IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
101 - 125 of 1165 Matches Previous Page  |  Next Page
Critical Cable Management: Save Space where You Need It Most
sponsored by Panduit
WHITE PAPER: How do you substantiate cabling infrastructure with more ports and higher density network switches, when already space is at a premium in constrained telecom real estate? Learn how to implement space-saving cable management in your telecom rooms by reading on.
Posted: 23 May 2016 | Published: 23 May 2016

Panduit

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.
Posted: 20 May 2016 | Published: 30 Dec 2015

IBM MaaS360

Why HCI and Why Now?
sponsored by VMware
WHITE PAPER: IT has made tremendous leaps with server and app virtualization, but 2 critical resource silos remain largely untouched: networking and storage. In this white paper, you'll discover why enterprises are deploying hyper-converged infrastructure (HCI) to escalate their growth.
Posted: 20 May 2016 | Published: 20 May 2016

VMware

Breaking Down the Benefits of Desktop Transformation
sponsored by VMware
WHITE PAPER: The future of mobility relies on the technology that it replaced; desktop computing. Desktop computing is undergoing a transformation that will couple it with the advances mobility has to offer. Read on to learn about the benefits this next-gen desktop is promising to deliver.
Posted: 20 May 2016 | Published: 29 Dec 2015

VMware

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: To combat the rising complexity of desktop environments, you need to think about implementing hybrid consumption models. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

Top Ten Reasons You Don't Need Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is a dying trend. Smartphones are a fad. Tablets? Simply an unruly smartphone that's too smart for its own good. Who needs them? Read on for ten reasons why you don't need to bother with this MDM nonsense.
Posted: 20 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Beyond CLM and MDM: Why your Organization needs Unified Endpoint Management (UEM)
sponsored by Matrix42
WHITE PAPER: Unified endpoint management (UEM) combines mobile device management with client lifecycle management to create a new central management environment. Read on to learn more about how UEM works and its benefits for businesses, IT and users.
Posted: 19 May 2016 | Published: 30 Dec 2015

Matrix42

Surfing the Windows 10 Wave with UEM
sponsored by Matrix42
WHITE PAPER: Mobile devices are going largely unmanaged in the workplace. Windows 10 looms large on the horizon. Chaos seems inevitable. Read on to uncover a unified endpoint management solution that will manage all devices across various operating systems and help prepare for the Windows 10 rollout.
Posted: 19 May 2016 | Published: 31 Dec 2015

Matrix42

Middle East IT Priorities Report 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Computer Weekly’s in-depth study of IT spending priorities in the Middle East will help you benchmark your business spending in areas such as networking, datacentres and security.
Posted: 19 May 2016 | Published: 19 May 2016

ComputerWeekly.com

Tackling Workplace Mobility
sponsored by VMware
WHITE PAPER: 84% of employees use a mobile device during their work day and as mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.
Posted: 18 May 2016 | Published: 29 Apr 2016

VMware

Ten Rules for Bring Your Own Device (BYOD)
sponsored by IBM MaaS360
WHITE PAPER: Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Enterprise Mobility Management: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: 20% of CIOs reported that their organizations do not have a mobile technology strategy. In order to survive in the mobile-centric world, a nuanced strategy is in order. See how enterprise mobility management has evolved over the past two decades and how to ensure that your organization doesn't fall behind.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Enterprise Mobility Management Suites Vendor Comparison
sponsored by IBM MaaS360
RESOURCE: This expert report breaks down enterprise mobility management (EMM) into four easily understandable categories and compares the strengths and weaknesses of top EMM suite vendors. Get prepared to navigate the mobile business landscape.
Posted: 18 May 2016 | Published: 07 Jul 2015

IBM MaaS360

UK IT Priorities Report 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities from across the UK.
Posted: 18 May 2016 | Published: 18 May 2016

ComputerWeekly.com

Enterprise Mobile Management
sponsored by IBM MaaS360
RESOURCE: Are you sure that your mobility solution is keeping you competitive? The future of business is becoming increasingly focused on mobility and shaping the mobile worker's experience. Access this report to compare the top eleven enterprise mobile management vendors and gain an understanding of what to look for in a solution.
Posted: 17 May 2016 | Published: 04 Dec 2015

IBM MaaS360

What does mobility really mean?
sponsored by Citrix
VIDEO: In this video learn how one system can play a precise and integral role for enabling flexible workspaces and work styles without exposing your organization to risk. View now to learn more.
Posted: 13 May 2016 | Premiered: 06 Oct 2014

Citrix

Customer Story: Implementing Mobility in the Workplace
sponsored by Citrix
VIDEO: Learn how one of the largest healthcare systems in the United States implemented an efficient, secure mobile strategy and increased collaboration. Discover how you can provide your employees the flexibility of working outside of their offices and increase productivity.
Posted: 13 May 2016 | Premiered: 08 Oct 2013

Citrix

Easing IT migration to Windows 10
sponsored by Citrix
WHITE PAPER: Operating system (OS) migration is a complex, daunting task. This white paper will act as your guide to a successful migration, exploring the challenges you'll face and a solution that will make the process easier.
Posted: 12 May 2016 | Published: 08 Apr 2016

Citrix

Extending Your VPN Is the Key to Cloud Success in Government and Education
sponsored by AT&T
WHITE PAPER: Learn about your ability to simplify management, add security, and ensure that critical areas, like compliance and data management, remain uncompromised.
Posted: 11 May 2016 | Published: 04 May 2016

AT&T

The Demand for Hybrid Online File Sharing
sponsored by Citrix
RESEARCH CONTENT: In this report, learn how the OFS market is changing and uncover critical insight into the adaptions that must be made to keep clients happy. Read on to uncover why so many businesses want their OFS vendor offerings to include greater choice with how data is stored and where.
Posted: 10 May 2016 | Published: 31 Dec 2014

Citrix

Top 5 requirements for secure enterprise file sync and sharing
sponsored by Citrix
WHITE PAPER: The mobile data access challenge poses both risk and opportunities for IT. The use of personal file sharing makes it hard to maintain security of sensitive information. Discover how IT can help employees work and collaborate more effectively from anywhere while supporting the evolution of business mobility enterprise-wide.
Posted: 10 May 2016 | Published: 29 Apr 2016

Citrix

The Rise of Hyper-Converged Architecture for Storage
sponsored by SimpliVity
EGUIDE: In this essential guide, take an in-depth look at hyper-converged architecture as our experts deconstruct the technology and help you decide if it's right for your organization. Weigh the pros and cons of a hyper-converged infrastructure, discover the top 7 seven criteria for selecting the right hyper-converged system, and more.
Posted: 20 May 2016 | Published: 09 May 2016

SimpliVity

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

What to Look for in Ethernet
sponsored by SearchNetworking.com
EBOOK: This Buyer's Guide helps networking pros select the best Ethernet for their enterprise and explains the fundamentals of Ethernet networking and latest technological developments.
Posted: 09 May 2016 | Published: 05 May 2016

SearchNetworking.com

Nemertes Research: Re-Architecting the Enterprise Network For WLAN, Cloud, Mobility, Bandwidth, and Cybercrimes
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.
101 - 125 of 1165 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement