Standards  >   Network Protocols  >   Network Authentication Protocols  >  

Remote Authentication Dial-in User Service Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Remote Authentication Dial-in User Service ProtocolReports
 
SIP and the Art of Converged Communications
sponsored by Global Knowledge
WHITE PAPER: Session Initiation Protocol (SIP) is an internet signaling protocol, developed by the IETF (starting in 1996), for establishing, maintaining, and tearing down sessions between a variety of real-time media, including voice, video, and chat. This white paper is going to look at the way SIP is used in the converged Unified Communications environment.
Posted: 25 Jul 2013 | Published: 18 Jun 2013

Global Knowledge

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Banking Industry Architecture Network and TOGAF
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

Demystifying VLAN Trunk Protocol
sponsored by Global Knowledge
WHITE PAPER: This detailed white paper will help you uncover the truth about the often-misunderstood Virtual Local Area Network (VLAN) Trunk Protocol, or VTP. Discover an in-depth overview of how VTP works and see how you can overcome VTP challenges to minimize network outages and more – read on to get started.
Posted: 10 Jan 2013 | Published: 31 Dec 2012

Global Knowledge

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Extreme Networks Solution with NEC
sponsored by Extreme Networks
WHITE PAPER: Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.
Posted: 29 Aug 2013 | Published: 30 Apr 2013

Extreme Networks

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

Dimension Data Helps Purdue Pharma Deploy and Manage Unified Communications to Support Corporate Growth
sponsored by Dimension Data
CASE STUDY: Read this case study to learn how Dimension Data’s managed services helped a pharmaceutical company replace a legacy phone system with a converged communications solution.
Posted: 24 Feb 2010 | Published: 24 Feb 2010

Dimension Data

Intuitive and Secure, Two-Factor Authentication on Mobile Phones
sponsored by Confident Technologies
WHITE PAPER: Many online business and websites today are utilizing user's mobile phones for two-factor authentication. However, attacks on mobile devices and the SMS communication channel are increasing, calling for more secure methods of authentication. View this paper now to explore effective multi-layered, multifactor authentication methods.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

Confident Technologies

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement