IT Management  >   Systems Operations  >   Networking  >  

Peer-to-Peer Communication

RSS Feed   
Peer-to-Peer Communication Reports
 
Gartner: Context-aware computing
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

ComputerWeekly.com

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos

IPV6: Complete these 5 Steps to Prepare
sponsored by AT&T Corp
WHITE PAPER: This paper provides guidelines to help you take advantage of the strategic opportunities IPv6 will bring, while avoiding loss of business, marketing challenges, increased SPAM activity and other potential problems.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

E-Guide: Lands' End's CIO Shares Soft-Sell Strategies for the Cloud
sponsored by Dell, Inc. and Intel®
EGUIDE: This brief expert e-guide from SearchCIO.com explains how CIO Steve Cretney successfully pitched his case for a new cloud computing model at Lands' End. Read this now and also gain leadership intuition to help you sharpen your soft skills and convince your business' leaders to share your vision, too.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Dell, Inc. and Intel®

Endpoint Security and Control
sponsored by Sophos
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos

Case Study: Jersey College
sponsored by Nextiva
CASE STUDY: In this brief case study, learn how Jersey College was in search for an alternative VoIP provider that was a reliable and cost-effective system.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Nextiva

Data Center Modernization Done Right
sponsored by Nutanix
CASE STUDY: Vendors are expanding the HCI architectures of today to include virtualization, security, networking, and even multi-cloud automation. To dive deeper into these innovations, and to read 10 stories illustrating the real-world benefits of HCI, download the following white paper.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Nutanix

The Benefits of SD-WAN with Integrated Branch Security
sponsored by Versa Networks
WHITE PAPER: Businesses with multiple branches today either manage their networking in-house or leverage a managed service provider. Discover the challenges they face as well as the benefits of SD-WAN with integrated branch security in this white paper.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Versa Networks

Where Innovation Gets to Work
sponsored by Citrix
WHITE PAPER: Inside this quick white paper, find out how CIOs and IT leaders are responding to their new roles under digital transformation – and find out how they're utilizing digital workspace technology to match the needs of their organization.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Citrix

Database Solutions Pocket Book
sponsored by Nutanix
EBOOK: Download this database solutions pocket book to discover how HCI confronts 8 of the top challenges associated with databases, and can deliver the consistent performance, availability, scalability, and management that these workloads need.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Nutanix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement