Peer-to-Peer Communication Reports

IPV6: Complete these 5 Steps to Prepare
sponsored by AT&T Corp
WHITE PAPER: This paper provides guidelines to help you take advantage of the strategic opportunities IPv6 will bring, while avoiding loss of business, marketing challenges, increased SPAM activity and other potential problems.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

Endpoint Security and Control
sponsored by Sophos
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos

E-Guide: Lands' End's CIO Shares Soft-Sell Strategies for the Cloud
sponsored by Dell, Inc. and Intel®
EGUIDE: This brief expert e-guide from SearchCIO.com explains how CIO Steve Cretney successfully pitched his case for a new cloud computing model at Lands' End. Read this now and also gain leadership intuition to help you sharpen your soft skills and convince your business' leaders to share your vision, too.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Dell, Inc. and Intel®

8 key characteristics of cloud computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: When it comes to building and deploying modern applications, companies rely on the cloud. From the ability to manage automation, costs, performance, compliance, and security, cloud provides flexibility that sets it apart from on-premises IT architectures. In this e-guide, explore the 8 key characteristics of cloud computing.
Posted: 07 Aug 2023 | Published: 08 Aug 2023

TechTarget ComputerWeekly.com

Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023

TechTarget ComputerWeekly.com

16 Tips for Working Smarter with Slack Apps and Workflows
sponsored by Slack
WHITE PAPER: Learn how to harness Slack's integrations and advanced features automate workflows and optimise communication.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

Speed Up Your Software Development Cycle
sponsored by Slack
WHITE PAPER: Learn how to accelerate coding and deliver more software faster.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

How Financial Services Leaders are Ramping Up Innovation While Staying Secure
sponsored by Slack
WHITE PAPER: See how Asia-Pacific financial services leaders are combining operational agility with AI-powered productivity while bolstering security and compliance.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

A Dynamic, AI-powered Approach for Employee Growth and Development that Improves Retention
sponsored by ServiceNow
WHITE PAPER: Read this paper for data-driven strategies to help your organization close talent gaps and boost employee satisfaction that will increase employee retention.
Posted: 17 Nov 2023 | Published: 17 Nov 2023

TOPICS:  IT Management
ServiceNow