Peer-to-Peer

Peer-to-Peer, or P2P, has come to describe the resource-intensive, often risky practice of Internet users sharing files with each other through a common piece of networking software, such as Limewire. Technically, peer-to-peer describes a connection between two systems that have equal rights to initiate transactions. Some companies use peer-to-peer networking for file-sharing inside their firewall. However, most enterprises forbid P2P sharing outside the network due to security and bandwidth concerns.


Articles

AllSeen Internet of Things Alliance Expands

Linux Foundation open source Internet of Things collaboration effort now boasts 50 members. More >

SDN Isn't Growing Networking, It's Slowing It Down

Infonetics Research points to SDN hesitation as having a negative impact on the buying patterns in the service provider space. More >

Network Infrastructure Concerns for Big Data

Big Data initiatives require a rethinking of current data center network infrastructure. Is your network ready to enable business analytics on a large scale? More >

More Articles >

Interviews

Why Xchanging Appointed a Head of Internet of Things

Xchanging is one of the firms aiming to lead on helping clients incorporate IoT planning into their business process integration and digitization efforts.

More >

What CIOs Should Be Thinking About But Aren't

A candid discussion with 451 Research Vice President Michelle Bailey about what’s right and what’s wrong with many IT departments today.

More >

Preparing for Tomorrow’s Network Today

Brocade's Jason Notel explains ways to bolster network functionality now to future-proof systems in order to avoid major upgrades when forward-thinking technologies become commercial products.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Related IT Downloads

network02 Evolutionary Dynamics of Complex Communications Networks

Chapter 1.2 focuses on the fundamentals of complex networks and complex network taxonomy and examples.

...

Secure Domain Name System (DNS) Deployment Guide

Securely implementing the naming structure in your shop is essential.

...

'Next Generation Wireless LANs: 802.11n and 802.11ac' Excerpt

This 10-page excerpt provides an overview and history of IEEE 802.11 technology.

...

Fundamental Filtering of IPv6 Network Traffic

In this publication, you will find non-vendor-specific provisioning of IPv6-based network traffic filtering via basic type...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date