Standards  >   Network Protocols  >   LAN Protocols  >  

Internetwork Packet Exchange

RSS Feed    Add to Google    Add to My Yahoo!
Internetwork Packet ExchangeReports
 
LAN Fundamentals: Logical Addresses vs. Physical Addresses
sponsored by Global Knowledge
WHITE PAPER: There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion.
Posted: 14 Jun 2013 | Published: 20 May 2013

Global Knowledge

Connectivity is the Key to Improving Patient Information Exchange
sponsored by Kodak
WHITE PAPER: Discover how direct messaging can help create a smooth patient information exchange and improve workflow efficiency.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Kodak

Multiple Country Implementation — Influencing Factors and Approaches
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

ComputerWeekly.com

Defeating Advanced Persistent Threat Malware
sponsored by Infoblox
WHITE PAPER: How can you protect your organization from APT Malware?  Read this whitepaper to learn why a DNS Firewall implementation is a MUST for your organization and how the Infoblox DNS Firewall may be the industry's first true DNS security solution.
Posted: 10 Sep 2013 | Published: 31 Jan 2013

Infoblox

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

Key Considerations for MPLS IP-VPN Success
sponsored by XO Communications
WHITE PAPER: Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!
Posted: 25 May 2012 | Published: 30 Apr 2012

XO Communications

Savvy Network Architects Are Boosting Performance and Lowering the TCO of Campus LANs
sponsored by Brocade
WHITE PAPER: Campus networks are vital to many top initiatives of the modern enterprise. However, to deliver the performance requirements of a campus LAN, new, cost-effective, efficient solutions are needed. In this resource, uncover how a multivendor approach can help you increase network performance while lowering the TCO of campus LANs.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Brocade

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Using Policy Based Routing and Access Control Lists in a Virtualized Network
sponsored by Dell, Inc.
WHITE PAPER: Explore this informative white paper to discover what's involved in configuring and applying PBR, user scenarios and much more.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

Q&A: Getting Customers Ready for the Windows Servers 2003 Deadline
sponsored by Insight
RESOURCE: Microsoft will officially end support for Windows Server 2003 on July 14, 2015. Are you prepared for the deadline? In this blog post, get the answers to the most common questions surrounding end of support.
Posted: 15 Oct 2014 | Published: 17 Sep 2014

Insight

IT in Europe: Next-Generation Network Management Techniques
sponsored by SearchNetworking.co.UK
EZINE: This issue examines how network managers can simplify their management tools gather from the network through the use of protocols like NetFlow and IPFIX and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over virtualized infrastructure, cloud environment and multi-vendor networks.
Posted: 09 Mar 2012 | Published: 08 Mar 2012


Maximizing Business Email Security in Gmail
sponsored by SearchSecurity.com
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

SearchSecurity.com

WAN Speak Musings – Volume II
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

How traditional firewalls fail
sponsored by Dell Software
WHITE PAPER: Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell Software

SuperMassive Series data sheet
sponsored by Dell Software
PRODUCT OVERVIEW: The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

SDN Technologies Primer: Revolution or Evolution in Architecture?
sponsored by SearchSecurity.com
EGUIDE: This e-guide compares the two SDN strategies of centralized control and management of packet forwarding vs. distributed architectures and reviews a new portfolio of SDN products launched in 2013.
Posted: 07 Jun 2013 | Published: 07 Jun 2013

SearchSecurity.com

The Four Elements of OSPF
sponsored by Global Knowledge
WHITE PAPER: This whitepaper explores 4 key elements for the implementation of open shortest path first (OSPF).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

The Four Elements of IS-IS
sponsored by Global Knowledge
WHITE PAPER: This informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

Targeted attacks and how to defend against them
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Next Generation Network Management Techniques
sponsored by SearchSecurity.com
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

Authoritative Guide to Advanced LTE Testing
sponsored by Ixia
WHITE PAPER: Find out how to measure the critical elements of network performance under real-world conditions and extreme scale in order to take the guesswork out of determining network quality.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Ixia

Red Hat Enterprise Linux Desktop Datasheet
sponsored by Red Hat
WHITE PAPER: This whitepaper will help you learn how Red Hat Enterprise Linux provides a cost-effective alternative to proprietary operating systems, making it extremely attractive to those businesses that don't have a bigbudget but still want reliable, secure desktop for their users.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Red Hat

E-Guide: Will Windows Server 2012 Increase Costs for Your IT Shop?
sponsored by Dell and Microsoft
EGUIDE: This expert e-guide breaks down the costs associated with upgrading to Windows Server 2012. Find out how its pricing structure differs from its predecessors and discover key factors to consider if you decide to implement this new operating system.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Dell and Microsoft

CW+: Quocirca Report: Telecoms re-invention – death of the traditional telco
sponsored by ComputerWeekly.com
WHITE PAPER: The communications provider landscape is evolving as the demand for data—in fixed locations and on the move—outstrips the still growing demand for voice communications.
Posted: 24 Oct 2011 | Published: 03 Aug 2010

ComputerWeekly.com

Driving Operational Excellence with Business Analytics
sponsored by IBM
WHITE PAPER: View this resource to learn more about the power of business analytics. Find out how your organization can improve focus on operational excellence and customer opportunity by reading this resource now. It outlines how you can apply a broad range of analytics technologies to managing and improving the decisions of your business.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

IBM

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

Protection for Every Enterprise: How BlackBerry Security Works
sponsored by BlackBerry
WHITE PAPER: This guide explores BlackBerry 10 and their mobile security methods, as well as their criteria for having the most secure mobile operating system.
Posted: 25 Jul 2014 | Published: 18 Jul 2014

BlackBerry

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

Uncovering the Culprits to Blame for Application Performance Problems
sponsored by CA Technologies.
EGUIDE: This guide reviews the network visibility parameters that you will need in order to achieve application visibility, and also explains how application delivery controllers, servers, and applications each add to the application performance analysis puzzle.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement