IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
101 - 125 of 1149 Matches Previous Page  |  Next Page
Advanced Endpoint Protection for Windows Server 2003 After End-of-Support
sponsored by Palo Alto Networks
WHITE PAPER: Identify how you can maintain security in your network, despite the fact that Windows Server 2003 has reached its End-of-Support.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Palo Alto Networks

Exceed Expectations: Choose an Application Delivery Controller Based on Value
sponsored by Array Networks
RESOURCE: Discover, side-by-side, the features of two available application delivery controllers. The advantages of going with the more nimble alternative will become plain.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Array Networks

Your Network: A Look Behind the Firewall
sponsored by Fortinet, Inc.
RESOURCE: Discover ways to diagnose and determine how social media, audio, and video traffic may compromise security in your network. Learn how to run a cyber-threat assessment to ensure your valuable data is kept under lock.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Improving Productivity through IT Modernization
sponsored by HPE and Intel®
VIDEO: Focus on ensuring that your infrastructure is saving you time and money now, and will continue to do so in the future. See also how you can plan on incorporating mobile into your network strategy.
Posted: 06 Jun 2016 | Premiered: 03 Jun 2016

HPE and Intel®

Five simple strategies to help enable a more productive mobile workforce
sponsored by HPE and Intel®
RESOURCE: How do you keep your mobile workforce productive? Explore best practices and five strategies to make sure that your workers are making the most of mobility.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

Microscope June 2016
sponsored by MicroScope
EZINE: June ezine: Think wireless Highlighting the opportunities when you package cloud services with wireless technologies to secure repeat revenue on network sales
Posted: 02 Jun 2016 | Published: 03 Jun 2016

MicroScope

Gone Critical: The Evolution in Application Availability
sponsored by Veeam Software
WHITE PAPER: In today's business landscape, constant availability is the key to staying competitive. This is no small task. Read on to learn about an always-on backup and recovery service that makes your critical applications available at all times.
Posted: 31 May 2016 | Published: 31 May 2016

Veeam Software

What Mobile Policy Suits Your Organization?
sponsored by IBM MaaS360
WEBCAST: BYOD may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.
Posted: 31 May 2016 | Premiered: Mar 31, 2016

IBM MaaS360

Beyond the Perimeter: Protecting your Network
sponsored by IBM MaaS360
WEBCAST: Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.
Posted: 31 May 2016 | Premiered: May 25, 2016

IBM MaaS360

Computer Weekly – 31 May 2016: The rise of machine intelligence
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how machine intelligence is becoming increasingly commoditised – and what it means for enterprise IT. After Three's takeover of O2 was blocked, we look at the future for the UK's mobile operators. And we find out about attempts to address some of the fundamental flaws of the internet. Read the issue now.
Posted: 27 May 2016 | Published: 23 May 2016

ComputerWeekly.com

A Unified View of the Enterprise Network for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: This report examines the need for an enterprise network infrastructure with deeply embedded security to become more proactive in threat prevention.
Posted: 26 May 2016 | Published: 31 Mar 2016

Fortinet, Inc.

New Rules of Engagement: Dispelling 3 Myths of Communications
sponsored by Avaya TSG
WHITE PAPER: Take a closer look at the pros and cons of adopting a consumer-like approach to business communications. Explore 3 enterprise communication myths, and how you can selectively leverage components of these misconceptions to foster a culture of engagement.
Posted: 06 Jul 2016 | Published: 31 Dec 2015

Avaya TSG

How VoIP Delivers Tangible Business Benefits: A Case for Implementation
sponsored by Avaya CenturyLink
RESOURCE: Discover how to improve employee productivity and enhance customer experience—within IT's budget—by implementing more agile VoIP. Choose the right combo of VoIP for your business—whether hosted or SIP trunk—and examine its multitudinous business benefits, overcoming aging network infrastructure.
Posted: 05 Jul 2016 | Published: 02 May 2016

Avaya CenturyLink

Utah State University Realizes Big Savings by Upgrading to VoIP
sponsored by Avaya CenturyLink
CASE STUDY: Learn how to save your organization thousands of dollars by upgrading older TDM systems to VoIP—recovering productive hours from IT staff to put toward new initiatives. Integrate VoIP into your modern digital infrastructure to unify communications and mobilize your workforce for even greater productivity.
Posted: 05 Jul 2016 | Published: 16 May 2016

Avaya CenturyLink

Why Moving to VoIP Makes Business Sense (and Produces Cents)
sponsored by Avaya CenturyLink
RESOURCE: Discover the top 3 things you need to know to succeed with VoIP today—including how to avoid the money drain of legacy PBXs—as well as the risks and rewards VoIP affords. Access this post to improve employee productivity and reduce communications costs by increasing network capacity.
Posted: 05 Jul 2016 | Published: 24 May 2016

Avaya CenturyLink

MicroScope: July 2016
sponsored by MicroScope
EZINE: The online battleground of SEO sabotage is the latest and worrying way some firms are being undermined by competitors. MicroScope looks at the issue and outlines how to stop it from wrecking website rankings
Posted: 01 Jul 2016 | Published: 01 Jul 2016

MicroScope

New Rules of Engagement: Dispelling 3 Myths of Communications
sponsored by Avaya CenturyLink
WHITE PAPER: Take a closer look at the pros and cons of adopting a consumer-like approach to business communications. Explore 3 enterprise communication myths, and how you can selectively leverage components of these misconceptions to foster a culture of engagement.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

Avaya CenturyLink

The Network Takes Center Stage
sponsored by IBM
EGUIDE: Pinpointing issues is becoming more challenging as networks expand and become more complex, but there are ways to monitor your network more effectively in order to spot the early warning signs of downtime. Access this special report to learn about analytics technology, outsourcing options, and more.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

IBM

Transforming the Networking Capabilities of Norway's Largest Hospital
sponsored by Avaya
CASE STUDY: Norway's largest health system needed a smart, scalable network to bring together 3 hospitals and absorb future growth. Read this case study to learn how employing a virtual enterprise network architecture fulfilled the health system's networking needs and could soon be fulfilling yours.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Avaya

Modern Infrastructure E-zine – June 2016
sponsored by SearchDataCenter.com
EZINE: Are containers an open source lifeline? That remains to be seen, as the technology just might offer a saving grace to the OpenStack infrastructure. Find out how containers are impacting Openstack deployment.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

SearchDataCenter.com

Canon U.S.A. Fully Automates VMOTION and Storage VMOTION with VMTurbo
sponsored by Turbonomic
WHITE PAPER: Resource allocation is the key to succeeding in virtualized environments. Read this brief case study to learn how one company was able to implement a solution that automatically made intelligent adjustments, allowing them to expand their virtual footprint and control over a complex virtual environment.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Turbonomic

Boston College Excels With VMTurbo to Assure Performance and Intelligently Plan for Growth
sponsored by Turbonomic
CASE STUDY: What if you could increase your virtual footprint by 30% or more? That's what one of Boston's top colleges did. Read on to find out how the college was able to incease its IT staff productivity by 20% and create a viable plan to meet future demands by improving its network infrastructure.
Posted: 10 Jun 2016 | Published: 31 Dec 2015

Turbonomic

The State of Latency, Containers, & Microservices: Survey Methodologies & Results
sponsored by Turbonomic
RESOURCE: 91% of people surveyed agreed that latency reduction is important to their company. Read on to learn about the role, measurement and mitigation of latency in the datacenter. You will also learn about deploying containers and microservices to reduce latency.
Posted: 06 Jun 2016 | Published: 30 Dec 2015

Turbonomic

Hardware is Dead; Long Live Hardware
sponsored by SearchNetworking.com
EZINE: Will physical network gear disappear in the era of software-defined networking and virtualization? Not likely. In this month's issue of Network Evolution, find out why networks still need hardware, and how early adopters are using hardware in their virtual environments.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchNetworking.com
101 - 125 of 1149 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement