TITLE

Cable modem bandwidth management

AUTHOR(S)
Krauss, Jeffrey
PUB. DATE
July 2003
SOURCE
CED;Jul2003, Vol. 29 Issue 7, p50
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on cable modem bandwidth management. Detection of peer-to-peer file sharing; Email preference applications.
ACCESSION #
10171789

 

Related Articles

  • Peer-to-Peer Networking. Joyce, John // Scientific Computing & Instrumentation;Jul2001, Vol. 18 Issue 8, p12 

    Presents an overview of peer-to-peer (P2P) networking and applications. Effect of the growth of the Internet on P2P; Application that takes advantage of P2P resources; Views on P2P.

  • PEER-2-PEERING INTO THE FUTURE. Millard, Elizabeth // ABA Journal;Mar2002, Vol. 88 Issue 3, p66 

    Focuses on the peer-to-peer (P2P) technology, which lets users access each other's files without having to store the information in a central place such as a company mainframe. Information on NextPage's Matrix P2P application; Security problem with P2P technology; Benefits of P2P technology to...

  • Ad Hoc and P2P Security. Shieh, Shiuhpyng W.; Wallach, Dan S. // IEEE Internet Computing;Nov/Dec2005, Vol. 9 Issue 6, p14 

    Introduces a series of articles on P2P and ad hoc networking.

  • Peer pressure. Els, Frik // Finance Week;5/12/2003, p50 

    Focuses on peer-to-peer networks. Effects of new technology on an industry; Contribution of each peer to the network.

  • Understanding peer-to-peer computing. Edwards, Morris // Communications News;Oct2001, Vol. 38 Issue 10, p71 

    Provides information on peer-to-peer (P2P) computing. Concept of P2P computing; Early uses of P2P computing; Promise holds by P2P for software interaction.

  • File-sharing warnings. Andress, Mandy // InfoWorld;3/25/2002, Vol. 24 Issue 12, p30 

    Comments on the risk of peer-to-peer file sharing programs on the security of computer networks. Denial of service attack on Morpheus network; Vulnerability of users connected to a file-sharing network; Factors to consider in protecting the network from file-sharing applications.

  • Appendix D: Overview of Peer-to-Peer (P2P) Networks.  // Defending the Brand;2004, p235 

    Information on different frameworks for a peer-to-peer network that relate to topics discussed in the book "Defending the Brand" is presented.

  • Peer-to-peer. Connolly, P. J. // InfoWorld;1/7/2002, Vol. 24 Issue 1, p35 

    Focuses on the emergence and the effect of peer-to-peer file sharing technology on business collaboration. Challenging area where the technology can be used; Concerns on security and architecture in relation to the technology.

  • CITYTEL SELECTS SANDVINE TO MANAGE FILE SHARING TRAFFIC.  // Worldwide Telecom;Mar2004, Vol. 16 Issue 3, p6 

    Reports on the selection of Sandvine Peer-To-Peer Policy Management by CityTel to minimize the impact of file sharing traffic on its broadband network.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sign out of this library

Other Topics