IT Management  >   Systems Operations  >   Networking  >  


RSS Feed   
P2P White Papers (View All Report Types)
IPV6: Complete these 5 Steps to Prepare
sponsored by AT&T Corp
WHITE PAPER: This paper provides guidelines to help you take advantage of the strategic opportunities IPv6 will bring, while avoiding loss of business, marketing challenges, increased SPAM activity and other potential problems.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

Unchain Your Network with Application Intelligence and Control
sponsored by SonicWALL
WHITE PAPER: This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.
Posted: 24 Feb 2011 | Published: 24 Feb 2011


White Paper: Controlling Recreational Peer-to-Peer Traffic to Improve Application Performance
sponsored by Exinda Networks
WHITE PAPER: This white paper provides a practical overview on the evolution of recreational P2P traffic, how it is impacting corporate networks and, offers specific recommendations for controlling these recreational applications.
Posted: 18 Apr 2008 | Published: 01 Apr 2008

Exinda Networks

Potentially Unwanted Programs: Spyware and Adware
sponsored by Intel Security
WHITE PAPER: Potentially unwanted programs (PUPs) like adware and malware can compromise your computer network's privacy and security and the associated risks can weaken your entire network. Read this white paper to learn how to effectively protect against PUPs.
Posted: 27 Mar 2007 | Published: 01 Oct 2005

Intel Security

Filtering the Spectrum of Internet Threats: Defending against Inappropriate Content, Spyware, IM and P2P at the Perimeter
sponsored by St. Bernard Software
WHITE PAPER: This paper reviews how a perimeter network security appliance can be well suited for SMBs because it lowers total cost of ownership with rapid deployment and ease of configuration, and provides a secure and stable appliance-based solution.
Posted: 20 Feb 2006 | Published: 01 Jan 2005

St. Bernard Software

Unauthorized Applications: Taking Back Control
sponsored by Sophos
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007


Single SDN Fabric for Multi-Container Ecosystem
sponsored by Big Switch Networks
WHITE PAPER: This white paper explores a container-ready next generation networking tool based on an SDN-based leafspine fabric architecture that is deployed on open network hardware to work within budgets without sacrificing innovation.
Posted: 26 Jan 2018 | Published: 31 Jan 2017

Big Switch Networks

Oceanstor Dorado V3 NVME All-Flash Storage: The Best Choice for SAP HANA
sponsored by Huawei Corporation
WHITE PAPER: Read this white paper to learn how the features of the Dorado V3 makes it the ideal choice for SAP HANA.
Posted: 26 Dec 2017 | Published: 26 Dec 2017

TOPICS:  IT Management
Huawei Corporation

Finding Flexibility with Microservices, Containers, and Runtimes
sponsored by Red Hat
WHITE PAPER: There are pragmatic ways for developers to gain the benefits of microservice design via new programming models and frameworks. Read on as this Forrester report highlights three emerging methods, their impact, and how to leverage the outlined strategies to overcome microservices' complexity.
Posted: 07 Feb 2018 | Published: 31 Dec 2016

Red Hat

4 Fundamentals to Maximize Site Performance
sponsored by Imperva
WHITE PAPER: Don't let your current network infrastructure slow down your website. Explore 4 key fundamentals to designing a high-performing, reliable website that meets your customer expectations.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Browse by Report Type:
P2P White Papers | P2P Multimedia | P2P IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement