This also transforms any TPM-enabled Banias processor-based notebook PC into a "digital credential" that can then be used to perform many e-business functions in the corporate IT environment, such as single sign-on, more secure remote access, and trusted peer-to-peer computing
The Peer-to-Peer Working Group (P2PWG) was created to facilitate and accelerate the advancement of peer-to-peer computing
and the peer-to-peer community at-large.
Devices enabled with ZeoSphere also can communicate device-to-device regardless of a connection to the enterprise achieving true peer-to-peer computing
Sessions focus on digital libraries, stories and scholarship, hypertext analysis, novel interfaces, authoring and annotation, ubiquitous hypermedia, foundations, hypertext through time, hyperstructure, synthetic hypertext and hyperfiction, hypertext versioning, spatial hypertext, and peer-to-peer computing
The conference will be a venue for dialogue, debate and active learning as attendees explore issues in the fields of wireless, Internet security, peer-to-peer computing
International Conference of Peer-To-Peer Computing
(5th: 2005: Konstanz, Germany) Ed.
These ID cards then can be used for secure sign-on, secure remote access, trusted peer-to-peer computing
and other high-value applications.
Other themes are high availability in distributed systems, grid and peer-to-peer computing
impacts on large scale heterogeneous distributed database systems, theory and applications of knowledge management, and geographic information management.
Papers from a November 2005 conference detail recent research in peer-to-peer computing
, QoS, sensors and radio, storage and distribution, traffic characterization, and routing, as well as traffic control, power efficiency, LAN network security, and wireless and ad hoc.
Our analysis going into this round of funding suggests that PartSage may be as much as 12 to 18 months ahead of the competition with it's fully distributed peer-to-peer computing
and communications architecture," says Carrescia.