Standard ProtocolWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Standard Protocol returned the following results.
RSS What is RSS?
Related Categories

 •   WAN/ LAN Solutions
 •   Network Management
 •   Network Security
 •   Network Protocols
 •   Networks
 •   Telephony/ CTI/ VOIP
 •   Wireless Technologies and Mobile Computing
 •   Unified Communications / Voice & Data Convergence
 •   Virtualization
 •   Enterprise Systems Management

Related Searches
 •   Create Standard
 •   Graphs Standard Protocol
 •   Management Standard Protocol
 •   Outsourcing Standard
 •   Standard Protocol Compliance
 •   Standard Protocol Decision
 •   Standard Protocol Provider
 •   Systems Standard
 •   Technology Standard
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Solution Brief: Accelerating SSL Applications Across the WAN by BlueCoat

June 23, 2010 - (Free Research)
Secure Sockets Layer (SSL) is the industry-standard protocol for establishing a secure communications link when transmitting information over untrusted networks. However, SSL can create complications when it comes to prioritizing, optimizing, and accelerating network traffic. This paper outlines a solid strategy for optimizing SSL applications. 
(WHITE PAPER) READ ABSTRACT |

Mirapoint RazorSafe™ by Mirapoint Software, Inc.

September 18, 2009 - (Free Research)
RazorSafe operates in a low-risk, passive mode and archives all emails, while ensuring minimal impact on your email infrastructure. RazorSafe uses open, standard protocols (POP, IMAP, SMTP) to archive all emails sent or received from the email server. 
(DATA SHEET) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

z Cisco Catalyst 2950 Series Switches with Standard Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

NFS Evolution Changes the Landscape of HPC Data Management by BlueArc Corp.

July 02, 2009 - (Free Research)
In HPC data management, traditional standards-based solutions have been limited in performance and scalability, but proprietary, high-performance solutions have required specific expertise to set up, manage, or scale. Read this Tabor Research White Paper to learn about file systems used in HPC environments as well as BlueArc storage solutions. 
(WHITE PAPER) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

RTSP: One of the Foundations of Convergence by F5 Networks

September 2007 - (Free Research)
Real-Time Streaming Protocol (RTSP) is a foundation for the current convergence of communications. When implementing RTSP, the multiple port and protocol nature of RTSP makes streaming audio/video difficult to manage. This white paper explains it. 
(WHITE PAPER) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

The Economics of Cooperative Control – Protocols are Free by Aerohive Networks

March 2011 - (Free Research)
Instead of regurgitating an architecture where costly, centralized controllers are needed, Aerohive followed the original intent of the 802.11 standard designers more closely and brought the technology to maturity. This paper explores how inter-AP protocols can execute the same functions performed by centralized controllers with lower cost. 
(WHITE PAPER) READ ABSTRACT |

Secure, Reliable, Any-Size File Transfer with FileXpress by Attachmate Corporation

February 2013 - (Free Research)
This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business. 
(WEBCAST) READ ABSTRACT |

Fair exchange protocols with anonymity and non-repudiation for payments by ComputerWeekly.com

May 2013 - (Free Research)
This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The performance enhancements of 802.11n access points by SearchNetworking.com

August 2011 - (Free Research)
This E-Guide takes a look at the communications and security standards every IT administrator should be aware of. Uncover the performance enhancements of 802.11n, why it’s the go-to choice and how you can keep pace with the newest updates. 
(EGUIDE) READ ABSTRACT |

IPv6: The Next IP Standard by AT&T Corp

October 2010 - (Free Research)
With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers. 
(PODCAST)

10GbE and FCoE and DCB: Ready for the Evolution of SAN Fabrics? by Dell, Inc.

February 2010 - (Free Research)
This article will provide an overview of the reasons Data Center Bridging (DCB) is being developed and how it can improve networking in the data center for applications, servers, and storage. 
(EZINE)

Cisco and Standards: Opening the Door to Borderless Networks by Cisco Systems, Inc.

November 2010 - (Free Research)
This white paper details the need for standards adoption and adherence in order to reap the rewards in the following areas: Integration and testing, deployment, operations, problem resolution, availability, security, accessibility, open systems, cost savings, and choice. 
(WHITE PAPER) READ ABSTRACT |

Web Services Security: What's Required to Secure a Service-Oriented Architecture by Oracle Corporation

January 2008 - (Free Research)
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment. 
(WHITE PAPER) READ ABSTRACT |

Foundational Focus: OSI Model - Breaking Down the 7 Layers by Global Knowledge

April 2013 - (Free Research)
The OSI model is a conceptual tool used to discuss and describe network functions. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers. 
(WHITE PAPER) READ ABSTRACT |

Delivering on the Promise of Easy to Use, Secure, and Inexpensive Video Conferencing in an IP Environment by Polycom, Inc.

October 2011 - (Free Research)
This white paper evaluates the challenges of deploying IP video conferencing in a secure and easy to use manner. 
(WHITE PAPER) READ ABSTRACT |

WEP Cloaking for Legacy Encryption Protection by Motorola, Inc.

November 2008 - (Free Research)
Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution. 
(ANALYST REPORT) READ ABSTRACT |

Mobile messaging is the key to connecting communities by ComputerWeekly.com

November 2010 - (Free Research)
Few could have envisioned the global success of SMS (short message service) when the first text message was sent in 1992. SMS has crossed network and technology boundaries, and continues to find new applications, as well as providing inspiration for industry innovation as IP (Internet Protocol)-based messaging builds momentum. 
(WHITE PAPER) READ ABSTRACT |

VOIP Without The Hype: What Businesses Need To Know by Fonality

December 2010 - (Free Research)
Like the cellular phenomenon, consumers are rushing to VoIP even though audio quality and reliability aren't yet what they are with traditional landlines. That aside, the value of VOIP has resonated with consumers. Read this white paper and discover what every business needs to know before signing on to VoIP. 
(WHITE PAPER) READ ABSTRACT |

Introduction to XML Gateways: Best Practices, Benefits & Requirements by Forum Systems

September 2009 - (Free Research)
This paper will give you an overview of enabling virtualization and control, enforcing data-level privacy and integrity and control and audit information flow. You'll learn the best practices, benefits and requirements of XML Gateways. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts