Trivial File Transfer Protocol Reports

Five Ways Deploying Windows Vista Just Got Easier
sponsored by Microsoft
TECHNICAL ARTICLE: This article explores some of the new capabilities of Windows Vista, our new set of deployment tools, and ways that you can benefit from these tools to make the process of deploying Windows Vista much easier.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

Microsoft

Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
sponsored by Symantec Corporation
WHITE PAPER: Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
Posted: 05 Dec 2006 | Published: 01 Mar 2006

Symantec Corporation

The Top 5 VoIP Problems and How to Solve Them
sponsored by Fluke Networks
WHITE PAPER: This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Fluke Networks

Hightail Security: Securing Information in the New World
sponsored by Hightail
WHITE PAPER: The following white paper explores a file sharing solution that gives users the ability to share files easily, while providing IT with the required security infrastructure, comprehensive controls, and data tracking capabilities needed in today's data-driven business environment.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Hightail

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

What you need in a file syncing tool
sponsored by GroupLogic
EGUIDE: File syncing is commonly used for both corporate-created data and employee-created corporate data. Finding one tool that could be used for both would be extremely helpful. In this expert E-Guide from SearchConsumerization.com, discover what you should look for in a file syncing tool.
Posted: 28 Mar 2012 | Published: 28 Mar 2012

GroupLogic

Case Study - Square Enix
sponsored by Riverbed Technology, Inc.
CASE STUDY: The Square Enix Group constructed an international business promotion structure with major development locations established in Japan, North America, and Europe, with develop data (ROM) transferring between locations on a daily basis. After adopting Steelhead appliances, Square Enix saw transfer times reduce by more than 90%.
Posted: 17 Jan 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Sharepoint WAN Optimization And WAFS
sponsored by Peer Software
WHITE PAPER: Design teams across the world collaborate to create and develop prod­ucts. Unfortunately, IT organizations face serious challenges when collaborative teams share large files. This white paper will assess the strengths and weaknesses of the four technologies most commonly used to enhance file sharing for distributed teams.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Peer Software

The Five Critical SLA Questions
sponsored by IBM
WHITE PAPER: SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

E-Guide: Steps to securing your file transfers and meeting compliance requirements
sponsored by TechTarget Security
EGUIDE: Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.
Posted: 09 Jan 2012 | Published: 09 Jan 2012

TechTarget Security