Standards  >   Network Protocols  >   Routing Protocols  >  

Multicast Extensions to OSPF

RSS Feed    Add to Google    Add to My Yahoo!
Multicast Extensions to OSPF Reports
 
Foundational Focus: OSI Model - Breaking Down the 7 Layers
sponsored by Global Knowledge
WHITE PAPER: The OSI model is a conceptual tool used to discuss and describe network functions. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
Posted: 07 May 2013 | Published: 12 Apr 2013

Global Knowledge

Financial Companies Can Align Strategy and Operations with Agile Business Rules Solutions
sponsored by Progress
WHITE PAPER: The Internet and open communication standards have enabled us to automate the flow of information across distances and between systems. Many activities of low complexity or volatility have now been automated. However, the improvements made are incremental at best, due to an inability to streamline decision-intensive tasks.
Posted: 27 Jan 2015 | Published: 31 Mar 2014

Progress

Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks

How to Save Time and Money Making Your Transition to IPv6
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Cisco Systems, Inc.

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

Closing the IT Process Automation Gap
sponsored by Opalis Software, Inc.
WHITE PAPER: Many organizations are in the midst of implementing ITIL. But are they putting the appropriate operational processes into place? Learn how automating operational processes with run book automation software can help organizations better benefit from ITIL.
Posted: 28 Aug 2007 | Published: 01 Aug 2007

Opalis Software, Inc.

Ten Top Problems Network Techs Encounter
sponsored by Fluke Networks
WHITE PAPER: This whitepaper discusses ten common problems encountered by network technicians today and their symptoms, causes, and resolutions.
Posted: 27 Jan 2010 | Published: 01 Jul 2009

Fluke Networks

The MPLS Network: A Future-Proof Engine for Voice-Data Convergence
sponsored by MegaPath Inc.
WHITE PAPER: Voice and data on a single wire is an exciting network development. MPLS technology, which enables voice and data to be transported together on wide area networks (WANs), has matured to provide a platform for almost unimaginable communications and cloud computing possibilities. Learn more about MPLS by reading this white paper.
Posted: 26 Mar 2010 | Published: 26 Mar 2010

MegaPath Inc.

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement