Searching all of TechTarget| 17,576 results for "protocol"

protocol: In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a ...

See all definition search results provided by


By Sue Troy Evaluate Mar 19, 2015

Disruptive tech and its impact on wireless protocols and networks

How are disruptive technology trends like BYOD and IoT impacting wireless networks? Networking expert Craig Mathias explains in this Q&A. Continue Reading


By Antony Adshead Apr 22, 2015

Load DynamiX adds OpenStack protocols to storage testing product

Storage testing and validation provider adds OpenStack Swift and Cinder support to existing protocols in its Enterprise version 2.6 hardware Continue Reading


Evaluate Jul 31, 2014

What not to believe when choosing a storage protocol

According to expert Howard Marks, a lot of claims about storage protocols are not true. Learn what to consider when choosing one for your virtual environment in this video. Continue Reading


By Warwick Ashford Dec 09, 2014

Fido publishes final spec of password-killing protocol

The Fido Alliance has published the final technical specification of its password-killing authentication standards Continue Reading


By Michelle McNickle Aug 28, 2014

Five SDN protocols other than OpenFlow

OpenFlow is the earliest standard interface defined between the control and forwarding layers of SDN architecture, but issues exist with security, scalability and the need for specialized hardware. We found five ... Continue Reading


By Warwick Ashford Oct 27, 2014

Final specification for Fido password-killing protocol imminent

The specification for a password-killing authentication protocol is imminent, says a founding member of the Fido Alliance Continue Reading


Jan 22, 2015

Enterprise IoT protocols for security: Share your thoughts on Twitter

As the Internet of Things gains traction, is your organization prepared? Discuss enterprise IoT protocols for security in #CIOChat Jan. 28 at 3 p.m. EST. Continue Reading


By Shon Harris Get Started Oct 03, 2014

CISSP cryptography training: Components, protocols and authentication

Spotlight article: Shon Harris outlines the main topics in the CISSP domain on cryptography -- background information, cryptography components, digital authentication, protocols and more. Continue Reading


By Larry E. Smith, Jr. Evaluate Oct 02, 2014

Which storage protocol should I use for VMware vSphere?

There are several storage protocol options for a VMware vSphere environment. Choosing the best one for your deployment will depend on your resources and performance goals. Continue Reading


By Garry Kranz News Dec 11, 2014

Storiant adds NFS protocol support for NAS private cloud storage

Startup Storiant aims to serve the growing market for long-term cloud storage for unstructured data in regulated industries at a lower cost than public cloud storage. Continue Reading