240 Results for:udp

  • Sort by: 

How to perform packet loss tests and how they work

By John Burke 25 Oct 2018

Network engineers have two standard systems utilities that help them check for packet loss. Learn how this is done and, should a problem prove persistent, the best next steps for troubleshooting packet loss. Read More

How to choose exactly the right data story for your audience

By Technics Publications 02 Sep 2021

A data practitioner has two jobs: tell the right data story and in the right way to win over project stakeholders, data expert Larry Burns says in his latest book. Read More

How do you enable centralized vCenter logging?

By Rob Bastiaansen 07 Jun 2018

Centralize vCenter log files with vRealize Log Insight. Configuration with vSphere is simple and enables the centralization and transmission of event and task logs. Read More

Security Think Tank: Risk of DNS attacks goes beyond websites

By Eleanor Upson 20 Feb 2017

What are the main security risks associated with DNS and how are these best mitigated? Read More

Best practices for Hyper-V template creation

By Stefani Muñoz 30 Jan 2020

Admins can streamline template creation through Hyper-V SCVMM with a few best practices, such as evaluating whether a VM is the right fit for template creation. Read More

Pass on the JSON, and choose binary encoding formats instead

By George Lawton 17 Feb 2017

Find out how developers can achieve significant performance boosts using new binary encoding formats as alternatives to JSON and XML. Read More

Why are IoT developers confused by MQTT and CoAP?

By Jonathan Fries 04 May 2017

For IoT device communication, two specialized, competing protocols stand out: MQTT and CoAP. Take a look at what they are and when to use them. Read More

What can enterprises do to prevent an IoT botnet attack?

By Judith Myerson 14 Feb 2018

An IoT botnet attack on Huawei home routers showed similarities to the Mirai malware. Expert Judith Myerson explains the threat and how enterprises can protect themselves. Read More

How to prevent port scan attacks

By Michael Cobb 10 Dec 2019

The popular port scan is a hacking tool that enables attackers to gather information about how corporate networks operate. Learn how to detect and prevent port scanning attacks. Read More

Arcserve acquisition plans heating up

By Sonia Lelii 01 Nov 2017

Arcserve is on the hunt to buy more companies. The data protection and recovery company already has made two acquisitions since becoming independent from CA Technologies in 2014. It bought cloud ... Read More