Peer-to-Peer

Peer-to-Peer, or P2P, has come to describe the resource-intensive, often risky practice of Internet users sharing files with each other through a common piece of networking software, such as Limewire. Technically, peer-to-peer describes a connection between two systems that have equal rights to initiate transactions. Some companies use peer-to-peer networking for file-sharing inside their firewall. However, most enterprises forbid P2P sharing outside the network due to security and bandwidth concerns.


Articles

Cisco CEO: Internet of Everything Will Be Worth $19 Trillion

At CES, John Chambers said the Internet of everything will be more about its impact on people's lives than the underlying technology. More >

Phone Fraud on the Rise: Report

Pindrop Security claims that call centers are losing $0.57 per call due to fraud. More >

Fault Testing in an SDN World

Cloud infrastructures and software defined networks offer many benefits, but some risks, too. How should fault testing and QA be done in an SDN environment? More >

More Articles >

Interviews

What CIOs Should Be Thinking About But Aren't

A candid discussion with 451 Research Vice President Michelle Bailey about what’s right and what’s wrong with many IT departments today.

More >

Preparing for Tomorrow’s Network Today

Brocade's Jason Notel explains ways to bolster network functionality now to future-proof systems in order to avoid major upgrades when forward-thinking technologies become commercial products.

More >

Traffic Management, Visibility Vital in the Cloud

With real-time ID, intelligent management and other tools, enterprise executives gain broad insight into how their networks are being used.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Which Web Programming Language Is Most Secure?

Security Staffing

Take a deeper look into the security of a number of the most popular programming languages, including .NET, Java, ColdFusion and ASP.

 More >

Red Hat Outlines Container Strategy

The Green Data Center in the Real World

Riverbed SteelFusion 3.0 Provides Faster Branch Office Consolidation

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

network02 Evolutionary Dynamics of Complex Communications Networks

Chapter 1.2 focuses on the fundamentals of complex networks and complex network taxonomy and examples.

...

Secure Domain Name System (DNS) Deployment Guide

Securely implementing the naming structure in your shop is essential.

...

'Next Generation Wireless LANs: 802.11n and 802.11ac' Excerpt

This 10-page excerpt provides an overview and history of IEEE 802.11 technology.

...

Fundamental Filtering of IPv6 Network Traffic

In this publication, you will find non-vendor-specific provisioning of IPv6-based network traffic filtering via basic type...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.