Standards  >   Network Protocols  >   TCP/IP  >  

UDP Port 500

RSS Feed    Add to Google    Add to My Yahoo!
UDP Port 500 Reports
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Multiple Country Implementation — Influencing Factors and Approaches
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

ComputerWeekly.com

10-Gigabit Ethernet: The Next Generation Network Infrastructure
sponsored by Dell, Inc.
TECHNICAL ARTICLE: 10-GigE is the latest, fastest LAN interconnect, the next in a series following Fast Ethernet and Gigabit Ethernet. Rest assured that if you have not already implemented 10-GigE you’re not late - while some organizations have begun to use it, cabling upgrades will be required to drive broader deployment.
Posted: 23 Feb 2010 | Published: 05 Jan 2009

Dell, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com

Cisco and Standards: Opening the Door to Borderless Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper details the need for standards adoption and adherence in order to reap the rewards in the following areas: Integration and testing, deployment, operations, problem resolution, availability, security, accessibility, open systems, cost savings, and choice.
Posted: 01 Dec 2010 | Published: 30 Nov 2010

Cisco Systems, Inc.

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Dual Stack Network
sponsored by Cisco Systems, Inc.
DATA SHEET: In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Case Study: Outwood Grange Academics Trust Ensures Teaching Continuity with UDP
sponsored by arcserve
CASE STUDY: Explore one organization's decision to deploy a Unified Data Protection (UDP) solution to streamline and protect their diverse IT infrastructure and backup tools. By implementing this UDP system, your enterprise can reduce your backup windows and storage needs, achieve longer data retention times, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2015

arcserve

CW Nordics May 2016
sponsored by ComputerWeekly.com
EZINE: The Nordic region is often described as a region that is leading the way in terms of the use of modern IT. The region needs IT to make up for factors such as having a small population, with many isolated communities. So IT both helps the region punch above its weight in business and enables its residents to receive services effectively.
Posted: 05 May 2016 | Published: 09 May 2016

ComputerWeekly.com

5 Benefits of Having USB Ports on Your Rack PDUs
sponsored by Raritan Inc.
WHITE PAPER: Explore the top five benefits of having USB ports on your PDU racks. You'll learn how USB ports allow for faster network connections, easier upgrades and setups, and much more.
Posted: 12 Oct 2015 | Published: 27 Apr 2015

Raritan Inc.

DDoS Recommended Practices
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn recommended network and application practices for successful DDoS attack protection.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

The CIO’s Guide to UEM: 10 Critical Decision Points
sponsored by BlackBerry
WHITE PAPER: Based on real-world research input from Fortune 500 companies, and insights from mobility analysts and experts, this guide is designed to help you reimagine your strategy for a new era of mobility.
Posted: 20 Dec 2016 | Published: 30 Oct 2015

BlackBerry

The Path to 2020: Marketers Seize the Customer Experience
sponsored by Marketo
WHITE PAPER: Access this expert report to learn what is in store for customer experience over the next three years. Take away the top 5 insights gained from almost 500 CMOs and senior marketing executives and what you can do to future and what they are doing to pioneer the future.
Posted: 21 Oct 2016 | Published: 21 Oct 2016

Marketo

SD-WAN: Network Security Options
sponsored by Fatpipe, Inc.
WHITE PAPER: Many companies turning to SD-WAN are uncertain of what to expect from a security standpoint. So if you're unaware of what protection is available for SD-WAN then it's time to educate yourself. Learn about critical security options available for SD-WAN.
Posted: 15 Feb 2017 | Published: 30 Dec 2016

Fatpipe, Inc.

DCIG Buyer's Guide for Midmarket Enterprise Storage Arrays
sponsored by Tegile
WHITE PAPER: The DCIG 2016-17 Midmarket Enterprise Storage Array Buyer's Guide serves the needs of the midmarket technology buyer, collecting data on 17 of the top products in the industry and presenting that data in easy-to-consume one-page summaries. The analyst firm focused its evaluation on storage arrays with a maximum raw storage capacity of 500TB.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Tegile

CW+: Mobile Games: App store strategies, business models and forecasts
sponsored by ComputerWeekly.com
WHITE PAPER: The last two years have been, without a doubt a renaissance era, in mobile games. Driven by the iconic iPhone and its complementing App Store, developers great and small are reaping the rewards of heightened interest in the platform.
Posted: 21 Oct 2011 | Published: 05 Feb 2011

ComputerWeekly.com

Unix-to-Linux Migration
sponsored by SearchDataCenter.com
EGUIDE: Get a step-by-step approach for data center managers that covers everything from making the business case to getting the best training. Sections in this IT Handbook include training staff to manage linux environments and much more.
Posted: 29 Mar 2011 | Published: 29 Mar 2011

SearchDataCenter.com

2014 Egon Zehnder European Board Diversity Analysis
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For the first time Europe now leads the world in board diversity – though numbers of female executives on boards remain stubbornly low and this is a particular issue in technology, this study reveals.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Understanding And Mitigating DDoS Attacks
sponsored by Dyn
WHITE PAPER: To overcome the challenges Distribute Denial of Service (DDoS) attacks present you need a highly resilient and scalable DNS infrastructure. This white paper reviews DDoS attack concepts and mitigation strategies. Inside, you'll learn 4 critical DNS concepts.
Posted: 29 Mar 2017 | Published: 30 Dec 2016

Dyn

Network security is being redefined to better block data raiders
sponsored by ComputerWeekly.com
WHITE PAPER: This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.
Posted: 21 Oct 2011 | Published: 26 Jan 2011

ComputerWeekly.com

APV Series Application Deliver Controllers Overview
sponsored by Array Networks
RESOURCE: In this resource, learn about Array Network's APV series application delivery controllers and see how they match up against the competition.
Posted: 13 Apr 2017 | Published: 31 Jan 2017

Array Networks

NSS Labs NGFW Test Report
sponsored by Forcepoint
ANALYST REPORT: In this lab report from NSS Labs, discover how a Next-Generation Firewall measures up to its boasts on the market. Learn what's important to NGFWs, how they come up short, how they surpass expectations, and everything in-between.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Forcepoint

Array Networks Secure Access Gateway Datasheet (SSL VPN)
sponsored by Array Networks
RESOURCE: In this resource, learn about Array Network's AG Series secure access gateways and see how they match up against the competition.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

Array Networks

Cyber Security Trends ANZ 2016
sponsored by ComputerWeekly.com
EGUIDE: As cyber security becomes a top priority for policy makers and IT leaders, this e-guide looks at some of the issues facing government and private sector organisations in Australia and New Zealand.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Gain Extra Scale Out NAS Storage For Backup Data in Microsoft Azure
sponsored by Veeam Software
RESOURCE: Read this guide tolearn how you can implement additional scale-out NAS cloud storage to bypass the capacity constraints of Azure, without sacrificing performance or throughput.
Posted: 12 Apr 2017 | Published: 31 Oct 2016

Veeam Software

Botnet Research Report
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This research report takes a closer look at botnets that are used to deploy malware, use cases to help you understand what you should expect from your network service providers, and the need for greater levels of partnership and collaboration across the security community to safeguard the Internet more effectively.
Posted: 07 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Debunking the Top Four Myths About DDOS Attacks
sponsored by F5 Networks
WHITE PAPER: If you think you're ready for a DDoS attack—or that you don't need to worry about one—make sure you're not buying into some of these popular myths.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Check the network before moving to the cloud
sponsored by SearchSecurity.com
EGUIDE: Before considering a move to the cloud, it’s important to ensure that your network is free of vulnerabilities that could put your data at risk. This expert resource offers tips on how to make sure your network is secure before extending the network infrastructure. View now to uncover key processes and tools to help detect configuration mistakes.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

SearchSecurity.com

Fibre Channel Buffer Credits and Frame Management
sponsored by Brocade
WHITE PAPER: In this whitepaper, learn about buffer credit configuration for fibre channel systems, as well as some new ways of maximizing the amount of storage you can gain from your fiber channel. Inside, learn to use CLI commands to monitor buffer credits, free up network congestion by using virtual channels, and more.
Posted: 08 Feb 2017 | Published: 08 Feb 2017

Brocade

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Cyber Security Trends ASEAN 2016
sponsored by ComputerWeekly.com
EGUIDE: As cyber security becomes a top priority for policy makers and IT leaders, this guide looks at some of the issues facing government and private sector organizations in South-East Asia.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement