December 29, 2017
Protocol scrutiny is good for the upcoming TLS 1.3 update as the process continues to expose, and fix, problems.
February 17, 2017
Find out how developers can achieve significant performance boosts using new binary encoding formats as alternatives to JSON and XML.
February 01, 2017
This week, bloggers look into whether dropped packets are better than delayed packets, discuss cloud-based shadow IT and clarify the meaning of microservices.
June 23, 2016
This week, bloggers explore Avaya VSP updates, the federal Software Assurance Marketplace and packet loss with TCP.
TCP Get Started
Bring yourself up to speed with our introductory content
A persistent connection (HTTP persistent connection) is a network communication channel that remains open for further HTTP requests and responses rather than closing after a single exchange. Continue Reading
VMware's vSphere 6 is one of the first major products to support NFS 4.1, but the benefits may not outweigh the risks to use this storage protocol. Continue Reading
Windows Sysinternals can help admins manage, diagnose, troubleshoot and monitor a Windows environment. Here's a look at the different utilities. Continue Reading
Evaluate TCP Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When it comes to using TCP or UDP for sending packets of data through a network across devices, IT must know the differences and when each option is a good fit. Continue Reading
Getting firewall settings right is one of the most basic ways to protect enterprise data from accidental exposures. Expert Judith Myerson discusses how to review firewall policies. Continue Reading
New load-balancing options from AWS control traffic according to administrator needs, which increasingly revolve around hybrid cloud workloads. Continue Reading
Learn to apply best practices and optimize your operations.
Enterprises can deploy IPv6 addresses to improve privacy and security, but there are stability and usage considerations. Expert Fernando Gont explains what they are. Continue Reading
TCP port scanning detects vulnerabilities within networks, and knowing the different scans available can help network professionals choose the option best suited for their needs. Continue Reading
Cloud-based or on-premises application delivery platforms are growing in importance to enterprises. Once called 'load balancers,' the more common terms are 'application delivery controllers,' or ADC, or even 'application delivery platforms,' or ADP. Whatever they are called, they are needed to ensure high performance of enterprise app delivery.
As network technologies and demands have evolved, the trusty ADC or ADP has changed along with it. They still manage the flow of traffic between enterprise systems and users and perform myriad other functions, but the amount of traffic and the number of users they support has soared. The latest ADPs scale and perform advanced functions. This handbook examines how the newest technology in this category delivers applications to any user on any device, and how they work in conjunction with other systems and processes, including software-defined networking, or SDN.Continue Reading
Problem Solve TCP Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains how to detect and defend such attacks. Continue Reading
Malware implants RedLeaves and PlugX infected networked systems in multiple industries and leveraged stolen administrator credentials. Expert Judith Myerson explains how it works. Continue Reading
A Linux vulnerability that affects 80% of Android devices allows for attacks on TCP communications and remote code execution. Expert Michael Cobb explains how to mitigate these risks. Continue Reading