IT Management  >   Systems Operations  >   Network Management  >   Network Traffic Management  >   Internet Traffic Management  >  

Packet Shaping

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PacketHound, Network Traffic Shaping, Traffic Shaping
DEFINITION: PacketHound is a product that aims to help an enterprise regulate traffic that might otherwise slow services down for all users of a local area network. PacketHound is intended to address the concern of businesses and universities about the downloading of large files, especially music files in the MP3 format, using Napster, Gnutella, and similar approaches. PacketHound can also monitor and reduce  … 
Definition continues below.
Packet ShapingMultimedia (View All Report Types)
101 - 125 of 378 Matches Previous Page  | Next Page
E2 Radio Show: The Power of 10G Top-of-Rack Networking
sponsored by Dell, Inc.
PODCAST: Download this podcast to learn how a 10G top-of-rack network infrastructure can be the tie that binds your virtualized system together – if designed, deployed, and managed properly.
Posted: 26 Jun 2012 | Premiered: Apr 10, 2012

Dell, Inc.

Embrace BYOD While Keeping Devices and Data Secure
sponsored by IBM
VIDEO: Find out how you can keep all devices and company data secure to make BYOD a success.
Posted: 08 Sep 2014 | Premiered: 08 Sep 2014

IBM

EMC* Talks About Intel Open FCoE Technology
sponsored by Insight & Intel
WEBCAST: This brief resource explores the relationship between networking and storage, and explores how these adapters can integrate seamlessly with your current Ethernet network.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Insight & Intel

Emerging Expectations of CIO's
sponsored by FrontRange Solutions Inc.
WEBCAST: Consult this on-demand webcast today to learn about the role and expectations of the modern CIO, and find out what skills and competencies are required to be successful in the position.
Posted: 03 Jul 2013 | Premiered: Mar 27, 2013

FrontRange Solutions Inc.

Enable an Enterprise-Ready Sync/Share Solution while Maintaining Data Security
sponsored by Code42
WEBCAST: For IT today, allowing users uninhabited access to files – while maintaining data integrity – becomes a difficult balancing act. Click through and join Code42 and IDC Senior Research Analyst Vanessa Thompson to learn how to more effectively and efficiently balance IT requirements and user needs, and more.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Code42

Enable clients to communicate freely with UC & C
sponsored by Dimension Data
WEBCAST: This exclusive webcast shows you the basics of UC & C as well as key business drivers for new technology. View now to learn more.
Posted: 14 Nov 2014 | Premiered: Nov 14, 2014

Dimension Data

End-to-End System Performance: Delivering Continuity and Reliability
sponsored by Dell, Inc.
VIDEO: It's the goal of every IT leader to hit the timelines set forth in planning and executing a project – but for a global sporting event, the pressure is paramount. Learn from those who were in the trenches about the solutions used, to ensure everyone involved had the best experience possible.
Posted: 29 Aug 2014 | Premiered: 29 Aug 2014

Dell, Inc.

ESG Study - Citrix and HP Help Deliver Alternative Desktop Solutions
sponsored by Citrix and HP
VIDEO: Watch this webcast to learn about a desktop virtualization combined solution that will enable you to move, manage, and secure virtual desktops and components from a central location.
Posted: 03 Jun 2014 | Premiered: 29 May 2014

Citrix and HP

Evaluate Your Infrastructure Management Strategy
sponsored by CA Technologies.
SOFTWARE DOWNLOAD: This registration form allows IT professionals considering CA Nimsoft Monitor to request a full trial version of the tool.
Posted: 04 Jun 2014 | Premiered: 04 Jun 2014

CA Technologies.

Expert Insights on Web Performance and Acceleration
sponsored by Limelight Networks, Inc.
WEBCAST: This brief resource explores top strategies for optimizing your website performance and outlines how testing your real end-user experience can help you solve these problems.
Posted: 05 May 2014 | Premiered: May 5, 2014

Limelight Networks, Inc.

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner

Enabling the Journey to-IT-as-a-Service
sponsored by Citrix
WEBCAST: This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

End-to-End Mobile Device Management
sponsored by Zenprise
WEBCAST: Watch this brief video to learn how you can say yes to consumerization, letting your employees bring their beloved devices to the workplace, while also maintaining the vital security you need.
Posted: 08 Mar 2012 | Premiered: Mar 8, 2012

Zenprise

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Enterprise Content Delivery Networks (ECDNs) Explained
sponsored by AT&T Corp
VIDEO: By preventing network congestion, enterprise content delivery networks (ECDNs) make it easier for users to access live video, on-demand training materials and other graphics-intensive presentations. AT&T’s Ethan Fox, Director of Product Management for Digital Media Solutions, explains how ECDNs help resolve the challenges posed by rich media.
Posted: 04 Aug 2010 | Premiered: 04 Aug 2010

AT&T Corp

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

Ethernet and VPN in the WAN
sponsored by AT&T Corp
PODCAST: Network-based IP VPN and Ethernet WAN services are two of the most popular WAN connectivity options for enterprises and medium-sized businesses. Learn if one or the other – or both – is best for your enterprise.
Posted: 16 Jan 2012 | Premiered: Jan 10, 2012

AT&T Corp

Expert Advice: 10 Questions You Need to Ask Vendors Before Making an App Delivery Solution Purchase
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: This final section of SearchEnterpriseWAN.com's three-part guide on application delivery optimization explores the guiding principles behind undertaking an ADO deployment and provides a checklist of steps and considerations you should address prior to selecting an ADO solution.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks

Expert Advice: How App Delivery Optimization Tools Can Satisfy Your Business Needs
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: In this first section of SearchEnterpriseWAN.com's three-part guide on application delivery optimization, we take a look at the business and technology issues driving ADO adoption and the benefits of deploying an ADO solution.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks

Expert Advice: The Top Considerations When Making a Vendor Shortlist
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: Part two of SearchEnterpriseWAN.com's three-part guide on application delivery optimization outlines a number of questions you should ask potential vendors to ensure you're deploying the best solution possible for your enterprise.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks

Extreme - IndentiFi
sponsored by Extreme Networks
WEBCAST: This exclusive webcast discusses wireless networking solution that allows your organization to provide your users with the wireless performance needed to seamlessly access critical applications and data, even if the workloads are media-intensive.
Posted: 03 Jun 2014 | Premiered: Jun 3, 2014

Extreme Networks

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

F5 Data Manager Trial Version
sponsored by F5 Networks
TRIAL SOFTWARE: F5 Data Manager helps you understand your file storage environment. This trial version will perform an inventory of your environment and enable you to run detailed reports that analyze which file types are being created, who is creating them, how quickly they age, and which resources they consume.
Posted: 14 Sep 2009 | Premiered: 14 Sep 2009

F5 Networks
101 - 125 of 378 Matches Previous Page    3 4 5 6 7 8    Next Page
 
PACKET SHAPING DEFINITION (continued): …  the number of streaming media files that are downloaded by network users. Both businesses and universities are concerned not only about such traffic slowing down the network for other uses, but also about the possibility of being sued by music companies for loss of intellectual property. According to Palisade Systems, the developers of PacketHound, Napster and Gnutella traffic has had a significant effect in performance on a number of university networks.Although Gnutella uses a known port number that a network firewall server could screen for, the port number can be changed by a sophisticated … 
Packet Shaping definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement