Home
 > search for

Featured Documents related to »  network protocol


Retrospective Network Analysis
While network complexity and bandwidth demands continue to increase, applications such as voice over Internet protocol (VoIP) increase performance requirements.

network protocol  Network Analysis While network complexity and bandwidth demands continue to increase, applications such as voice over Internet protocol (VoIP) increase performance requirements. Today’s network administrators need versatile monitoring and analysis tools to quickly troubleshoot and monitor security and compliance. Retrospective network analysis (RNA) tools let you go “back in time” to reconstruct failure or attack. Discover the benefits. Read More

Outsourcing, IT Infrastructure
The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical type...
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » network protocol


Your Guide to Troubleshooting Voice over Internet Protocol
The sensitivity of voice over Internet protocol (VoIP) to delay and packet loss, compared with other network applications such as e-mail services, presents a

network protocol  loss, compared with other network applications such as e-mail services, presents a big challenge. But if you have a basic understanding of VoIP traffic and of the quality metrics that VoIP monitoring tools can provide, you increase your ability to run your network smoothly. Learn about the statistics and metrics you need to maximize your VoIP use. Read More
Customer Relationship Management and the Next Generation Network
Next generation networks may eventually allow us to interact with the world in a way compatible with how we live. This would have the greatest impact on our

network protocol  where we're accessing the network to provide services based on our location, in addition to providing services based on the device we are using at the time. One of the keys to IMS is its reliance on the Session Initiation Protocol (SIP). SIP is an IP-based standard protocol for creating and terminating a user session that could involve multimedia elements such as video, voice, data, instant messaging, and even online gaming. SIP is a key element in allowing IP-based services like voice and video over IP Read More
Network Associates Hopes to Rekindle the Flame
Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to

network protocol  reputation among security and network engineers for its Protocol Analyzer product suite. In fact, its Sniffer products have been such a success, that the industry often uses the term Sniffer for Protocol Analyzers as a generic term, much the same way that consumers use the word Kleenex for all tissue brands. After being acquired by Network Associates, the Sniffer product suite continues to lead the market for Protocol Analyzers. In the underground, hackers world-over use the term sniffer Read More
Who Else is Using Your Wireless Network?
Information technology (IT) security industry experts continue to warn us that wireless networks have significant vulnerabilities. Taking precautions is a smart

network protocol  be using your wireless network (or you might be using theirs) and not even realize it. Cryptography experts have lambasted wireless networks as being easy to exploit. While wired equivalent privacy (WEP), Wi-Fi protected access (WPA), and temporal key integrity protocol (TKIP) all add layers of security to wireless networks, it is a well-established fact that cracking WEP encryption keys is not that hard to do. Most people who use computers at home, whether the computer is their own personal system, or a Read More
The Adaptive Business Network in Consumer Products Industries
As competitive pressures on consumer products (CP) companies rise, the industry is reaching the limits of business as usual. CP companies must look to increased

network protocol  Adaptive Business Network in Consumer Products Industries As competitive pressures on consumer products (CP) companies rise, the industry is reaching the limits of business as usual. CP companies must look to increased collaboration with retailers, partners, and suppliers as a way to build and improve on the core cycles of planning and forecasting. And the blueprint for expanded collaboration and increased automation? The adaptive business network. Read More
Top 10 Excuses For Not Securing Your Website or Network
With so many sites lacking security, we have put together a list of the leading reasons why businesses and organizations are unable to secure their network. Don

network protocol  Securing Your Website or Network Top 10 Excuses For Not Securing Your Website or Network L. Taylor - May 23, 2000 Introduction If your company is like most, it has neglected to perform basic due diligence in securing its vital assets. How and why does such a critical part of information technology management get overlooked? The amount of excuses we have discovered is endless. Here are some of the best: No one forced us to do it. Our administrators need to use the security holes to get their work done. Read More
Peregrine Welcomes Loran to Its Nest In Network Management Matrimony
In July 1999 Peregrine Systems got engaged into a strategic partnership with Loran Technologies to OEM Loran’s network management software. Now the two have

network protocol  to Its Nest In Network Management Matrimony Peregrine Welcomes Loran to Its Nest In Network Management Matrimony D. Geller - August 29, 2000 Event Summary Peregrine Systems, Inc. agreed to acquire Loran Technologies in a stock swap valued at $94 million. Loran is a Canadian company that specializes in network management. Peregrine, a company with strengths in IT asset management (see Peregrine Swoops Down On Network Monitoring Company ) and e-procurement (see First Look: Peregrine Offers Cradle to Grave Read More
Business Network Transformation: Rethinking Relationships in a Global Economy
Business networks have come to the fore in the past decade, as the power of customers and consumers has increased relative to the manufacturers and retailers

network protocol  Network Transformation: Rethinking Relationships in a Global Economy Business networks have come to the fore in the past decade, as the power of customers and consumers has increased relative to the manufacturers and retailers that serve them. These networks enable these companies to deliver faster innovation to customers at lower costs by sharing investment, assets, and ideas. Find out how information technology and communication (ITC) systems can help you unlock new market opportunities. Read More
Integrated Security: A New Network Approach
The challenge is to ensure that the right people gain access and the wrong people do not, making the role of information security even more critical to enabling

network protocol  Security: A New Network Approach Executive Summary As organizations become more dependent on their networks for business transactions, external data sharing, and simple day-to-day communications, the need increases for these networks to be more accessible and operational. But as accessibility to the network becomes easier, so does gaining access to the critical data they are storing. The challenge is to ensure that the right people gain access and the wrong people do not, making the role of Read More
Monitoring and Managing Voice over Internet Protocol (VoIP)
As with most new technologies, voice over Internet protocol (VoIP) brings new challenges along with benefits. The main challenge is VoIP’s extreme sensitivity

network protocol  loss compared with other network applications. However, a basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help you keep your VoIP network running smoothly. 0 Read More
BYOD Without Tears: The Impact and Challenge for Network Engineers
Bring your own device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. But network performance and security

network protocol  Impact and Challenge for Network Engineers Bring your own device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. But network performance and security concerns can arise when employees want to use their personal devices at work. This white paper looks at the challenges of integrating BYOD with corporate networks in a way that BYOD does not compromise connectivity or performance for established wired and wireless users. Read More
Network Monitoring and Troubleshooting for Dummies
This Network Monitoring and Troubleshooting for Dummies book introduces you to common network performance management (NPM) issues and gives you a new way of

network protocol  Troubleshooting for Dummies This Network Monitoring and Troubleshooting for Dummies book introduces you to common network performance management (NPM) issues and gives you a new way of looking at solving them. This perspective allows you to see your network from your users’ point of view—namely, the services and applications they use and their experience with them. Of course, you can still get down to the other flow and packet levels, but macro-level visibility is a key differentiator in your ability Read More
Network Traffic Engineering Guidelines for Fibre Channel Switches
Scalability—or performance? In the past, storage area network (SAN) architects had to choose one over the other with regard to their SANs. Now, however

network protocol  the past, storage area network (SAN) architects had to choose one over the other with regard to their SANs. Now, however, compromise is no longer necessary. Stackable switch solutions allow for seamless scaling and high performance—which means you can breathe as easily as your data transfers. Read More
Defense in Depth: Comprehensive Security with Authenticated Network Access Control
The greatest threat to the security of the modern network is complexity. Threats to network security almost always play on missed details in the design of a

network protocol  Comprehensive Security with Authenticated Network Access Control The greatest threat to the security of the modern network is complexity. Threats to network security almost always play on missed details in the design of a network or a piece of software. These overlooked details enable much larger and potentially devastating security breaches to occur. However, this threat can be countered with a well designed network and vigilant safeguards. Read More
Popular Searches

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others