Standards  >   File Transfer Protocols  >  

Trivial File Transfer Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Trivial File Transfer Protocol Reports
 
Five Ways Deploying Windows Vista Just Got Easier
sponsored by Microsoft
TECHNICAL ARTICLE: This article explores some of the new capabilities of Windows Vista, our new set of deployment tools, and ways that you can benefit from these tools to make the process of deploying Windows Vista much easier.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

Microsoft

The Top 5 VoIP Problems and How to Solve Them
sponsored by Fluke Networks
WHITE PAPER: This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Fluke Networks

Using the ClearSight Analyzer to Troubleshoot the Top Five VoIP Problems and Troubleshoot Streaming Video
sponsored by Fluke Networks
WHITE PAPER: This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem. Read on to learn so much more.
Posted: 09 Aug 2010 | Published: 09 Aug 2010

Fluke Networks

Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
sponsored by Symantec Corporation
WHITE PAPER: Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
Posted: 05 Dec 2006 | Published: 01 Mar 2006

Symantec Corporation

Guide: 9 Steps the CIO Must Take for Successful Divestitures
sponsored by SNP America, Inc.
WHITE PAPER: Since divestitures are not considered everyday business for most organizations, they typically land on the CIO's already-full plate. But for a CIO, there can be great benefits for doing things the right way, but a wrongly done divestiture can lead to dire consequences. Inside, discover 9 steps CIOs can take to achieve a successful divestiture.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SNP America, Inc.

Presentation Transcript: Confidential Documents at Risk
sponsored by WatchDox
PRESENTATION TRANSCRIPT: Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
Posted: 24 Sep 2012 | Published: 01 Jun 2012

WatchDox

Sharing Security Intelligence: How to Build a Strong Network
sponsored by Hexis Cyber Solutions Inc
EGUIDE: This expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

Hightail Security: Securing Information in the New World
sponsored by Hightail
WHITE PAPER: The following white paper explores a file sharing solution that gives users the ability to share files easily, while providing IT with the required security infrastructure, comprehensive controls, and data tracking capabilities needed in today's data-driven business environment.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Hightail

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.
Posted: 14 Apr 2016 | Published: 31 Dec 2013

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement