Standards  >   Network Protocols  >   TCP/IP  >  

UDP/500

RSS Feed    Add to Google    Add to My Yahoo!
UDP/500 Reports
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Business Continuity Management Systems
sponsored by ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

What Enterprises Should Do About IPv6 in 2011
sponsored by Cisco Systems, Inc.
WHITE PAPER: The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

SIP trunking services close cost gaps around mobility
sponsored by Cox Communications, Inc.
EGUIDE: Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Cox Communications, Inc.

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

IPv6 Addressing Plan Basics
sponsored by Infoblox
WHITE PAPER: Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Infoblox

Ten Top Problems Network Techs Encounter
sponsored by Fluke Networks
WHITE PAPER: This whitepaper discusses ten common problems encountered by network technicians today and their symptoms, causes, and resolutions.
Posted: 27 Jan 2010 | Published: 01 Jul 2009

Fluke Networks

NSS Labs Next-Gen Firewall Product Analysis Report
sponsored by Dell, Inc.
WHITE PAPER: Discover a next-generation firewall solution that increases security while reducing complexity. Read the NSS Labs report and learn why our NGFW solution was rated as one of the top products for security effectiveness, performance and scalability, three years in a row.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell, Inc.

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell, Inc. and Intel®

Network security appliance series
sponsored by Dell, Inc.
WHITE PAPER: Your organization can be both secure and productive without compromising network performance. Read this paper and discover how the Dell network security series delivers one of the most secure, high-performing, next-generation line firewalls.
Posted: 23 Aug 2013 | Published: 30 Jun 2013

Dell, Inc.

Why So Many are Turning to WAN Optimization Software
sponsored by Silver Peak
WHITE PAPER: Access this exclusive resource to learn how virtual WAN optimization combines the benefits of server virtualization – rapid deployment, ease of management and more – with the established performance and cost gains of WAN optimization.
Posted: 04 May 2015 | Published: 24 Oct 2013

Silver Peak

Why So Many are Turning to WAN Optimization Software
sponsored by Silver Peak
WHITE PAPER: This exclusive resource analyzes WAN optimization benefits and discusses how your peers are increasing their ROI while lowering their TCO.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Silver Peak

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Conflicker Working Group - Lessons learned from Conflicker
sponsored by ComputerWeekly.com
WHITE PAPER: In November 2008, Conficker A, the first of five variants of the malware, rapidly began infecting computers which had failed to install a Microsoft patch released just weeks earlier. In late December 2008, Conficker B added new mechanisms for distribution including USB storage devices.
Posted: 24 Oct 2011 | Published: 31 Jan 2011

ComputerWeekly.com

A Computer Weekly buyer's guide to desktop computing 2020
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Tablets, smartphones, cloud computing and applications delivered as a service offer compelling new ways to work. In this 11-page buyer's guide, Computer Weekly looks at how this way of working is likely to evolve further over the next five years and how it will affect users and IT departments alike.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

ComputerWeekly.com

Computer Weekly – 24 March 2015: Government backs tech in 2015 Budget
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, chancellor George Osborne's 2015 Budget was the most technology friendly ever – we examine the key policy announcements. Sainsbury's CIO talks about the challenges of going digital. And we look at how virtual reality could be coming to a workplace near you, thanks to the latest developments. Read the issue now.
Posted: 23 Mar 2015 | Published: 20 Mar 2015

ComputerWeekly.com

Backup & Replication: Cloud Connect Reference Architecture
sponsored by Veeam Software
WHITE PAPER: Access this white paper to discover a program that allows cloud service providers to offer backup storage as a service, and how to use this program.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Veeam Software

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: In this resource, find five different white papers that will all help you master a different aspect of big data security.
Posted: 19 Aug 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

The Unofficial Official VCAPS5-DCA Study Guide
sponsored by Veeam Software
EGUIDE: Take a look at this extensive study guide to find the answers to any questions you may have about these IT technologies.
Posted: 15 Jan 2014 | Published: 15 Jan 2014

Veeam Software

Today's Top Security Risks Revealed
sponsored by Hewlett-Packard Company
WHITE PAPER: This extensive white paper explores the current state of security threats that organizations are up against. Read on to learn how to prepare and strengthen defenses against evolving attacks.
Posted: 28 Apr 2015 | Published: 15 Apr 2015

Hewlett-Packard Company

Examining the Current Cyber Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: With attacks no longer a question of "if" but "when," it's crucial to know what your enemies are up to. This white paper examines the prevalent vulnerabilities in organizations today, how hackers are exploiting them, and which tools they are using to get the job done.
Posted: 28 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

Big Data Beyond the Hype: A Guide to Conversations for Today’s Data Center
sponsored by IBM
RESOURCE: Expand your knowledge on big data with conversations from today's experts on the data center.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

IBM

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

Deep Security 7.5
sponsored by Trend Micro, Inc.
VIDEO: Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.
Posted: 15 Sep 2010 | Premiered: 15 Sep 2010

Trend Micro, Inc.

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Architecting a vCloud
sponsored by VMware, Inc.
WHITE PAPER: If your organization has decided to take advantage of cloud computing benefits such as increased agility and flexibility, you may be wondering: Where is the best place to start? Read on for a guide to taking the first steps toward leveraging cloud computing across your organization.
Posted: 20 May 2011 | Published: 20 May 2011

VMware, Inc.

Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests
sponsored by McAfee, Inc.
TEST RESULTS: In Q4 of 2008, NSS Labs performed comprehensive testing of the McAfee M-8000 Network IPS against our Network Intrusion Prevention Systems (NIPS) testing methodology v5.22. This report summarizes the results from the tests performed in our real-world test lab.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

McAfee, Inc.

Integrating NetFlow Data into Your Network and Application Performance Monitoring System
sponsored by NetScout Systems, Inc.
WHITE PAPER: An easily accessible, high-performing, and always-available network is essential to a company's business. Visibility into its end users, business applications, and on-going traffic is crucial for fine-tuning its performance. By reading this white paper...
Posted: 02 Aug 2006 | Published: 01 Aug 2006

NetScout Systems, Inc.

Integrating NetFlow Data into Network and Application Performance Monitoring
sponsored by NetScout Systems, Inc.
WHITE PAPER: An easily accessible, high-performing, and always-available network is essential to a company's business. Read this white paper and learn how visibility into business applications and on-going traffic is crucial for fine-tuning networking performance.
Posted: 03 Aug 2007 | Published: 01 Mar 2007

NetScout Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement