Standards  >   Network Protocols  >   TCP/IP  >  

UDP/500

RSS Feed    Add to Google    Add to My Yahoo!
UDP/500 White Papers (View All Report Types)
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

The Enterprise Guide to Managed Services
sponsored by Comcast
WHITE PAPER: This white paper invites you to explore several considerations before you go the managed services route. Access now to examine what managed services are, how they work, and who benefits from them.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Comcast

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Building the Next Generation Network Bridge: From Today's Network to the Future
sponsored by F5 Networks
WHITE PAPER: The challenges facing SPs today are not so different from the ones enterprise organizations have faced for years when dealing with IP-based application delivery. This paper discusses how they face these challenges.
Posted: 28 Apr 2008 | Published: 01 Sep 2007

F5 Networks

From Development to Production: Streamlining SharePoint Deployment with DocAve® Deployment Manager
sponsored by AvePoint, Inc.
WHITE PAPER: This document examines the capabilities of DocAve Deployment Manager and offers tips and guidance to help streamline the SharePoint deployment process while maintaining the integrity of all SharePoint staging instances.
Posted: 10 Jun 2009 | Published: 01 Jun 2009

AvePoint, Inc.

Choose Your Next SOA Implementation Step Carefully
sponsored by Seros
WHITE PAPER: This white paper discusses the critical role of an ESB and an open standards-based reference architecture in a successful SOA initiative.
Posted: 25 Jun 2008 | Published: 25 Jun 2008

Seros

Next Generation Firewall Test Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Today's Top DDoS Services Providers
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS Protection market with its Wave Report on DDoS Services Providers. Read the report and learn why Imperva was positioned as a leader in the DDoS service providers space.
Posted: 09 Feb 2016 | Published: 22 Jul 2015

Imperva

Test Report: Breach Detection System
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn how one threat prevention solution fared when it comes to effectiveness, reliability, costs, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Next Generation Intrusion Prevention System (NGIPS) Test Report
sponsored by IBM
WHITE PAPER: This white paper presents the recent test results of IBM's latest NGIPS network security solution.
Posted: 17 Feb 2016 | Published: 02 Dec 2015

IBM

Breaking geographical barriers in government with desktop virtualization
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell, Inc. and Intel®

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell, Inc.
WHITE PAPER: This white paper explains how desktop virtualization can help organizations—specifically government institutions—move application processing from a physical desktop to the data center in order to fulfill the "anywhere, anytime" demands of mobile employees.
Posted: 16 Mar 2016 | Published: 18 Sep 2014

Dell, Inc.

Comprehensive Protection from Today's Evolving Threats
sponsored by IBM
WHITE PAPER: In this white paper, explore 6 areas that organizations need to consider when evaluating intrusion prevention measures.
Posted: 16 Feb 2016 | Published: 31 Mar 2013

IBM

Botnet Research Report
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This research report takes a closer look at botnets that are used to deploy malware, use cases to help you understand what you should expect from your network service providers, and the need for greater levels of partnership and collaboration across the security community to safeguard the Internet more effectively.
Posted: 07 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Top 10 Reasons to Select CA ERwin® Modeling
sponsored by ERwin
WHITE PAPER: This white paper shows you 10 reasons why you should use a data model to manage your multiple data sources.
Posted: 07 Apr 2016 | Published: 01 Mar 2016

ERwin

Today's Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 09 Feb 2016 | Published: 06 Oct 2015

Imperva

How to Measure the Business Benefits of Unified Communications Using SDN
sponsored by Avaya
EGUIDE: In this e-guide, experts unveil what happens within your network when you combine software-defined networking (SDN) with unified communications (UC.) Access now and learn low bandwidth, low latency and low jitter policies that mitigate typical issues surrounding UC traffic. Plus, you'll uncover the state of UC satisfaction today.
Posted: 24 Mar 2016 | Published: 16 Mar 2016

Avaya

Underground Hacker Markets Annual Report: 2016
sponsored by Dell SecureWorks
WHITE PAPER: Find out which underground services are on the rise and what's most valuable in today's current cybercrime economy. Access this resource now to get inside black market information without breaking the law.
Posted: 20 Apr 2016 | Published: 01 Apr 2016

Dell SecureWorks

Build and Maintain Secondary Data Centers with DRaaS
sponsored by Veeam Software
WHITE PAPER: This white paper details how cloud-based DR can overcome the limitations of traditional secondary sites by providing the necessary resources for failover operations – without any capital costs or the burden of designing, deploying and managing the DR site daily. Read on to examine an overview of a cloud-based DR solution.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Veeam Software

Why So Many are Turning to WAN Optimization Software
sponsored by Silver Peak
WHITE PAPER: Access this exclusive resource to learn how virtual WAN optimization combines the benefits of server virtualization – rapid deployment, ease of management and more – with the established performance and cost gains of WAN optimization.
Posted: 04 May 2015 | Published: 24 Oct 2013

Silver Peak

Communications Security: A Blueprint for Enterprise Session Border Controller Deployments
sponsored by Oracle Corporation
WHITE PAPER: Review the common security issues with collaboration technology and learn how UC-specific security, in concert with traditional security tools, can safeguard your data.
Posted: 26 Apr 2016 | Published: 31 Aug 2015

Oracle Corporation

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Consolidating and Protecting Virtualized Enterprise Applications with EMC XtremIO
sponsored by EMC XtremIO
WHITE PAPER: This white paper describes the components, design, functionality, and advantages of hosting a VMware-based, multi-site virtual server infrastructure consisting of consolidated, virtualized enterprise applications on the EMC XtremIO All-Flash array.
Posted: 22 Mar 2016 | Published: 22 Mar 2016

EMC XtremIO

ESG lab report
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this ESG Lab review to learn more about its hands-on testing of the Juniper SRX5400 with a focus on the performance and scalability benefits of the next-generation I/O card (IOC-II) with the new Express Path capability.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

Juniper Networks, Inc.

Conflicker Working Group - Lessons learned from Conflicker
sponsored by ComputerWeekly.com
WHITE PAPER: In November 2008, Conficker A, the first of five variants of the malware, rapidly began infecting computers which had failed to install a Microsoft patch released just weeks earlier. In late December 2008, Conficker B added new mechanisms for distribution including USB storage devices.
Posted: 24 Oct 2011 | Published: 31 Jan 2011

ComputerWeekly.com

A Computer Weekly buyer's guide to desktop computing 2020
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Tablets, smartphones, cloud computing and applications delivered as a service offer compelling new ways to work. In this 11-page buyer's guide, Computer Weekly looks at how this way of working is likely to evolve further over the next five years and how it will affect users and IT departments alike.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

ComputerWeekly.com

IDS Evaluation Guide
sponsored by AlienVault
WHITE PAPER: This white paper provides a useful reference for evaluating IDS tools. In it, you'll learn the critical components of host and network IDS, giving you real-time threat intelligence to quickly respond to threats.
Posted: 04 Apr 2016 | Published: 01 Mar 2016

AlienVault

Next Generation Firewall for Dummies
sponsored by Palo Alto Networks
EBOOK: This eBook provides and in-depth overview of next-gen firewalls.
Posted: 15 Feb 2016 | Published: 27 Jan 2016

Palo Alto Networks

This Year's Best Storage Products: Experts Weigh In
sponsored by SearchStorage.com
EZINE: Storage magazine's February issue looks at the best data storage products of 2015, covering a range of topics from backup hardware to storage market predictions. Access now to learn about hyper-converged packages, software-defined storage, protecting your data with RAID, and more.
Posted: 12 Feb 2016 | Published: 11 Feb 2016

SearchStorage.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement