Searching all of TechTarget| 19,750 results for "protocol"

protocol: In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a ...

See all definition search results provided by WhatIs.com

IoT Agenda

By Sally Johnson Evaluate Jun 20, 2016

Constrained Application Protocol: CoAP is IoT's 'modern' protocol

CoAP is taking the place of older, 'heavy' protocols and helping bring the promise of the internet of things to constrained, low-power devices. Continue Reading

SearchVirtualDesktop

By Eddie Lockhart Get Started Jul 28, 2016

SearchVirtualDesktop

By Eddie Lockhart Get Started Jul 28, 2016

Four valuable Citrix HDX protocol features

Citrix HDX protocol allows VDI shops to deliver HD quality virtual desktops and apps to users. It combines data deduplication, mobile SDKs, USB redirection and more. Continue Reading

IoT Agenda

By Carl Rodrigues Get Started Jul 14, 2016

A protocol-agnostic approach for augmenting the value of the IoT

Creating a protocol-agnostic environment for the internet of things is critical for enterprises to achieve success in today's increasingly connected world. Continue Reading

SearchStorage

By Carol Sliwa News Aug 24, 2016

Caringo Swarm gets new software-based NFS protocol converter

Caringo released a new SwarmNFS protocol converter that directly integrates with its scale-out object storage and aims to eliminate the need for separate file gateway hardware. Continue Reading

SearchUnifiedCommunications

By Jon Arnold Get Started Mar 09, 2016

How to buy Voice over Internet Protocol services

The emergence of Voice over Internet Protocol (VoIP) revolutionized communications in business. The ability to merge traditional voice telephony with Web-based data streams yielded higher productivity and lower ... Continue Reading

SearchSecurity

By Peter Loshin News Aug 05, 2016

Security of HTTP/2 protocol takes big hit at Black Hat 2016

Black Hat researchers report flaws in key web protocols, demonstrating widespread flaws in HTTP/2 implementations; Banner Health announces breach affecting 3.7 million. Continue Reading

SearchSecurity

By Michael Cobb Evaluate May 06, 2016

How can Kerberos protocol vulnerabilities be mitigated?

Microsoft's Kerberos protocol implementation has long-standing issues with its secret keys. Expert Michael Cobb explains how to mitigate the authentication vulnerabilities. Continue Reading

ComputerWeekly

By Warwick Ashford Jul 22, 2016

Tech firms tackle IoT security with management protocol

A group of tech firms have joined forces to develop a management protocol for IoT devices that could pave the way to an open, interoperable standard to address security and privacy risks Continue Reading

SearchHealthIT

By Shaun Sutner News Apr 25, 2016

HIPAA audit protocol signals audit process underway

As it prepares to launch audits of healthcare organizations and their business associates, OCR issues audit protocol as a guide to compliance with HIPAA security and privacy rules. Continue Reading