a Microsoft patch released just weeks earlier. In late December 2008, Conficker B added new mechanisms for distribution including USB storage devices.
Posted: 24 Oct 2011 | Published: 31 Jan 2011

ComputerWeekly.com

A Computer Weekly buyer's guide to desktop computing 2020
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Tablets, smartphones, cloud computing and applications delivered as a service offer compelling new ways to work. In this 11-page buyer's guide, Computer Weekly looks at how this way of working is likely to evolve further over the next five years and how it will affect users and IT departments alike.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

ComputerWeekly.com

IDS Evaluation Guide
sponsored by AlienVault
WHITE PAPER: This white paper provides a useful reference for evaluating IDS tools. In it, you'll learn the critical components of host and network IDS, giving you real-time threat intelligence to quickly respond to threats.
Posted: 04 Apr 2016 | Published: 01 Mar 2016

AlienVault

Next Generation Firewall for Dummies
sponsored by Palo Alto Networks
EBOOK: This eBook provides and in-depth overview of next-gen firewalls.
Posted: 15 Feb 2016 | Published: 27 Jan 2016

Palo Alto Networks

This Year's Best Storage Products: Experts Weigh In
sponsored by SearchStorage.com
EZINE: Storage magazine's February issue looks at the best data storage products of 2015, covering a range of topics from backup hardware to storage market predictions. Access now to learn about hyper-converged packages, software-defined storage, protecting your data with RAID, and more.
Posted: 12 Feb 2016 | Published: 11 Feb 2016

SearchStorage.com

Big Data Beyond the Hype: A Guide to Conversations for Today’s Data Center
sponsored by IBM
RESOURCE: Expand your knowledge on big data with conversations from today's experts on the data center.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

IBM

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement