ComputerWeekly.com Research Library

Powered by Bitpipe.com

Peer-to-Peer Networking Research

  • Gartner: Context-aware computing

    Sponsored by: ComputerWeekly.com

    Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media.

  • E-Guide: Lands' End's CIO Shares Soft-Sell Strategies for the Cloud

    Sponsored by: Dell, Inc. and Intel®

    This brief expert e-guide from SearchCIO.com explains how CIO Steve Cretney successfully pitched his case for a new cloud computing model at Lands' End. Read this now and also gain leadership intuition to help you sharpen your soft skills and convince your business' leaders to share your vision, too.

  • IPV6: Complete these 5 Steps to Prepare

    Sponsored by: AT&T Corp

    This paper provides guidelines to help you take advantage of the strategic opportunities IPv6 will bring, while avoiding loss of business, marketing challenges, increased SPAM activity and other potential problems.

  • Application Discovery Tool

    Sponsored by: Sophos

    With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.

  • Endpoint Security and Control

    Sponsored by: Sophos

    Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.