Searching all of TechTarget| 17,789 results for "protocol"

protocol: In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a ...

See all definition search results provided by


By Kevin Beaver Evaluate Jun 19, 2015

Can eavesdropping over the SS7 protocol be prevented?

Recently revealed insecurities in SS7 have left many unsure about the well-used protocol needed for phone connections. However, the answer to achieving security is not easily obtained. Continue Reading


By Andrew Reichman Evaluate Apr 30, 2015

Evaluating storage protocols for your virtual server environment

The storage networking protocols available for virtual servers differ from those available for physical servers. Here's how to weigh your options. Continue Reading


By Sue Troy Evaluate Mar 19, 2015

Disruptive tech and its impact on wireless protocols and networks

How are disruptive technology trends like BYOD and IoT impacting wireless networks? Networking expert Craig Mathias explains in this Q&A. Continue Reading


By Tom Fenton Get Started Apr 28, 2015

What are protocol endpoints in vSphere VVOLs and how do they work?

VMware's new VVOLs feature allows storage functionality to be distributed on a per-VM basis. Protocol endpoints are integral to proper allocation. Continue Reading


By Antony Adshead Apr 22, 2015

Load DynamiX adds OpenStack protocols to storage testing product

Storage testing and validation provider adds OpenStack Swift and Cinder support to existing protocols in its Enterprise version 2.6 hardware Continue Reading


Evaluate Jul 31, 2014

What not to believe when choosing a storage protocol

According to expert Howard Marks, a lot of claims about storage protocols are not true. Learn what to consider when choosing one for your virtual environment in this video. Continue Reading


By Warwick Ashford Dec 09, 2014

Fido publishes final spec of password-killing protocol

The Fido Alliance has published the final technical specification of its password-killing authentication standards Continue Reading


By Michelle McNickle Aug 28, 2014

Five SDN protocols other than OpenFlow

OpenFlow is the earliest standard interface defined between the control and forwarding layers of SDN architecture, but issues exist with security, scalability and the need for specialized hardware. We found five ... Continue Reading


By Warwick Ashford Oct 27, 2014

Final specification for Fido password-killing protocol imminent

The specification for a password-killing authentication protocol is imminent, says a founding member of the Fido Alliance Continue Reading


Jan 22, 2015

Enterprise IoT protocols for security: Share your thoughts on Twitter

As the Internet of Things gains traction, is your organization prepared? Discuss enterprise IoT protocols for security in #CIOChat Jan. 28 at 3 p.m. EST. Continue Reading