Standards  >   Network Protocols  >   TCP/IP  >  

User Datagram Protocol

RSS Feed    Add to Google    Add to My Yahoo!
User Datagram ProtocolReports
 
The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

The Network Evolution University: Next Generation Networks
sponsored by SearchNetworking.com
VIRTUAL SEMINAR: The convergence of storage and data center networks, the proliferation of mobile devices, the growing need for always on communications and access to data, and the emergence of cloud computing have all profoundly transformed the demand placed on the network and how it runs.
Posted: 22 Mar 2012 | Premiered: 22 Mar 2012

SearchNetworking.com

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

The Banking Industry Architecture Network and TOGAF
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

The Swiss Army Knife for the Network Analyst
sponsored by Riverbed Technology, Inc.
CASE STUDY: This exclusive case study covers a tool that helped one company with their network and protocol analysis.
Posted: 31 Jul 2014 | Published: 03 Aug 2013

Riverbed Technology, Inc.

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

IFRS in the Life Sciences: Broad implications
sponsored by Deloitte
WHITE PAPER: This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

How to tackle secure protocols and mobile management
sponsored by ComputerWeekly.com
WHITE PAPER: For a truly mobile device, operating to de-perimeterised principles, a wireless connection is probably required to achieve optimal connectivity while roaming.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

2014 European User Awards: Winning Entries in Networking
sponsored by TechTarget
RESOURCE: Get an inside look at Computer Weekly's: European User Awards 2014 as experts give you an in-depth analysis of what made this year's winning entries in networking stand out from the crowd, and more. To access your copy, please complete our brief Wireless LAN Survey.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Fair exchange protocols with anonymity and non-repudiation for payments
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Pinewood Studios: Desktop Area Networking and KVM over IP Switching
sponsored by Avocent
CASE STUDY: This whitepaper explains how Pinewood Studios, a film television and commercial production based in England, was able to create access to servers located in one secure area from various workstation positions – with no previous infrastructure in place.
Posted: 14 May 2014 | Published: 14 May 2014

Avocent

Enabling Collaboration: How IT Can Empower Users and Maintain Data Security
sponsored by Code42
WEBCAST: For IT today, allowing users uninhabited access to files – while maintaining data integrity – becomes a difficult balancing act. Click through and join Code42 and IDC Senior Research Analyst Vanessa Thompson to learn how to more effectively and efficiently balance IT requirements and user needs, and more.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Code42

Reducing Bandwidth While Improving User Experience with WAN Optimization
sponsored by Citrix
WHITE PAPER: This exclusive paper examines a WAN optimization solution that significantly reduces bandwidth strain while dramatically increasing the ratio of LAN to WAN traffic.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Citrix

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

Intelligent Authentication and User Access Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.
Posted: 12 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Transform Backup Data into an Information Advantage
sponsored by HP Autonomy
WHITE PAPER: Read this white paper to learn how to transform backup data into a business asset.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

HP Autonomy

Should IT Users be Treated like Patients?
sponsored by RES Software
WHITE PAPER: What would happen if IT were to learn from clinical healthcare's pursuit of "patient engagement" by creating its own "user engagement" strategies? What would the benefits of doing so be? And what would it take to make it all happen? Read the following brief to find out more.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

RES Software

The End of Services for Mac®: Evaluating Your Replacement Options
sponsored by Acronis
WHITE PAPER: This white paper discusses options for businesses replacing Services for Macintosh®, which will no longer be supported by Microsoft®.
Posted: 17 Jul 2014 | Published: 31 Mar 2013

Acronis

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: In this white paper, discover a mobile security solution that provides containerization, application-wrapping and secure connectivity to healthcare organizations, helping prevent data breaches and meet compliance regulations.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

BlackBerry

Why Strong Authentication is a Must for All Users
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper provides valuable insight into why strong authentication is essential for all users.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

CA Technologies.

Cisco and VMware: Transforming the End-User Desktop
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper examines a joint solution that can help you simplify VDI management and accelerate desktop patching, provisioning and updates from hours to minutes.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Cisco Systems, Inc.

The Past, Present, and Future of Box
sponsored by Box
WHITE PAPER: In this 451 Research report, discover a SWOT analysis to learn about the risks and rewards that your organisation will see from the cloud storage and sharing system Box.
Posted: 19 Jun 2014 | Published: 17 Sep 2013

Box

Insider Edition: There's No Room for Either/Or When It Comes to Cloud and Security
sponsored by SearchSecurity.com
EBOOK: Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.
Posted: 14 May 2014 | Published: 15 May 2014

SearchSecurity.com

Vendor Landscape: Cloud File Sharing
sponsored by Box
WHITE PAPER: This in-depth vendor landscape evaluates 8 competitors in the cloud file sharing (CFS) solution market who provide end users with lightweight but effective systems that fit their needs.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

Box

Cisco Solution for EMC VSPEX End User Computing for 2,000 VMware View 5.2 Users
sponsored by Cisco Systems, Inc.
WHITE PAPER: This comprehensive report examines the scalability of VMware Horizon View 5.2 environment on Cisco UCS B-Series B200 M3 Blade Servers running VMware ESXi 5.1 hypervisor software connected to an EMC VNX 5500 Storage Array.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Cisco Systems, Inc.

Meeting Workforce Demands: Why—and How—IT Should Modernize End-User Computing
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper will walk you through the four biggest trends affecting IT departments and how they manage end-user computing, and also offers the four best practices that will help you meet these challenges head on.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

VMware, Inc.

Talari ROI Calculator
sponsored by Talari Networks
RESOURCE: This exclusive resource provides a helpful ROI calculator for a series of WAN optimization solutions, helping you gather the data you need to make the business case for embracing the tools that will keep your network effective and your workers productive.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Talari Networks

Business Collaboration Benefits: 10 Questions to Ask Your Potential Vendors
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com describes the need for collaboration in a geographically dispersed enterprise and highlights the top ten questions you should ask any potential collaboration vendor.
Posted: 11 Sep 2012 | Published: 11 Sep 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement