IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
1 - 25 of 1284 Matches Previous Page  |  Next Page
Exceed Expectations: Choose an Application Delivery Controller Based on Value
sponsored by Array Networks
RESOURCE: Discover, side-by-side, the features of two available application delivery controllers. The advantages of going with the more nimble alternative will become plain.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Array Networks

New Cloud Architectures: Fueling the Change of the WAN Landscape
sponsored by Silver Peak
EBRIEF: Learn how changing times are driving companies to adopt cloud computing, and companies who have cloud computing to deploy more of it. You'll see how companies are gaining practical and financial benefits from new and sophisticated cloud based network architectures.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Silver Peak

Your Guide to Policy-Based Virtualized Networking and Security
sponsored by Nuage Networks
WHITE PAPER: Explore ways to leverage network virtualization capabilities with open source PaaS tools so you can accelerate the provisioning of virtual networks, extend network service policies across the entire cloud environment, and more.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Nuage Networks

Expanding IT Automation Through Cross-Technology Software-Defined Networking Platforms
sponsored by Nuage Networks
WHITE PAPER: IT should deliver a variety of platforms that continuously evolve. Explore ways widespread adoption of virtualization and other technologies helps to integrate and streamline your infrastructure, so you can prepare for a digital future.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Nuage Networks

The Shift to SD-WAN
sponsored by Silver Peak
RESEARCH CONTENT: Learn how SD-WAN has enabled organizations from many fields to replace landlines and traditional WAN architectures. In this research report you will discover how organizations feel about SD-WAN, what their implementation plan is, and what they expect to achieve by making the switch.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Silver Peak

HPE BladeSystem Innovations: 20Gb Adapter
sponsored by HPE and Intel®
VIDEO: Tune into this video to discover the latest 20Gb converged fabric adapter that will empower your business to run faster IT from the local data center and fulfill all SLAs. View now to drive virtualization and other application workloads to new performance limits by delivering 20Gb connectivity between blade servers.
Posted: 23 Jun 2016 | Premiered: 25 May 2016

HPE and Intel®

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc.
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Automated Infrastructure Management Delivers Real-Time Network Visibility
sponsored by CommScope
WHITE PAPER: Discover how to gain real-time, granular visibility into the critical connectivity that drives your business with automated network infrastructure management (AIM). Access now to overcome 3 critical challenges IT managers face, and learn to drive more value out of your physical-layer investments and key data center applications with AIM.
Posted: 20 Jun 2016 | Published: 31 Dec 2015

CommScope

The Network Takes Center Stage
sponsored by IBM
EGUIDE: Pinpointing issues is becoming more challenging as networks expand and become more complex, but there are ways to monitor your network more effectively in order to spot the early warning signs of downtime. Access this special report to learn about analytics technology, outsourcing options, and more.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

IBM

Transforming the Capabilities of Norway's Largest Hospital with Avaya VENA Fabric Connect
sponsored by Avaya
CASE STUDY: Norway's largest health system wanted to reduce complexity and maintain high availability by creating a shared network of 3 hospitals, and extending virtualization to different user groups. Read this case study for the details on how they accomplished their goals.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Avaya

Modern Infrastructure E-zine – June 2016
sponsored by SearchDataCenter.com
EZINE: Are containers an open source lifeline? That remains to be seen, as the technology just might offer a saving grace to the OpenStack infrastructure. Find out how containers are impacting Openstack deployment.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

SearchDataCenter.com

NetScaler for the best XenApp/XenDesktop access and mobile experience
sponsored by Citrix
WHITE PAPER: Network virtualization and mobility are the keys to enhancing today's mobile and globally dispersed workforce. Read on to discover ten reasons to adopt an application delivery controller that empowers mobile workers.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

Citrix

Why Businesses Are Adopting Network Virtualization
sponsored by VMware
WHITE PAPER: It only takes one objective to make the move to network virtualization worth your while. But what's it mean for IT organizations? Explore the advantages and benefits that make network virtualization attractive to IT organizations and identify how it might suit your business scenario.
Posted: 15 Jun 2016 | Published: 29 Feb 2016

VMware

Consolidate your Secure Remote Access Delivery Infrastructure with One URL
sponsored by Citrix
WHITE PAPER: Many enterprises are experiencing fragmented secure remote access infrastructure primarily characterized by multiple URLs. This is creating inconsistent and poor access experiences for employees and users. Read on to discover a next-generation secure remote access solution that addresses these issues, particularly those dealing with mobility.
Posted: 14 Jun 2016 | Published: 29 May 2015

Citrix

Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Network
sponsored by Citrix
WHITE PAPER: An influx of new devices and applications, bandwidth requirements, and a lack of end-to-end visibility are causing challenges and you are not alone. Overcome these challenges and enable the secure, reliable, cost-effective delivery of applications to any user, over any network.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Citrix

Redefining Networking with Network Virtualization
sponsored by VMware
WHITE PAPER: 82% of enterprises have mapped out a hybrid cloud strategy, but there is a major road block; hardware-centric networking. Discover why legacy network infrastructures are being held back from hybrid clouds by inflexible hardware and how to move forward.
Posted: 14 Jun 2016 | Published: 29 Feb 2016

VMware

Citrix networking from the customer perspective
sponsored by Citrix
WHITE PAPER: IT teams need to securely deliver virtual applications and desktops across wide-spread networks. Explore several case studies to learn about the challenges and solutions to securely deliver these technologies across vast networks.
Posted: 13 Jun 2016 | Published: 30 Nov 2015

Citrix

Canon U.S.A. Fully Automates VMOTION and Storage VMOTION with VMTurbo
sponsored by VMTurbo
WHITE PAPER: Resource allocation is the key to succeeding in virtualized environments. Read this brief case study to learn how one company was able to implement a solution that automatically made intelligent adjustments, allowing them to expand their virtual footprint and control over a complex virtual environment.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

VMTurbo

How to Increase App Reliability & Scale Bandwidth While Lowering Network Costs
sponsored by Citrix
WHITE PAPER: See how WAN virtualization provides a solution to the overstressed WAN dilemma. Allowing enterprises to expand WAN bandwidth goes a long way towards ensuring that business critical applications remain uninterrupted – even when underlying networks are unreliable.
Posted: 10 Jun 2016 | Published: 31 Dec 2015

Citrix

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
WHITE PAPER: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace and users have more latitude to connect to any network and download apps of their choice. The expectation is that the mobility experience just works anytime, anywhere. This is causing IT to struggle to maintain control.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Laying the Groundwork for a New Level of Power over Ethernet
sponsored by CommScope
WHITE PAPER: Discover an overview of Power over Ethernet (PoE) technology, as well as recommendations to ensure that your cabling infrastructure is capable of supporting the PoE evolution.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

CommScope

Should On-Prem Apps Use SaaS Monitoring?
sponsored by New Relic
WHITE PAPER: Need better visibility into the health of the applications running in your data center? Software-as-a-service (SaaS) solutions are the best way to monitor on-prem apps and gain the freedom your team needs. Discover the top 7 reasons to use SaaS monitoring.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

New Relic

Boston College Excels With VMTurbo to Assure Performance and Intelligently Plan for Growth
sponsored by VMTurbo
CASE STUDY: What if you could increase your virtual footprint by 30% or more? That's what one of Boston's top colleges did. Read on to find out how the college was able to incease its IT staff productivity by 20% and create a viable plan to meet future demands by improving its network infrastructure.
Posted: 10 Jun 2016 | Published: 31 Dec 2015

VMTurbo

Cyber Risk Report 2016 Executive Summary
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.
Posted: 10 Jun 2016 | Published: 19 Feb 2016

Hewlett Packard Enterprise
1 - 25 of 1284 Matches Previous Page    1 2 3 4    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement