IP Networks Research
-
Proving ownership of IPv6 addresses
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
-
VoIP 101
Sponsored by: FlowrouteAlthough voice technology has been rapidly evolving, one factor has remained the same – users still expect the same high-quality call standards. In this expert e-guide, gain rewarding insight into VoIP basics including, the evolution of voice technology, how it works and how it compares to legacy telephony.
-
Can You Hear Me Now? Assessing VoIP Quality
Sponsored by: TechTarget NetworkingHow does VoIP quality measure up to 20th century standards? In this issue of Network Evolution, we look at what's driving VoIP networking development, and what users expect when it comes to voice and video quality.
-
Brave New WAN
Sponsored by: Silver PeakIn this special edition of Network Evolution, we explore how network managers can use emerging WAN technologies -- including software-defined WAN, cloud networking and next-generation firewalls -- to create networks that keep pace with enterprise needs without breaking the bank.
-
Bridge the Network Security Gap in IP Multifunction Machines
Sponsored by: HP IncIn the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.
-
A Golden Age Dawns for Network Services
Sponsored by: TechTarget NetworkingAdvanced network technology options have expanded, offering enterprises better, cheaper, options for network services. This three part guide is designed to help you understand the ongoing evolution of network services and the connectivity technologies needed to access them.
-
Which Way Now for Your WAN?
Sponsored by: TechTarget NetworkingWire area networks and WAN connection types have evolved. In this technical guide, learn whether your WAN is what it needs to be.
-
Readying the Data Center for the Internet of Things
Sponsored by: TechTarget NetworkingThis three-part guide explains the challenges for IT professionals managing data centers in the IoT era.
-
The Problem with the Padlock
Sponsored by: TechTarget SecurityTLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
-
Opposing Forces: The Fight for Ethernet
Sponsored by: TechTarget NetworkingMost enterprises can't get the most out of 802.11ac Wave 2. The problem is Ethernet speeds in the access layer: 1 GbE is too slow and 10 GbE too expensive. Could 2.5 and 5 GbE could be its salvation?
-
Creating a Best-of-Breed DDI Solution in a Microsoft Environment
Sponsored by: InfobloxAccess this informative whitepaper and learn how you can implement effective DNS, DHCP, and IP address management (DDI).
-
The Four Elements of IS-IS
Sponsored by: Global KnowledgeThis informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).
-
The Four Elements of EIGRP
Sponsored by: Global KnowledgeEIGRP has been used successfully for many years by enterprises of all sizes, using mostly Cisco devices. It converges as fast as any other internal gateway protocol and provides features that facilitate design, implementation, and troubleshooting. Download this resource to learn more.
-
Cisco IOS Digit Manipulation
Sponsored by: Global KnowledgePlatform digit manipulation may be needed for many business phone calls as they traverse their gateways. his guide explores the role of digit manipulation techniques and various is ways it can benefit for your business.
-
Why Do Techies Tell Me to Ping a Website?
Sponsored by: Global KnowledgeThis white paper explores ping commands and flags, and how those flags vary from one operating system to another. With a better understanding of ping, organizations and home users can easily troubleshoot a network.
-
Designing IP Addresses for Large Networks
Sponsored by: Global KnowledgeComplex subnetting, VLSM, and IP address summarization can be implemented simply and efficiently with proper planning. Click through to explore why great care must be taken to complete the IP address planning process accurately to accommodate current needs and growth.
-
Converged Network, Storage and Compute Infrastructure: Are we there Yet?
Sponsored by: TechTarget NetworkingAccess this expert e-guide to learn how you can make a converged network infrastructure a reality and achieve top efficiency.
-
Avaya Fabric Connect Makes Multicast Simple (Really)
Sponsored by: AvayaThis podcast introduces an interesting solution to address the concern of legitimate use cases that haven't made multicast routing any less cumbersome to implement. Find out how you can deploy multicast routing a lot simpler using this innovative technology.
-
The New World of IP Multicasting
Sponsored by: AvayaThis resource examines the complexity of IP multicasting and an approach to overcome these limitations – delivering new levels of performance, scalability and resiliency to IP multicasting.
-
Disaster Preparedness for Core Network Services
Sponsored by: InfobloxThis white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.
-
Delivering Storage Quality of Service with Oracle Pillar Axiom 600
Sponsored by: Oracle Corporation UK LtdIn this white paper, you will discover an Oracle storage technology designed from the ground up to deliver business-critical, guaranteed quality of service consistent with the business value of the application and its data.
-
IPv6 Addressing Plan Basics
Sponsored by: InfobloxCreating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!
-
Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
Sponsored by: Hewlett Packard EnterpriseUncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
-
IPv6 Timeline: The Road to a New Protocol
Sponsored by: Hewlett Packard EnterpriseThis IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today.
-
Prepare Your Network for the Future: Embrace IPv6
Sponsored by: Hewlett Packard EnterpriseThis E-Guide from SearchEnterpriseWAN.com explores the importance of IPv6 and why it should be on every enterprise's short-term to-do list. View now to uncover how this influential protocol will shape your enterprise now and in the future.