5,993 Results for:Protocol
- Sort by:
SNMP vs. CMIP: What's the difference?
07 Apr 2020While SNMP and CMIP originally competed as network management protocols in the 1980s, SNMP has emerged as the more relevant protocol, largely due to its simplicity. Read More
Internet security protocol bodies ISOC, OTA announce merger
05 Apr 2017The two leading internet security protocol bodies, Online Trust Alliance and Internet Society, merge to work for improved IoT security and online security. Read More
Will nonprofit's evolution of zero trust secure consumer data?
31 Mar 2020An Australian nonprofit aims to deliver an improved security protocol through what it calls a 'true zero-trust custody layer.' Will the protocol improve consumer data protection? Read More
Are there alternatives to the OpenFlow protocol?
29 Aug 2013Jason Edelman explains OpenFlow protocol alternatives and what's important in determining which southbound protocol will work for you. Read More
What are protocol endpoints in vSphere VVOLs and how do they work?
28 Apr 2015VMware's new VVOLs feature allows storage functionality to be distributed on a per-VM basis. Protocol endpoints are integral to proper allocation. Read More
Classical internet vs. quantum internet: How do they differ?
28 Feb 2024The quantum internet is a hypothetical secure network made of qubits. It differs from the classical internet with its use of quantum principles for enhanced security and computing. Read More
Covid-19: TechUK urges government to tweak self-isolation policy for critical datacentre workers
30 Jul 2021TechUK wants datacentre operators to be allowed to run their own "test and release" protocols for Covid-negative workers that have been told to self-isolate by NHS Track and Trace Read More
How to use the LFTP client to download files
14 Mar 2024The open source LFTP client supports multiple file transport types, such as FTP and HTTPS, enabling administrators to use a single interface to upload and download files. Read More
How SolarWinds attack will change CISOs' priorities
12 Feb 2021Following cybersecurity best practices used to be enough, but after the SolarWinds supply chain attack, CISOs now have to rethink all their security protocols. Read More