Standards  >   File Transfer Protocols  >  

Kermit

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Kermit is a popular file transfer and management protocol and suite of communications software programs with advantages over existing Internet protocols such as File Transfer Protocol and Telnet. It is freeware, developed and maintained by members of the Kermit Project at Columbia University. (However, you're invited to purchase shrink-wrapped versions and/or the manuals to help support the project.)  … 
Definition continues below.
Kermit Reports
101 - 125 of 143 Matches Previous Page  |  Next Page
Security Throughout the File Transfer Life-Cycle: A Managed File Transfer Imperative
sponsored by Ipswitch File Transfer
WHITE PAPER: Check out this informative white paper that highlights a new approach to secure your file transfers, and details the specific features included in a MFT system.
Posted: 16 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

SOA Reference Architecture
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Download the Open Group Service-Oriented Architecture reference architecture.
Posted: 17 Jan 2012 | Published: 17 Jan 2012

ComputerWeekly.com

Stagnate or Automate: How to Make the Right File Transfer Choices
sponsored by Ipswitch File Transfer
WHITE PAPER: In this white paper, discover the dilemma between stagnating or automating technologies, and which one is better for handling file transfers.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Stagnate or Automate; How to make the right File Transfer Choices
sponsored by Ipswitch File Transfer
WHITE PAPER: This white paper highlights several tips for combatting file transfer challenges, and why automation is the way to go.
Posted: 15 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

The Banking Industry Architecture Network and TOGAF
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

The Definitive Guide to Managed File Transfer
sponsored by Ipswitch File Transfer
WHITE PAPER: View this resource to gain a better understanding of what managed file transfer (MFT) is all about, including its importance in our high tech world that we live in today.
Posted: 15 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

The Definitive Guide to Managed File Transfer: Attaining Automation, Security, Control & Compliance
sponsored by Ipswitch File Transfer
WHITE PAPER: This white paper explains the story behind MFT, and reveals how important it is in today's data-driven, security-conscious, and compliance-intensive environment.
Posted: 10 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements
sponsored by Axway
WHITE PAPER: This report divulges the results of a recent survey of executive-level IT buyers around the world regarding their ability to govern the flow of their enterprise data.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

Axway

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Sharepoint WAN Optimization And WAFS
sponsored by Peer Software
WHITE PAPER: Design teams across the world collaborate to create and develop prod­ucts. Unfortunately, IT organizations face serious challenges when collaborative teams share large files. This white paper will assess the strengths and weaknesses of the four technologies most commonly used to enhance file sharing for distributed teams.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Peer Software

Sharing Security Intelligence: How to Build a Strong Network
sponsored by Hexis Cyber Solutions Inc
EGUIDE: This expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Solution Brief: Accelerating File Services Across the WAN
sponsored by BlueCoat
WHITE PAPER: Trends towards server consolidation and decentralized employees can seriously impact WAN bandwidth. A typical CIFS file often requires hundreds of round trips between the file server and the user to complete a simple file request.
Posted: 09 Feb 2011 | Published: 09 Feb 2011

BlueCoat

Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements
sponsored by IBM and SI Architects
EGUIDE: This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
sponsored by IBM and SI Architects
EGUIDE: In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Solving the Scalability Problem with Big Data
sponsored by WANdisco
EGUIDE: A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

WANdisco

Storage Magazine: July 2013
sponsored by SearchStorage.com
EZINE: This issue of Storage Magazine takes a closer look at the latest solid-state storage trends, uses, and form factors. It also provides cloud-based file sharing need-to-knows, expert perspectives on LTFS and the future of tape, advice on simplifying VM data protection and more.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

SearchStorage.com

Streamline, Speed and Secure the Supply Chain With Managed File Transfer
sponsored by SEEBURGER
WHITE PAPER: Your enterprise has invested heavily in SAP. But data exchange restrictions caused by large data files, FTP spaghetti and unreliable network connections create long waits, limit your ability to send and receive information, and raise costs and risks. Read this paper to find out how Managed File Transfer ensures your data flow is secure and speedy.
Posted: 24 Feb 2012 | Published: 31 Dec 2011

SEEBURGER

The Critical Need for Encrypted Email and Secure File Transfer Solutions
sponsored by Proofpoint, Inc.
WHITE PAPER: This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Posted: 04 Aug 2009 | Published: 01 Jul 2009

Proofpoint, Inc.

The File Transfer Security Evolution
sponsored by GlobalScape
WHITE PAPER: This white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
Posted: 27 May 2014 | Published: 31 Dec 2013

GlobalScape

The Five Critical SLA Questions
sponsored by IBM
WHITE PAPER: SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

The Guide to Data Movement and Governance
sponsored by IBM
EGUIDE: Missed opportunities and lost revenue might be the least of your worries. In some cases, poor practices can lead to lawsuits, fines and even the failure of the business itself. The purpose of this e-guide is to help you grasp the measures that can keep your organization on track to meet objectives and stay in line with regulations.
Posted: 29 Nov 2011 | Published: 28 Nov 2011

IBM
101 - 125 of 143 Matches Previous Page    3 4 5 6    Next Page
 
KERMIT DEFINITION (continued): …  The Kermit protocol is described as "fast, robust, extensible, tunable, and medium-independent." In addition to the protocol support, the Kermit suite includes terminal emulation, character-set translation, and scripting. The suite can be installed on almost any operating system, including Windows, UNIX, DOS, VMS, OS/2, and a number of mainframe operating systems. Most versions support both direct or dialed serial connections (with a modem) and network connections (Telnet and often others such as Rlogin, LAT, or X.25).Some advantages of Kermit are:You can write a script that will allow a sequence … 
Kermit definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement