IT Management  >   Systems Operations  >   Networking  >  

Tunneling

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Tunneling, also known as "port forwarding," is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network. Tunneling is generally done by encapsulating the private network data and protocol information within the public network  … 
Definition continues below.
TunnelingMultimedia (View All Report Types)
76 - 100 of 272 Matches Previous Page  | Next Page
Driving Innovation to Improve the Customer Experience
sponsored by Hewlett-Packard Company
WEBCAST: This webcast breaks down 5 levels of innovation that can help your business form a better relationship with customers through this new style of IT. Watch to find out how to spark innovation among your IT team and leverage technology to help it along.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

Hewlett-Packard Company

EMC* Talks About Intel Open FCoE Technology
sponsored by Insight & Intel
WEBCAST: This brief resource explores the relationship between networking and storage, and explores how these adapters can integrate seamlessly with your current Ethernet network.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Insight & Intel

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner

ESG Study - Citrix and HP Help Deliver Alternative Desktop Solutions
sponsored by Citrix and HP
VIDEO: Watch this webcast to learn about a desktop virtualization combined solution that will enable you to move, manage, and secure virtual desktops and components from a central location.
Posted: 03 Jun 2014 | Premiered: 29 May 2014

Citrix and HP

Expert Insight on Infrastructure Performance Management
sponsored by Virtual Instruments
VIDEO: Uncover all the ins-and-outs of one infrastructure performance management technology, and find out if it's a good fit for your own business needs.
Posted: 10 Jun 2014 | Premiered: 10 Jun 2014

Virtual Instruments

Gain Instant Protection with Powerful VM Backup Software
sponsored by CommVault Systems, Inc.
WEBCAST: If you're looking to backup your virtualised datacentre and VMs, check out this webcast from CommVault, and learn how one of the leading dental service organizations in the US found a way to backup and manage their more than 400 virtual machines by choosing the right backup software.
Posted: 08 May 2014 | Premiered: Sep 3, 2013

CommVault Systems, Inc.

Gaining a 30,000 Foot View Into Your Portfolio: Insights Into Portfolio Management from Air Traffic Control
sponsored by Innotas
WEBCAST: View this on-demand webinar, featuring Mark Mullaly, President of Interthink Consulting and author of PM.com's "Project Management in Practice" column, to learn what it takes to successfully implement a portfolio management solution, and how a different perspective could be your biggest asset.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Innotas

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Enabling the Journey to-IT-as-a-Service
sponsored by Citrix
WEBCAST: This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Enterprise Content Delivery Networks (ECDNs) Explained
sponsored by AT&T Corp
VIDEO: By preventing network congestion, enterprise content delivery networks (ECDNs) make it easier for users to access live video, on-demand training materials and other graphics-intensive presentations. AT&T’s Ethan Fox, Director of Product Management for Digital Media Solutions, explains how ECDNs help resolve the challenges posed by rich media.
Posted: 04 Aug 2010 | Premiered: 04 Aug 2010

AT&T Corp

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

Ethernet and VPN in the WAN
sponsored by AT&T Corp
PODCAST: Network-based IP VPN and Ethernet WAN services are two of the most popular WAN connectivity options for enterprises and medium-sized businesses. Learn if one or the other – or both – is best for your enterprise.
Posted: 16 Jan 2012 | Premiered: Jan 10, 2012

AT&T Corp

Evolution to the Cloud
sponsored by Ciena
WEBCAST: Learn – in less than six minutes – about a cloud approach that can be labelled a “data centre without walls,” enabling a virtual capacity that is both distance-independent and dynamically scalable. View now to learn the cost- and productivity benefits this approach can offer your organisation.
Posted: 29 May 2012 | Premiered: May 29, 2012

Ciena

Expert Advice: 10 Questions You Need to Ask Vendors Before Making an App Delivery Solution Purchase
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: This final section of SearchEnterpriseWAN.com's three-part guide on application delivery optimization explores the guiding principles behind undertaking an ADO deployment and provides a checklist of steps and considerations you should address prior to selecting an ADO solution.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks

Expert Advice: How App Delivery Optimization Tools Can Satisfy Your Business Needs
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: In this first section of SearchEnterpriseWAN.com's three-part guide on application delivery optimization, we take a look at the business and technology issues driving ADO adoption and the benefits of deploying an ADO solution.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks

Expert Advice: The Top Considerations When Making a Vendor Shortlist
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: Part two of SearchEnterpriseWAN.com's three-part guide on application delivery optimization outlines a number of questions you should ask potential vendors to ensure you're deploying the best solution possible for your enterprise.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

From Batch Processing to Workload Automation
sponsored by BMC Software, Inc.
PODCAST: Download this podcast to find out how IT workload automation can help you improve the efficiency of your overall operations and help your business deliver new applications more quickly.
Posted: 26 Jan 2010 | Premiered: Jan 26, 2010

BMC Software, Inc.

Gaining a Key Competitive Edge in the MSP Marketplace
sponsored by Autotask Corporation
VIDEO: This brief video describes a product that will bring accountability to your organization.
Posted: 29 Jan 2014 | Premiered: 29 Jan 2014

Autotask Corporation

Gartner: The Need for Next-Generation WAN Optimization Solutions
sponsored by BlueCoat
PODCAST: Join Gartner Research VP Joe Skorupa as he navigates technical considerations and offers new ways to address your quality of service objectives. Learn how next generation WAN Op solutions can significantly reduce bandwidth costs, enable new SaaS and video initiatives, and optimize access to new business tools.
Posted: 30 Aug 2011 | Premiered: Aug 30, 2011

BlueCoat

Get Quick & Easy Access to IT Staffing with IM Link
sponsored by Ingram Micro
WEBCAST: This webcast covers an IT staffing service that will help fill in the holes in your understaffed IT department however you need it, and without breaking the bank.
Posted: 12 Dec 2013 | Premiered: Oct 25, 2013

Ingram Micro

Get the Straight Story on Ethernet Fabrics
sponsored by Brocade
VIDEO: Every new IT technology offers many opportunities, but also brings along its own challenges. Access this brief video to discover why Ethernet is no different, and why you must adapt and learn the ins and outs of the technology before gaining the benefits.
Posted: 24 Feb 2012 | Premiered: 06 Sep 2011

Brocade

GFI MAX Building Blocks & MSP University Podcast
sponsored by GFI Software
PODCAST: This podcast discusses how GFI MAX Building Blocks methodology can help you overcome challenges with converting your clients in Managed Services and start making money.
Posted: 10 Dec 2010 | Premiered: Dec 10, 2010

GFI Software
76 - 100 of 272 Matches Previous Page    2 3 4 5 6 7    Next Page
 
TUNNELING DEFINITION (continued): …  transmission units so that the private network protocol information appears to the public network as data. Tunneling allows the use of the Internet, which is a public network, to convey data on behalf of a private network.One approach to tunneling is the Point-to-Point Tunneling Protocol (PPTP) developed by Microsoft and several other companies. The PPTP keeps proprietary data reasonably secure, even though part of the path(s) between or among end users exists in public communication channels. The PPTP makes it possible for authorized users to gain access to a private network - called a virtual … 
Tunneling definition sponsored by SearchEnterpriseWAN.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement