Standards  >   File Transfer Protocols  >  

Trivial File Transfer Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Trivial File Transfer ProtocolReports
 
Using the ClearSight Analyzer to Troubleshoot the Top Five VoIP Problems and Troubleshoot Streaming Video
sponsored by Fluke Networks
WHITE PAPER: This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem. Read on to learn so much more.
Posted: 09 Aug 2010 | Published: 09 Aug 2010

Fluke Networks

The Top 5 VoIP Problems and How to Solve Them
sponsored by Fluke Networks
WHITE PAPER: This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Fluke Networks

Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
sponsored by Symantec Corporation
WHITE PAPER: Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
Posted: 05 Dec 2006 | Published: 01 Mar 2006

Symantec Corporation

Five Ways Deploying Windows Vista Just Got Easier
sponsored by Microsoft
TECHNICAL ARTICLE: This article explores some of the new capabilities of Windows Vista, our new set of deployment tools, and ways that you can benefit from these tools to make the process of deploying Windows Vista much easier.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

Microsoft

Case Study: Baltika Breweries Implements Safe File Exchange System
sponsored by GlobalScape
CASE STUDY: This case study follows Baltika Breweries' experience with a comprehensive file transfer platform that could accommodate their growing security requirements.
Posted: 30 May 2014 | Published: 27 May 2014

GlobalScape

Exploring Secure File-Sharing in the Modern Enterprise
sponsored by Hightail
EGUIDE: The following expert e-guide examines why so many companies fail to secure file-sharing policies and how this trend has affected the modern enterprise. Learn what poses the biggest threat to secure file-transfers as well as how organizations can stay compliant and prepare for accidents.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

Hightail

Confidence in cloud file sharing: How to be protected and productive
sponsored by Dropbox for Business
WEBCAST: Watch this video to find out how your business can be confident that its shared files are consistently protected.
Posted: 31 Jul 2014 | Premiered: Jul 31, 2014

Dropbox for Business

Enhanced File Transfer (EFT) Trusted by the U.S. Army and Fortune 100 Companies
sponsored by GlobalScape
WHITE PAPER: This resource features a military-grade file transfer solution that ensures compliance with internal security policies and government regulations.
Posted: 23 May 2014 | Published: 31 Dec 2013

GlobalScape

File Sync and Share vs. Endpoint Backup
sponsored by Code42
WHITE PAPER: This short white paper provides insight into clearing up the confusion between backup and sync/share.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

Code42

Top 7 Use Cases for Business-Class Cloud File Sync
sponsored by eFolder
WHITE PAPER: This white paper describes the seven key areas where business-class cloud file sync can deliver value for virtually any organization, no matter size or industry. In an increasingly mobile world, providing documents that are in sync at all time is vital, and cloud file sync can deliver that.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

eFolder
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement