Standards  >   Network Protocols  >   TCP/IP  >  

UDP 500

RSS Feed    Add to Google    Add to My Yahoo!
UDP 500 Reports
 
The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

The Network Evolution University: Next Generation Networks
sponsored by SearchNetworking.com
VIRTUAL SEMINAR: In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present.
Posted: 29 Sep 2011 | Premiered: 09 Nov 2011

SearchNetworking.com

Dimension Data Helps Purdue Pharma Deploy and Manage Unified Communications to Support Corporate Growth
sponsored by Dimension Data
CASE STUDY: Read this case study to learn how Dimension Data’s managed services helped a pharmaceutical company replace a legacy phone system with a converged communications solution.
Posted: 24 Feb 2010 | Published: 24 Feb 2010

Dimension Data

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

NSS Labs Next-Gen Firewall Product Analysis Report
sponsored by Dell Software
WHITE PAPER: Learn why a Dell SonicWALL next-gen firewall earned the "Recommended" rating from NSS Labs for the third consecutive year in one of the industry's most comprehensive, real-world tests of firewalls, and how it earned a top score for security effectiveness.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell Software

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell
WHITE PAPER: This whitepaper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell

Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper explores the stages of Regin, breaking down its complex architecture.
Posted: 08 Jan 2015 | Published: 22 Nov 2014

Symantec Corporation

NSA Series data sheet
sponsored by Dell Software
WHITE PAPER: Now your organization can be both secure and productive without compromising network performance. The Dell™ SonicWALL™ Network Security Appliance (NSA) Series is the one of the most secure, highest performing next-generation firewall lines.
Posted: 23 Aug 2013 | Published: 30 Jun 2013

Dell Software

Remote Access to Enterprise PCs
sponsored by Citrix
WHITE PAPER: This whitepaper examines a VDI solution that is simple to deploy, secure by design and delivers access to corporate resources without dramatically changing the user experience or IT footprint.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

Citrix

Conflicker Working Group - Lessons learned from Conflicker
sponsored by ComputerWeekly.com
WHITE PAPER: In November 2008, Conficker A, the first of five variants of the malware, rapidly began infecting computers which had failed to install a Microsoft patch released just weeks earlier. In late December 2008, Conficker B added new mechanisms for distribution including USB storage devices.
Posted: 24 Oct 2011 | Published: 31 Jan 2011

ComputerWeekly.com

Info-Tech Research Group Vendor Landscape: Managed File Transfer
sponsored by Ipswitch File Transfer
WHITE PAPER: The following vendor report from Info-Tech Research Group intends to simplify the selection process for organizations seeking the right managed file transfer vendor and evaluates 11 of the top competitors in the MFT market. Read on to learn which solution is ultimately right for your business.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Ipswitch File Transfer

Information Security Magazine: December 2014
sponsored by SearchSecurity.com
EZINE: The winners of Information Security magazine's Security 7 awards are announced. The Security 7 awards honor CISOs, security researchers and others at the top of their profession.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

SearchSecurity.com

IBM System x3100 M5 Product Guide
sponsored by Lenovo and Intel
WHITE PAPER: Read the following product guide to learn about the IBM® System x3100 M5 single-socket tower server, powered by the latest Intel® Xeon® processors, and how it is designed for small businesses and first-time server buyers looking for a solution to improve business efficiency.
Posted: 14 Oct 2014 | Published: 01 May 2014

Lenovo and Intel

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 19 Aug 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

The Unofficial Official VCAPS5-DCA Study Guide
sponsored by Veeam Software
EGUIDE: Take a look at this extensive study guide to find the answers to any questions you may have about these IT technologies.
Posted: 15 Jan 2014 | Published: 15 Jan 2014

Veeam Software

Harness the Power of Big Data: The IBM Big Data Platform
sponsored by IBM
EBOOK: This extensive e-book examines the topic of big data in depth. Access this six part book to examine details on in-motion and at-rest analytics, get big data use cases, gain confidence in your big data project, and much more.
Posted: 16 Jan 2013 | Published: 16 Jan 2013

IBM

Big Data Beyond the Hype: A Guide to Conversations for Today’s Data Center
sponsored by IBM
RESOURCE: Expand your knowledge on big data with conversations from today's experts on the data center.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

IBM

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

Deep Security 7.5
sponsored by Trend Micro, Inc.
VIDEO: Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.
Posted: 15 Sep 2010 | Premiered: 15 Sep 2010

Trend Micro, Inc.

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests
sponsored by McAfee, Inc.
TEST RESULTS: In Q4 of 2008, NSS Labs performed comprehensive testing of the McAfee M-8000 Network IPS against our Network Intrusion Prevention Systems (NIPS) testing methodology v5.22. This report summarizes the results from the tests performed in our real-world test lab.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

McAfee, Inc.

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Architecting a vCloud
sponsored by VMware, Inc.
WHITE PAPER: If your organization has decided to take advantage of cloud computing benefits such as increased agility and flexibility, you may be wondering: Where is the best place to start? Read on for a guide to taking the first steps toward leveraging cloud computing across your organization.
Posted: 20 May 2011 | Published: 20 May 2011

VMware, Inc.

Integrating NetFlow Data into Network and Application Performance Monitoring
sponsored by NetScout Systems, Inc.
WHITE PAPER: An easily accessible, high-performing, and always-available network is essential to a company's business. Read this white paper and learn how visibility into business applications and on-going traffic is crucial for fine-tuning networking performance.
Posted: 03 Aug 2007 | Published: 01 Mar 2007

NetScout Systems, Inc.

Integrating NetFlow Data into Your Network and Application Performance Monitoring System
sponsored by NetScout Systems, Inc.
WHITE PAPER: An easily accessible, high-performing, and always-available network is essential to a company's business. Visibility into its end users, business applications, and on-going traffic is crucial for fine-tuning its performance. By reading this white paper...
Posted: 02 Aug 2006 | Published: 01 Aug 2006

NetScout Systems, Inc.

Cisco Virtual Office Deployment Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: Cisco Virtual Office is a highly scalable solution for medium and large organizations looking to provide teleworkers, small offices, and mobile users with office-like experience combining voice, video, wireless, and real-time data applications in a secure environment. This deployment guide provides full details.
Posted: 18 Jun 2009 | Published: 09 Jun 2009

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement