Protocol TCP/IP Reports

Achieving SaaS Security with Connected® Online PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

Iron Mountain

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

From Development to Production: Streamlining SharePoint Deployment with DocAveĀ® Deployment Manager
sponsored by AvePoint, Inc.
WHITE PAPER: This document examines the capabilities of DocAve Deployment Manager and offers tips and guidance to help streamline the SharePoint deployment process while maintaining the integrity of all SharePoint staging instances.
Posted: 10 Jun 2009 | Published: 01 Jun 2009

AvePoint, Inc.

PACs for Industrial Control, the Future of Control
sponsored by National Instruments
WHITE PAPER: This white paper explores the origins of the Programmable Automation Controllers (PAC), how PACs differ from Programmable Logic Controllers (PLC) and PCs, and the future direction of industrial control with PACs.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

Taking Control of IP Network Infrastructures
sponsored by Brocade
WHITE PAPER: Organizations are looking to optimize their network infrastructures in order to provide the performance, reliability, and scalability required for next-generation IP-based networks.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Brocade

How Will the Change in Internet Addresses Affect Your Business?
sponsored by Brocade
WHITE PAPER: IP addresses are being nearly depleted due to the immense popularity of the internet and the need to have a unique IP address to identify each device using it. Running out of internet addresses would have disastrous effects.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Brocade

Clarifying WAN Virtualization, WAN Aggregation and WAN Optimization
sponsored by Talari_DON'T USE
EGUIDE: Wide area network (WAN) virtualization, WAN optimization, and WAN aggregation are three confusing areas in the WAN world. Check out this E-Guide to learn more about WAN virtualization and the difference between these three technologies.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

Talari_DON'T USE

Cisco Prime Network Registrar
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about a solution that will help you simplify the management of IP addresses and ease your transition to IPv6.
Posted: 02 Jul 2012 | Published: 29 Feb 2012

Cisco Systems, Inc.