IT Management  >   Systems Operations  >   Networking  >  

Peer-to-Peer Communication

RSS Feed   
Peer-to-Peer Communication Reports
 
Gartner: Context-aware computing
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

ComputerWeekly.com

QTS Peering and Data Exchange
sponsored by Quality Technology Services
WHITE PAPER: The massive growth of the internet over the past 20 years has driven a vast amount of growth in infrastructure and business, too. However, certain aspects of internet infrastructure like data exchange and peering have lacked proportional growth. Read this short resource to learn why that is and what risks this lack of growth poses.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Quality Technology Services

IPV6: Complete these 5 Steps to Prepare
sponsored by AT&T Corp
WHITE PAPER: This paper provides guidelines to help you take advantage of the strategic opportunities IPv6 will bring, while avoiding loss of business, marketing challenges, increased SPAM activity and other potential problems.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

Endpoint Security and Control
sponsored by Sophos
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos

E-Guide: Lands' End's CIO Shares Soft-Sell Strategies for the Cloud
sponsored by Dell, Inc. and Intel®
EGUIDE: This brief expert e-guide from SearchCIO.com explains how CIO Steve Cretney successfully pitched his case for a new cloud computing model at Lands' End. Read this now and also gain leadership intuition to help you sharpen your soft skills and convince your business' leaders to share your vision, too.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Dell, Inc. and Intel®

Why You Need Independent SD-WAN Visibility
sponsored by Sinefa
BOOK: As SD-WAN matures in the market, end-user organizations and the managed service providers (MSPs) that many of them rely on for WAN service management are realizing the need for new forms of network visibility. These are necessitated by blind spots created by heavy internet use. Check out this e-book to learn how to ensure visibility.
Posted: 23 Sep 2020 | Published: 23 Sep 2020

Sinefa

Berry Global, the “Game Changer,” Manages Their IT with baramundi
sponsored by Baramundi
VIDEO: When packaging industry leader Berry Global wanted to ensure that their IT systems were on the same level as their product, they turned to baramundi’s Unified Endpoint Management. Watch this video to hear from Berry company leaders themselves on how baramunid simplified and improved their endpoint and IT management processes.
Posted: 23 Sep 2020 | Premiered: 23 Sep 2020

Baramundi

Post-Pandemic- 9 stages to take back control of your assets
sponsored by Livingstone Tech
WEBCAST: COVID-19 has changed the way businesses operate. While many of these operational changes have helped keep businesses afloat throughout this crisis, other temporary strategies have scattered IT. It’s time to take control of IT again. Learn about the 9 stages you can take to get back in control of your assets post-pandemic in this video.
Posted: 23 Sep 2020 | Premiered: Sep 23, 2020

TOPICS:  IT Management
Livingstone Tech

Executive Summary 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: Threat intelligence and information has never been more valuable to businesses. As such, an IDC survey commissioned by Thales found that 45% of respondents felt that their organizations would exceed their original 2020 security budgets. In APAC, the time for action is now. Read the full threat report to see how attitudes are changing.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Thales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info