5,992 Results for:Protocol

  • Sort by: 

Comparing 7 storage network protocols

By Robert Sheldon 28 Sep 2020

Compare characteristics of common storage network protocols, such as iSCSI, Fibre Channel, FCoE, NFS, SMB/CIFS, HTTP and NVMe-oF, to decide which one is best suited to your needs. Read More

June Patch Tuesday settles two Exchange Server bugs

By Tom Walat 14 Jun 2023

Microsoft's plans for upcoming security hardening in Kerberos and Netlogon protocols will have admins busy with testing over the next several weeks. Read More

Styles, protocols and methods of microservices communication

By Clive Longbottom 17 Aug 2020

As application architectures grow in complexity, messaging must become a priority. Review the two types of microservices communication and the primary protocols involved. Read More

A Deep Dive Into Border Gateway Protocol

29 Jul 2020

This step-by-step training guides you through all the border gateway protocol components -- from how the protocol works to how to verify that it is working correctly. Read More

Databricks unveils data sharing protocol as part of data lakehouse

By Brian McKenna 26 May 2021

Databricks announces launch of open source project called Delta Sharing at Data + AI Summit, with backing of data providers and business intelligence tool suppliers Read More

Promise CEO: The three pillars of decentralised protocol testing

By Adrian Bridgwater 04 Nov 2020

This is a guest post for the Computer Weekly Developer Network written by Taariq Lewis, CEO and founder of  Promise  -- the company delivers onchain credit reputations, for the world, using digital ... Read More

Onapsis researchers detail new SAP security threats

By Arielle Waldman 09 Aug 2023

At Black Hat 2023, Onapsis researchers demonstrated how attackers could chain a series of SAP vulnerabilities impacting the P4 protocol to gain root access to a target network. Read More

An overview of 802.1X authentication methods and EAP

By Jennifer English, Lisa Phifer 31 May 2023

Enterprises use 802.1X authentication to manage their wireless LANs, and that process relies on the Extensible Authentication Protocol and its various types. Read More

7 factors to consider in network redundancy design

By David Jacobs 08 May 2023

Network pros should consider multiple factors when adding redundancy to network design, including network equipment, protocols, backup, processing and subnet connections. Read More

IoT and cryptocurrency could enable micropayments

By Bhaskar Krishnamachari 06 Feb 2023

Cryptocurrency and IoT could support micropayments that enable organizations to share IoT data, but there are some barriers that crypto protocols must overcome first. Read More