Standards  >   Network Protocols  >   LAN Protocols  >  

Internetwork Packet Exchange

RSS Feed    Add to Google    Add to My Yahoo!
Internetwork Packet ExchangeReports
 
LAN Fundamentals: Logical Addresses vs. Physical Addresses
sponsored by Global Knowledge
WHITE PAPER: There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion.
Posted: 14 Jun 2013 | Published: 20 May 2013

Global Knowledge

TOGAF® and SABSA® Integration
sponsored by ComputerWeekly.com
IT BRIEFING: This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.
Posted: 05 Jan 2012 | Published: 11 Oct 2011

ComputerWeekly.com

Demystifying Industry Standards
sponsored by IBM
EBOOK: Access the following e-book to learn how industry standards are affecting the way businesses work, how to alleviate many of the complexities associated with them, and how to successfully tackle the initiative as a whole.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

IBM

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

What Enterprises Should Do About IPv6 in 2011
sponsored by Cisco Systems, Inc.
WHITE PAPER: The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

Going Serverless at the Branch Office: Using WAN Optimization to Solve the Server Consolidation Challenge
sponsored by Expand Networks
WHITE PAPER: The Expand Accelerator is a standards-based, tightly integrated, multi-service platform that delivers a complete application acceleration solution.
Posted: 16 Jun 2008 | Published: 01 Jun 2008

Expand Networks

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

Motorola's Wireless Broadband Indoor/Outdoor Solution
sponsored by Motorola, Inc.
WHITE PAPER: With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution.
Posted: 28 Apr 2009 | Published: 02 Apr 2009

Motorola, Inc.

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Using Policy Based Routing and Access Control Lists in a Virtualized Network
sponsored by Dell, Inc.
WHITE PAPER: Explore this informative white paper to discover what's involved in configuring and applying PBR, user scenarios and much more.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

IT in Europe: Next-Generation Network Management Techniques
sponsored by SearchNetworking.co.UK
EZINE: This issue examines how network managers can simplify their management tools gather from the network through the use of protocols like NetFlow and IPFIX and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over virtualized infrastructure, cloud environment and multi-vendor networks.
Posted: 09 Mar 2012 | Published: 08 Mar 2012


Maximizing Business Email Security in Gmail
sponsored by SearchSecurity.com
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

SearchSecurity.com

WAN Speak Musings – Volume II
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

How traditional firewalls fail
sponsored by Dell Software
WHITE PAPER: Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell Software

SuperMassive Series data sheet
sponsored by Dell Software
PRODUCT OVERVIEW: The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

SDN Technologies Primer: Revolution or Evolution in Architecture?
sponsored by SearchSecurity.com
EGUIDE: This e-guide compares the two SDN strategies of centralized control and management of packet forwarding vs. distributed architectures and reviews a new portfolio of SDN products launched in 2013.
Posted: 07 Jun 2013 | Published: 07 Jun 2013

SearchSecurity.com

Computer Weekly – 18 November 2014: Cloud providers are coming to Europe
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, more cloud providers are building datacentres in Europe in response to data protection concerns – we examine the latest developments. Microsoft is embracing the cloud and decoupling Office from Windows – we look at the implications for corporate IT. And we analyse the rise of desktop as a service. Read the issue now.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

ComputerWeekly.com

The Four Elements of OSPF
sponsored by Global Knowledge
WHITE PAPER: This whitepaper explores 4 key elements for the implementation of open shortest path first (OSPF).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

The Four Elements of IS-IS
sponsored by Global Knowledge
WHITE PAPER: This informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

Targeted attacks and how to defend against them
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Next Generation Network Management Techniques
sponsored by SearchSecurity.com
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

Authoritative Guide to Advanced LTE Testing
sponsored by Ixia
WHITE PAPER: Find out how to measure the critical elements of network performance under real-world conditions and extreme scale in order to take the guesswork out of determining network quality.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Ixia

Building Trust and Compliance in the Cloud with Intel® Trusted Execution Technology
sponsored by Intel Corporation
WHITE PAPER: This white paper explores how Intel helped the Taiwan Stock Exchange Corporation to build a more secure foundation for its sensitive cloud workloads.
Posted: 17 Nov 2014 | Published: 31 Dec 2013

Intel Corporation

Red Hat Enterprise Linux Desktop Datasheet
sponsored by Red Hat
WHITE PAPER: This whitepaper will help you learn how Red Hat Enterprise Linux provides a cost-effective alternative to proprietary operating systems, making it extremely attractive to those businesses that don't have a bigbudget but still want reliable, secure desktop for their users.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Red Hat

E-Guide: Will Windows Server 2012 Increase Costs for Your IT Shop?
sponsored by Dell and Microsoft
EGUIDE: This expert e-guide breaks down the costs associated with upgrading to Windows Server 2012. Find out how its pricing structure differs from its predecessors and discover key factors to consider if you decide to implement this new operating system.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Dell and Microsoft

CW+: Quocirca Report: Telecoms re-invention – death of the traditional telco
sponsored by ComputerWeekly.com
WHITE PAPER: The communications provider landscape is evolving as the demand for data—in fixed locations and on the move—outstrips the still growing demand for voice communications.
Posted: 24 Oct 2011 | Published: 03 Aug 2010

ComputerWeekly.com

Driving Operational Excellence with Business Analytics
sponsored by IBM
WHITE PAPER: View this resource to learn more about the power of business analytics. Find out how your organization can improve focus on operational excellence and customer opportunity by reading this resource now. It outlines how you can apply a broad range of analytics technologies to managing and improving the decisions of your business.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

IBM

Protection for Every Enterprise: How BlackBerry Security Works
sponsored by BlackBerry
WHITE PAPER: This guide explores BlackBerry 10 and their mobile security methods, as well as their criteria for having the most secure mobile operating system.
Posted: 25 Jul 2014 | Published: 18 Jul 2014

BlackBerry

Computer Weekly – 11 November 2014: Migrating away from Windows Server 2003
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as Microsoft prepares to end support for the popular Windows Server 2003 operating system, we assess the risks. We hear from IT leaders delivering benefits from enterprise social media use to improve staff collaboration. And we look at criticisms from Oracle users about software licensing. Read the issue now.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

ComputerWeekly.com

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement