Peering Inside Cable

Stump, Matt
February 2006
Multichannel News;2/27/2006, Vol. 27 Issue 9, p44
Reports on the plans of NTL Inc. to test several servers and peer-to-peer networking in April 2006 that would recreate the Internet-download experience within a cable-system network. Computer software that will be used for the test; Capability of subscribers to download content from BitTorrent and NTL; Convenience of downloading music.


Related Articles

  • Introducing Frostwire. Taylor, Nathan // Australian PC User;May2009, Vol. 21 Issue 5, p80 

    The article reviews two computer software with peer-to-peer (P2P) technology, including the FrostWire open source client application and the LionShare application for sharing academic information.

  • Remote control P2P with eMule. Taylor, Nathan // Australian PC User;Jul2007, Vol. 19 Issue 7, p69 

    The article offers tips on using eMule Internet-based software to facilitate Web client peer-to-peer (P2P) application. With eMule, μ Torrent and certain other P2P applications, it is possible to search and start downloads remotely through a web browser. eMule even supports remote control...

  • Illegal P2P Proves To Be Resilient. Banerjee, Scott; Newman, Melinda // Billboard;5/1/2004, Vol. 116 Issue 18, p76 

    Focuses on the actions taken by companies in the music industry regarding peer-to-peer networks or illegal music file sharing. Decrease in illegal music file sharing according to the Pew Internet and American Life Project; Discussion on the available legal downloading systems of music files on...

  • Online tribes banish selfish downloaders. Buchanan, Mark // New Scientist;1/29/2005, Vol. 185 Issue 2484, p14 

    This article reports that cooperation might improve if the millions of people who share music, software and other resources in cyberspace mimicked some of the social norms of everyday life. Peer-to-peer networks such as Kazaa allow individuals to share files over the Internet without relying on...

  • Mercora Offers Unique P2P Option. Bruno, Antony // Billboard;6/25/2005, Vol. 117 Issue 26, p20 

    Focuses on the peer-to-peer radio network being used by Mercora Inc. in June 2005. Creation by the company's subscribers of playlists from their music libraries; Limitation of music tracks accessible to a user; Computer software being offered to the subscribers.

  • Napster racing iTunes to Europe. Fritz, Ben; Masson, Gordon // Daily Variety;3/4/2004, Vol. 282 Issue 49, p6 

    Focuses on the digital music business of Napster Inc. in Europe. Plans of opening a British version of Napster 2.0, the legal version of the service that launched the peer-to-peer architecture revolution; Responsibility of vice president for business development Leanne Sharman to run the...

  • iDispatcher: A unified platform for secure planet-scale information dissemination. Rahman, Md; Yan, Guanhua; Madhyastha, Harsha; Faloutsos, Michalis; Eidenbenz, Stephan; Fisk, Mike // Peer-to-Peer Networking & Applications;Mar2013, Vol. 6 Issue 1, p46 

    Traditional software and security patch update delivery mechanisms rely on a client/server approach where clients pull updates from servers regularly. This approach, however, suffers a high window of vulnerability (WOV) for clients and the risk of a single point of failure. Overlay-based...

  • IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems. Wenxian Wang; Xingshu Chen; Haizhou Wang // Journal of Networks;Oct2012, Vol. 7 Issue 10, p1624 

    Resources monitoring is an important problem of the overall efficient usage and control of P2P IPTV systems. The resources of IPTV can include all distributing servers, programs and peers. Several researches have tried to address this issue, but most of them illuminated P2P traffic...

  • A topological potential weighted community-based recommendation trust model for P2P networks. Han, Qiyi; Wen, Hong; Ren, Mengyin; Wu, Bin; Li, Shengqiang // Peer-to-Peer Networking & Applications;Nov2015, Vol. 8 Issue 6, p1048 

    Peer-to-Peer (P2P) technology has experienced its great popularity for resource sharing in current network services. However, lacking of prior experience and knowledge about other peers' reputation, P2P suffer from malicious behaviors launched by malicious peers. Developing effective strategies...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics