IT Management  >   Systems Operations  >   Networking  >  

Peer-to-Peer Networks

RSS Feed    Add to Google    Add to My Yahoo!
Peer-to-Peer Networks White Papers (View All Report Types)
 
IPV6: Complete these 5 Steps to Prepare
sponsored by AT&T Corp
WHITE PAPER: This paper provides guidelines to help you take advantage of the strategic opportunities IPv6 will bring, while avoiding loss of business, marketing challenges, increased SPAM activity and other potential problems.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

Potentially Unwanted Programs: Spyware and Adware
sponsored by Intel Security
WHITE PAPER: Potentially unwanted programs (PUPs) like adware and malware can compromise your computer network's privacy and security and the associated risks can weaken your entire network. Read this white paper to learn how to effectively protect against PUPs.
Posted: 27 Mar 2007 | Published: 01 Oct 2005

Intel Security

Unchain Your Network with Application Intelligence and Control
sponsored by SonicWALL
WHITE PAPER: This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

White Paper: Controlling Recreational Peer-to-Peer Traffic to Improve Application Performance
sponsored by Exinda Networks
WHITE PAPER: This white paper provides a practical overview on the evolution of recreational P2P traffic, how it is impacting corporate networks and, offers specific recommendations for controlling these recreational applications.
Posted: 18 Apr 2008 | Published: 01 Apr 2008

Exinda Networks

Filtering the Spectrum of Internet Threats: Defending against Inappropriate Content, Spyware, IM and P2P at the Perimeter
sponsored by St. Bernard Software
WHITE PAPER: This paper reviews how a perimeter network security appliance can be well suited for SMBs because it lowers total cost of ownership with rapid deployment and ease of configuration, and provides a secure and stable appliance-based solution.
Posted: 20 Feb 2006 | Published: 01 Jan 2005

St. Bernard Software

Unauthorized Applications: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos, Inc.

Passive Optical LAN for Hospitality, Communications, and Entertainment Services
sponsored by Nokia
WHITE PAPER: Learn how to support guest services with POL to improve hotel operations and guest experiences. Discover how POL and GPON outperform Ethernet LAN in a variety of areas to enhance network capacity, costs, security, energy use, and more.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Nokia

Mobile Device Inventory: The First Step in Enterprise Mobile Management
sponsored by Snow Software
WHITE PAPER: Read on to examine the need for collecting and reporting on mobile inventory and how it needs to be part of an enterprise-wide software asset management (SAM) program. You'll discover a maturity path for managing mobile devices in a SAM context, and more inside.
Posted: 12 Oct 2017 | Published: 31 Dec 2016

Snow Software

How to Prepare for Exchange 2016, SharePoint 2016 and Office 365
sponsored by Quest
WHITE PAPER: Migration projects aren't exactly easy, but your organization wants to move to Exchange 2016, SharePoint 2016 or Office 365, and it is your job to make that happen. Here's the catch: It doesn't have to be time consuming--if you have the right strategy in place. Access this white paper to plan your migration
Posted: 14 Aug 2017 | Published: 23 Feb 2016

Quest

Trust Must Be the Foundation of Your B2B Digital Ecosystem
sponsored by IBM
WHITE PAPER: Successful management of your digital business and ecosystems is not founded on technology, but trust. This 19 page Forrester report explores the fundamental role that trust plays in your digital transformation, focusing on the role of trust in the business-to-business context.
Posted: 11 Sep 2017 | Published: 29 Mar 2017

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement