IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
NetworkingReports
1 - 25 of 1110 Matches Previous Page  | Next Page
Mobility in Financial Services
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility for financial services companies, and how taking control of the benefits of mobility today can pay off big time tomorrow. Read on to learn more.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

BlackBerry

Powering the hybrid enterprise
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at the hybrid enterprise, and how each must develop new strategies for optimizing multiple kinds of networks. Read on to learn more.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Riverbed Technology, Inc.

Mobility in Government Services
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility for organizations with strict regulatory compliance. Read on to learn more.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

BlackBerry

The New Office: A Moving Story
sponsored by Sprint
WHITE PAPER: This exclusive white paper dives into the hopes and fears that come with an office move and offers up six must-have technologies for making the move easier.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Sprint

A powerful defense against denial of service attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 16 Dec 2014 | Published: 27 Dec 2013

Citrix

SDN 101: An Introduction to Software Defined Networking
sponsored by Citrix
WHITE PAPER: This white paper highlights the key opportunities that SDN can address for your business, as well as the relationship between SDN and NV.
Posted: 16 Dec 2014 | Published: 01 May 2014

Citrix

Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Staying Secure in the Cloud: Considerations for Migrating Communications Solutions to Cloud Services
sponsored by ShoreTel
WHITE PAPER: This white paper examines security considerations for migrating communication solutions into the cloud and offers insight into how a cloud service protects your valuable data. Read on to learn more.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

ShoreTel

The Rise of the Super-User
sponsored by Telstra Global
WHITE PAPER: This exclusive research report takes an in-depth look at what users in the unified communications network find the most helpful, and more. Read on to take the first step towards a better understanding of the future for UC.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Telstra Global

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Exclusive Security Webcast: Targeted Attacks
sponsored by Vectra Networks
WEBCAST: This exclusive webcast takes an in-depth look at targeted attacks on the network and how to defend against them. View now to learn more.
Posted: 10 Dec 2014 | Premiered: Dec 10, 2014

Vectra Networks

ESG Lab Video Summary
sponsored by Vectra Networks
WHITE PAPER: In this lab report from Enterprise Strategy Group, analysts study how the Vectra X-series platform - an inside-the-network cyber attack detection and reporting platform. Read on to learn more.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Vectra Networks

Network Security Redefined
sponsored by Vectra Networks
WHITE PAPER: Access this white paper to learn how a new solution empowers you with insights to stop attacks, even while they're happening. You'll learn how this platform instantly identifies cyberattack and learns typical network traffic patterns and behaviors while remembering and correlating anomalous behaviors seen over hours, days and weeks.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Vectra Networks

Get the Most From Mobility for Individuals and Workgroups
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper explains how mobile computing has made people more aware, agile, and responsive in their personal lives - and how raised expectations in the workplace have real implications for the enterprise. Read on to learn more.
Posted: 09 Dec 2014 | Published: 03 Dec 2014

Dell, Inc. and Intel®

The Storm of Collaboration by Telstra Cloud Collaboration
sponsored by Telstra Global
VIDEO: This exclusive video explores a cloud collaboration solution that focuses on processes that deal with the individual over the enterprise with a consumption model that goes from system to service.
Posted: 09 Dec 2014 | Premiered: 03 Sep 2014

Telstra Global

Examining the converged architecture solutions
sponsored by Presidio Network Solutions
EGUIDE: Access this white paper to explore why converged infrastructures are gaining popularity and a comparison of different converged infrastructure options and the benefits they can provide.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Presidio Network Solutions

Battle of the Ethernet Switches: Cisco vs. NETGEAR
sponsored by IT Central Station
ESSENTIAL GUIDE: Have you ever wondered exactly how many options there are for purchasing enterprise level Ethernet switches? Take a look at this comprehensive list of all enterprise Ethernet switches in this expert report which includes real user reviews from IT professionals, like you.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Product vs. Product: Everything you need to know before you buy
sponsored by IT Central Station
ESSENTIAL GUIDE: When making a buying decision for Application Performance Management, it can be challenging to know which product is the best fit for you and your organization. To make your decision easier, IT Central Station is offering you a comprehensive, unbiased guide of the most popular APM products on the market today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Product Comparison: Network Performance Monitoring
sponsored by IT Central Station
ESSENTIAL GUIDE: With the number of network performance monitoring products on the market, searching for the right one for your organization can be a challenge. With IT Central Station's comprehensive report, you will find IT Professionals' honest opinions about the most popular vendors and products in network performance management today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Take Meeting Collaboration to the Next Level with Microsoft Lync Room System
sponsored by Polycom, Inc.
WHITE PAPER: Learn how the Polycom® CX8000 and Polycom® CX5100, the 360-degree panoramic room view camera with HD active speaker tracking for Lync 2013, are designed to extend the familiar desktop Lync collaboration experience into the conference room making meetings more effective and engaging
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Polycom, Inc.

Top 10 Ways to Maximize your Lync Investment
sponsored by Polycom, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at 10 ways to maximize your Lync investment.  Read on to learn more.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Polycom, Inc.
1 - 25 of 1110 Matches Previous Page    1 2 3 4    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement