Standards  >   Network Protocols  >   TCP/IP  >  

UDP Port 500

RSS Feed    Add to Google    Add to My Yahoo!
UDP Port 500White Papers (View All Report Types)
 
The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Achieving SaaS Security with Connected® Online PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

Iron Mountain

Going Serverless at the Branch Office: Using WAN Optimization to Solve the Server Consolidation Challenge
sponsored by Expand Networks
WHITE PAPER: The Expand Accelerator is a standards-based, tightly integrated, multi-service platform that delivers a complete application acceleration solution.
Posted: 16 Jun 2008 | Published: 01 Jun 2008

Expand Networks

Building the Next Generation Network Bridge: From Today's Network to the Future
sponsored by F5 Networks
WHITE PAPER: The challenges facing SPs today are not so different from the ones enterprise organizations have faced for years when dealing with IP-based application delivery. This paper discusses how they face these challenges.
Posted: 28 Apr 2008 | Published: 01 Sep 2007

F5 Networks

VOIP Infrastructure for the Evolving Enterprise: How to Control Costs, Mitigate Risk, and Ensure Service Levels in an Ever-Changing Network Environment
sponsored by NET Quintum
WHITE PAPER: There are significant differences in VoIP hardware functionality that affect the cost, risk and consumption of staff resources. This white paper outlines what to consider when selecting a VoIP gateway/switching solutio
Posted: 05 Jun 2008 | Published: 01 Mar 2008

NET Quintum

Ten Top Problems Network Techs Encounter
sponsored by Fluke Networks
WHITE PAPER: This whitepaper discusses ten common problems encountered by network technicians today and their symptoms, causes, and resolutions.
Posted: 27 Jan 2010 | Published: 01 Jul 2009

Fluke Networks

ITIL Version 3.0 -- What It Means to You
sponsored by Global Knowledge
WHITE PAPER: As the IT industry standardizes its operations to solve business problems in the most efficient, effective, economical, and equitable way, ITIL v3 becomes a critical tool.
Posted: 06 Jul 2006 | Published: 01 Jul 2006

Global Knowledge

Cisco Desktop Virtualization Solutions for EMC VSPEX with VMware View 5.1.2 for 500 Desktops
sponsored by Cisco Systems, Inc.
WHITE PAPER: This document evaluates the scalability of a VMware View 5.1.2 environment, utilizing View Linked Clones, on managed Cisco UCS C-Series C220 M3 Rack-Mount Servers running VMware ESXi 5.1 hypervisor software connected to an EMC VNX5300 Storage Array.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Cisco Systems, Inc.

Dell Compellent Storage Center 6.5 SC4020 4,500 Mailbox Exchange 2013 Resiliency Storage Solution
sponsored by Dell, Inc.
WHITE PAPER: The following document provides an expert evaluation, test results, and information on Dell Compellent's storage solution for Microsoft Exchange Server. Read on to gain access to tangible results and potentially what this solution can do for your business as well including an improved unified interface, hardware design, and more.
Posted: 31 Oct 2014 | Published: 31 Oct 2014

Dell, Inc.

Authoritative Guide to Advanced LTE Testing
sponsored by Ixia
WHITE PAPER: Find out how to measure the critical elements of network performance under real-world conditions and extreme scale in order to take the guesswork out of determining network quality.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Ixia

Achieve Enterprise-wide Network Visibility with Monitoring Tool
sponsored by LogRhythm, Inc.
PRODUCT LITERATURE: True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. The LogRhythm Network Monitor provides both application level awareness and rich network session details, delivering enterprise-wide network visibility. View this datasheet to learn more about this network monitoring tool.
Posted: 25 Jul 2014 | Published: 31 Mar 2014

LogRhythm, Inc.

Demystifying Switch-based ACLs
sponsored by Global Knowledge
WHITE PAPER: This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more!
Posted: 14 Feb 2013 | Published: 14 Feb 2013

Global Knowledge

Basics of Switching
sponsored by Global Knowledge
WHITE PAPER: A switch is a Layer 2 network device that forwards Ethernet frames based on the destination media access control (MAC) address. A switch has RJ-45 ports for connection and the intelligence to read MAC addresses to make forwarding decisions. The purpose of the switch is to quickly and accurately forward frames toward the destination.
Posted: 05 Sep 2013 | Published: 28 Jun 2013

Global Knowledge

CW+: Mobile Games: App store strategies, business models and forecasts
sponsored by ComputerWeekly.com
WHITE PAPER: The last two years have been, without a doubt a renaissance era, in mobile games. Driven by the iconic iPhone and its complementing App Store, developers great and small are reaping the rewards of heightened interest in the platform.
Posted: 21 Oct 2011 | Published: 05 Feb 2011

ComputerWeekly.com

Using MLAG in Dell Networks: Deployment Guide for Dell Networking Switches
sponsored by Dell, Inc.
WHITE PAPER: Access this exclusive white paper to discover all the ins-and-outs of MLAG technology, how they are used and recommendations on how to implement MLAG into your own network.
Posted: 04 Mar 2014 | Published: 31 Jan 2014

Dell, Inc.

Unix-to-Linux Migration
sponsored by SearchDataCenter.com
EGUIDE: Get a step-by-step approach for data center managers that covers everything from making the business case to getting the best training. Sections in this IT Handbook include training staff to manage linux environments and much more.
Posted: 29 Mar 2011 | Published: 29 Mar 2011

SearchDataCenter.com

Achieve Network Visibility and Control with Firewall Traffic Classification
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies.
Posted: 24 Jan 2014 | Published: 21 Mar 2014

Palo Alto Networks

2014 Egon Zehnder European Board Diversity Analysis
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For the first time Europe now leads the world in board diversity – though numbers of female executives on boards remain stubbornly low and this is a particular issue in technology, this study reveals.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Network security is being redefined to better block data raiders
sponsored by ComputerWeekly.com
WHITE PAPER: This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.
Posted: 21 Oct 2011 | Published: 26 Jan 2011

ComputerWeekly.com

Putting Network Security Into Context
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SearchNetworking.com

Head to Head Comparison: Two Top Backup Solutions Face Off
sponsored by arcserve
WHITE PAPER: This white paper compares two backup/data recovery tools. It shows how each performs on a number of different areas including performance, costs, ease of use and more.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

arcserve

Protect Your Organization from DDoS Malware
sponsored by Verisign, Inc.
WHITE PAPER: Check out this valuable whitepaper now to learn about five specific types of DDoS attacks, how they work, what you can do to prevent them, and much more.
Posted: 28 Oct 2014 | Published: 09 Oct 2013

Verisign, Inc.

NSA Series data sheet
sponsored by Dell Software
WHITE PAPER: Now your organization can be both secure and productive without compromising network performance. The Dell™ SonicWALL™ Network Security Appliance (NSA) Series is the one of the most secure, highest performing next-generation firewall lines.
Posted: 23 Aug 2013 | Published: 30 Jun 2013

Dell Software

Predicting Attack Paths Within Your Networks
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how one company's advanced security solutions can be leveraged to identify systems within your networks that are vulnerable to exploitation.
Posted: 12 Nov 2014 | Published: 23 Oct 2014

Tenable Network Security

Next generation firewall product analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This resource contains a product analysis of a next generation firewall (NGFW) that discusses security, performance, TCO and several other categories that are not available anywhere else.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Fortinet, Inc.

Next-Generation Firewall Product Analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper offers a detailed performance report on one next-generation firewall solution.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Fortinet, Inc.

NSS Labs Next-Gen Firewall Product Analysis Report
sponsored by Dell Software
WHITE PAPER: Learn why a Dell SonicWALL next-gen firewall earned the "Recommended" rating from NSS Labs for the third consecutive year in one of the industry's most comprehensive, real-world tests of firewalls, and how it earned a top score for security effectiveness.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell Software

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Check the network before moving to the cloud
sponsored by SearchSecurity.com
EGUIDE: Before considering a move to the cloud, it’s important to ensure that your network is free of vulnerabilities that could put your data at risk. This expert resource offers tips on how to make sure your network is secure before extending the network infrastructure. View now to uncover key processes and tools to help detect configuration mistakes.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

SearchSecurity.com

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement