IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
1 - 25 of 1063 Matches Previous Page  |  Next Page
BYOD and Other Trends Are Boosting Motivation
sponsored by SPS Commerce, Inc.
WHITE PAPER: This resource discusses one way to embrace the engagement challenge facing enterprises today: distributed collaboration technology on individual devices.
Posted: 08 Feb 2016 | Published: 08 Feb 2016


The Top Eight Best Practices for Deploying Citrix XenApp and XenDesktop 7.6
sponsored by eG Innovations, Inc.
WEBCAST: In this webinar, you will examine the top 8 best practices for deploying Citrix XenApp and XenDesktop 7.6. Tune in now to streamline your service architecture and learn how to leverage network-level visibility for enhanced performance insight and enhance scalability for multi-media applications with GPUs.
Posted: 08 Feb 2016 | Premiered: Feb 8, 2016

eG Innovations, Inc.

Performance Monitoring for Your Virtualized Infrastructure: Considerations and Checklist
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will find a checklist of monitoring-related criteria that both enterprises and service providers should consider with due diligence when managing application performance for virtualized Citrix infrastructures.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

eG Innovations, Inc.

Protect Revenue and Emphasize User Experience with APM Tools
sponsored by eG Innovations, Inc.
EGUIDE: Looking to boost revenue and keep your customers happy with an improved user experience? Access this expert guide to learn how to leverage the latest in application performance management (APM) tools and discover a host of approaches to evaluate end-user experience across all channels.
Posted: 05 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.

Effective Mobile Strategies for Business
sponsored by Microsoft
WHITE PAPER: In this guide, you'll find mobile strategies that work for BYOD and corporate device scenarios. Discover ways to help users increase productivity, manage continuous innovation, and more.
Posted: 04 Feb 2016 | Published: 27 Nov 2015

Microsoft

Identify and Address Five Pressing Application Performance Challenges
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will learn how to identify and address 5 common Citrix XenApp and XenDesktop performance challenges, in order to deliver excellent end-user satisfaction. Access this paper to address these problems, and iron out their solutions in order to achieve total performance visibility.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.

Discover The SPS Advantage
sponsored by SPS Commerce, Inc.
WHITE PAPER: This product overview argues that by integrating collaboration into everyday operations, organizations will achieve a host of benefits. By embracing new advances in communications technology, early adopters will gain a serious competitive edge over their rivals.
Posted: 04 Feb 2016 | Published: 04 Feb 2016


Virtualization Transforms the Ground Rules For IT Performance Management
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will learn how to expand your on-demand IT services and discover the significant impact virtualization has on application and IT infrastructure performance. Read on access 5 approaches for making your performance management virtualization-aware.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

eG Innovations, Inc.

Top Challenges and Best Practices for Virtualizing Citrix XenApp On VMware Vsphere
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will discover how a virtualized platform can offer maximum reliability, performance and scalability. Continue reading to discover five recommendations for fine-tuning your software applications.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

eG Innovations, Inc.

Solve Performance Issues Impacting Citrix-based Services with Real-Time Analytics
sponsored by Citrix and Netscout
TRANSCRIPT: In this transcript, you will explore service assurance challenges impacting IT professionals that manage critical business applications and unified communications (UC) by leveraging the network.. Get access now to discover how to gain a holistic view of the infrastructure to enable collaboration.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Citrix and Netscout

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

Is Your Network Security Limited to Defending Yesterday's Threats?
sponsored by IBM
WHITE PAPER: In this infographic, you will discover how to safeguard your organization from new and emerging threats with a next-gen IPS. Read on how to move beyond pattern matching and apply behavior-based protection to combat advanced and unknown threats to defend your organization.
Posted: 25 Jan 2016 | Published: 03 Nov 2015

IBM

The Expansion of the IPS Appliance Market and Intrusion Prevention Systems Assessment
sponsored by IBM
RESOURCE: In this report, you will evaluate several best-in-class intrusion prevention systems, and determine which stand-alone IPS appliances offer the functionality needed in your enterprise. Read on to learn which vendors offer IPS and IDS functionality to provide control over public cloud workloads.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

IBM

Can Broadband Change the WAN?
sponsored by Silver Peak
WHITE PAPER: This paper discusses how you can leverage SD-WAN applications to enable hybrid WANs for better efficiency, and get the most out of your MPLS by bridging a link with broadband Internet.
Posted: 21 Jan 2016 | Published: 31 Dec 2015

Silver Peak

Freedom to Roam
sponsored by ComputerWeekly.com
EZINE: This month, CW Europe looks in-depth at an issue that is set to impact people across all 28 European Union member states, the abolition of mobile roaming charges, set for mid-2017.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

ComputerWeekly.com

VersaStack Solutions Based on Cisco UCS Integrated Infrastructure and IBM Storage Systems
sponsored by Ingram Micro
WHITE PAPER: This paper discusses the highlights of one infrastructure solution that focuses on replacing the disparate layers of computing, network, and storage resources with a single integrated strategy.
Posted: 21 Jan 2016 | Published: 31 Dec 2015

Ingram Micro

5 Reasons Why Enterprises are Moving to Broadband their WAN
sponsored by Silver Peak
WHITE PAPER: This short paper discusses the 5 reasons why enterprises are radically rethinking their WAN with a move to broadband.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Silver Peak

Multi-Path Networking Is a Key to Maximizing Cloud Value
sponsored by Silver Peak
WHITE PAPER: This report discusses the limitations of legacy networks and how adding multi-path networking can improve the performance of your cloud applications.
Posted: 19 Jan 2016 | Published: 29 May 2015

Silver Peak

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

A Guide to Enterprise Linux For IBM Z Systems
sponsored by Red Hat
DATA SHEET: In this datasheet, you will discover how to extend your IBM z Systems to accommodate more applications and emerging workloads by implementing Red Hat Enterprise Linux. Read on to better utilize your available computing resources.
Posted: 19 Jan 2016 | Published: 31 Dec 2015

Red Hat

Experts Dig In: Connecting Active Directory To The Cloud
sponsored by Microsoft
WEBCAST: In this webcast, independent analyst and blogger Jack Madden chats with Alex Simons, Director of Program Management, Identity Team at Microsoft to dig into cloud services for Active Directory. Tune in for answers to your top questions.
Posted: 18 Jan 2016 | Premiered: Jan 18, 2016

Microsoft

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Evaluating Cloud-Managed Wireless LAN
sponsored by Viadex
EGUIDE: In this exclusive e-guide, our networking experts cut into the hype surrounding cloud-controlled wireless LAN (WLAN) so that you can gain a full understanding of this new service. You'll also uncover the pros and cons of the 4 market-leading cloud-controlled WLAN products.
Posted: 15 Jan 2016 | Published: 15 Jan 2016

Viadex

Improve the Resolution of Your Enterprise with Advanced Mobile Technologies
sponsored by TechData Corporation
PRODUCT OVERVIEW: In this resource, you will discover three new enterprise desktop monitors, and examine just how these technologies will ease the mobile management in your enterprise. Read on now to foster high-resolution productivity and internal collaboration with stutter-free video and optimize your work pace.
Posted: 15 Jan 2016 | Published: 15 Jan 2016

TechData Corporation
1 - 25 of 1063 Matches Previous Page    1 2 3 4    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement