5,993 Results for:Protocol
- Sort by:
A guide to network APIs and their use cases
11 Jan 2023An API enables communication between two applications, while a network API provides communication between the network infrastructure -- and its protocols -- and applications. Read More
Beyond Web 2.0: A Computer Weekly Downtime Upload podcast
20 Apr 2023Like others who have developed technology that powers the internet, David Holtzman, chief strategist at decentralised cyber security network Naoris Protocol, has an unusual background Read More
SSH2 vs. SSH1 and why SSH versions still matter
27 Jul 2022The Secure Shell protocol, SSH, was redesigned and released as SSH2 in 2006. While SSH1 lingers for legacy uses, find out how the protocols differ and why it's important. Read More
BGP vs. EIGRP: What's the difference?
08 Jul 2022BGP is an exterior gateway protocol optimized for routing between large networks. EIGRP is an interior gateway protocol that is well suited for routing within smaller networks. Read More
Get to know NVMe protocol basics with these related terms
31 Mar 2020NVMe is a storage protocol that has made a difference in the enterprise. When looking into NVMe and its related technologies, it can help to have these basic terms on hand. Read More
Compare low-power Wi-Fi protocols and their roles in IoT
16 Oct 2020Wi-Fi means more than faster speeds. Low-power Wi-Fi will help companies improve the efficiency of their IoT deployments, thanks to longer signal range and power consumption features. Read More
The exploitation of flaws in the HTTPS protocol
16 Apr 2019In this article in our Royal Holloway security series, Gage Boyle and Kenny Paterson consider the security weaknesses of HTTPS. The presence of “HTTPS” in a website URL provides enough confidence to consider ... Read More
NFS vs. CIFS vs. SMB: What are the differences?
29 Mar 2023There are stark differences among file sharing protocols NFS, CIFS and SMB. Compare access, application deployment, configuration and security, among other key features. Read More
Should I worry about the Constrained Application Protocol?
08 Mar 2019The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Read More
BGP tutorial: How the routing protocol works
11 Jul 2019Border Gateway Protocol is the complex routing protocol that literally makes the internet work. This tutorial walks you through how BGP functions and offers troubleshooting options. Read More