5,993 Results for:Protocol

  • Sort by: 

How to implement OpenID Connect for single-page applications

By Kyle Johnson, Manning Publications Co. 04 Apr 2022

The OpenID Connect authentication protocol can be used to secure a variety of applications. This excerpt teaches developers how it works with single-page applications. Read More

How can IT use the OAuth 2.0 protocol for iOS 12 devices?

By Matt Schulz 28 Dec 2018

Learn about the history of OAuth and Apple and how iOS 12 changed the game for authorization. There are a few things to be wary of, too. Read More

What is the SS7 protocol and what are its security implications?

By Judith Myerson 18 May 2017

The SS7 protocol has been a source of controversy lately because of its security vulnerabilities. Expert Judith Myerson explains what the protocol is and what its issues are. Read More

Remote display protocols dictate virtual desktop experience

By Tom Howarth 24 May 2018

Citrix, VMware and Microsoft all offer remote display protocols with their VDI products. Each one brings a little something different to the table. Read More

Researchers identify 4G and 5G network protocol flaw

By Cliff Saran 26 Feb 2019

Attackers could identify the network cell a user’s device is located in and potentially steal its IMSI number Read More

What are the open source remote display protocol options?

By Tom Howarth 30 Oct 2017

Fluctuating VDI costs can catch any organization by surprise. Consider open source remote display protocols to keep the price tag low and user experience high. Read More

The present and likely future of the NVMe protocol

By Jim O'Reilly 11 Apr 2017

The NVMe and PCIe combination of protocol and interconnect was an inevitable development once solid-state drives were created, as was moving NVMe to fabrics. Read More

The role of NVMe network storage for the future

By Ryan Arel, Pearson Education 14 Mar 2022

This chapter excerpt from 'Building a Future-Proof Cloud Infrastructure' examines the role networking and storage protocols, like NVMe, could have in the remote storage market. Read More

How to use OpenID Connect for authentication

By Kyle Johnson 04 Apr 2022

OpenID Connect has become a trusted protocol to connect with identity providers. Explore how to use it for IAM, common threats to be aware of and how to connect to multiple IdPs. Read More

EchoStar Mobile launches pan-European satellite-based LoRa IoT early adopter programme

By Joe O’Halloran 05 May 2022

What is said to be unique combination of S-band satellite service with LoRa protocol is made available to unleash potential for mobile and remote connectivity and capability for millions of internet of things ... Read More