IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
126 - 150 of 1200 Matches Previous Page  |  Next Page
A Unified View of the Enterprise Network for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Trends in mobility and cloud-host enterprise applications are prompting enterprises to reconsider how they deploy enterprise networks. Find out how these trends are changing approaches to network management, the need for more unified, proactive security and the challenges this all presents.
Posted: 08 Jun 2016 | Published: 31 Mar 2016

Fortinet, Inc.

The Top 7 Criteria for Cloud Wi-Fi
sponsored by Fortinet, Inc.
WHITE PAPER: The vision of an all-wireless enterprise has been in sight for years, but it has finally come within grasping range. Cloud-managed Wi-Fi is the way to achieve the goals of a more agile enterprise at lower IT costs. Read on to learn about the top seven requirements to look for in cloud Wi-Fi.
Posted: 07 Jun 2016 | Published: 12 May 2016

Fortinet, Inc.

Improving Productivity through IT Modernization
sponsored by HPE and Intel®
VIDEO: Focus on ensuring that your infrastructure is saving you time and money now, and will continue to do so in the future. See also how you can plan on incorporating mobile into your network strategy.
Posted: 06 Jun 2016 | Premiered: 03 Jun 2016

HPE and Intel®

Five simple strategies to help enable a more productive mobile workforce
sponsored by HPE and Intel®
RESOURCE: How do you keep your mobile workforce productive? Explore best practices and five strategies to make sure that your workers are making the most of mobility.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

Microscope June 2016
sponsored by MicroScope
EZINE: June ezine: Think wireless Highlighting the opportunities when you package cloud services with wireless technologies to secure repeat revenue on network sales
Posted: 02 Jun 2016 | Published: 03 Jun 2016

MicroScope

A Case Study: Help for Heroes Taps Power of Cloud Computing
sponsored by Rackspace
WHITE PAPER: Is your infrastructure adaptable enough to ensure that you can take full advantage of new technologies as they emerge? Read this case study to learn how the UK's leading military charity was able to futureproof its infrastructure, and ensure high performance across platforms and apps without excessive costs.
Posted: 01 Jun 2016 | Published: 30 Dec 2015

Rackspace

Top 10 Reasons to Optimize Data Center Infrastructure Management
sponsored by CommScope
WHITE PAPER: Access this resource to find 10 key reasons to optimize how you map out connectivity, understand usage, track equipment, and plan and monitor change in your data center.
Posted: 01 Jun 2016 | Published: 03 Nov 2015

CommScope

Gone Critical: The Evolution in Application Availability
sponsored by Veeam Software
WHITE PAPER: In today's business landscape, constant availability is the key to staying competitive. This is no small task. Read on to learn about an always-on backup and recovery service that makes your critical applications available at all times.
Posted: 31 May 2016 | Published: 31 May 2016

Veeam Software

What Mobile Policy Suits Your Organization?
sponsored by IBM MaaS360
WEBCAST: BYOD may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.
Posted: 31 May 2016 | Premiered: Mar 31, 2016

IBM MaaS360

Beyond the Perimeter: Protecting your Network
sponsored by IBM MaaS360
WEBCAST: Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.
Posted: 31 May 2016 | Premiered: May 25, 2016

IBM MaaS360

Computer Weekly – 31 May 2016: The rise of machine intelligence
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how machine intelligence is becoming increasingly commoditised – and what it means for enterprise IT. After Three's takeover of O2 was blocked, we look at the future for the UK's mobile operators. And we find out about attempts to address some of the fundamental flaws of the internet. Read the issue now.
Posted: 27 May 2016 | Published: 23 May 2016

ComputerWeekly.com

A Unified View of the Enterprise Network for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: This report examines the need for an enterprise network infrastructure with deeply embedded security to become more proactive in threat prevention.
Posted: 26 May 2016 | Published: 31 Mar 2016

Fortinet, Inc.

How Cloud Computing Changes the Role of IT
sponsored by MASERGY
RESOURCE: Optimize the performance of your SaaS-based apps by examining network traffic to determine how much of your bandwidth they consume. Discover how to work with end users to improve their cloud-based app experience, and ensure your network is in top shape to accommodate all workloads.
Posted: 25 May 2016 | Published: 15 Jan 2015

MASERGY

Ten essential network virtualization definitions
sponsored by VMware
EGUIDE: There is some confusion surrounding network virtualization as there is no one definition. In this exclusive guide, you'll find ten definitions to help you better understand the basics and build the best software-defined network possible.
Posted: 24 May 2016 | Published: 17 May 2016

VMware

Checklist: How to survive in the mobile enterprise
sponsored by IBM MaaS360
WHITE PAPER: You need a strong mobility strategy in order to survive today's increasingly mobile business landscape. Access this guide to learn about the best ways to plan out your strategy for mobile success.
Posted: 23 May 2016 | Published: 27 Apr 2016

IBM MaaS360

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.
Posted: 20 May 2016 | Published: 30 Dec 2015

IBM MaaS360

Why HCI and Why Now?
sponsored by VMware
WHITE PAPER: IT has made tremendous leaps with server and app virtualization, but 2 critical resource silos remain largely untouched: networking and storage. In this white paper, you'll discover why enterprises are deploying hyper-converged infrastructure (HCI) to escalate their growth.
Posted: 20 May 2016 | Published: 20 May 2016

VMware

Top Ten Reasons You Don't Need Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is a dying trend. Smartphones are a fad. Tablets? Simply an unruly smartphone that's too smart for its own good. Who needs them? Read on for ten reasons why you don't need to bother with this MDM nonsense.
Posted: 20 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Beyond CLM and MDM: Why your Organization needs Unified Endpoint Management (UEM)
sponsored by Matrix42
WHITE PAPER: Unified endpoint management (UEM) combines mobile device management with client lifecycle management to create a new central management environment. Read on to learn more about how UEM works and its benefits for businesses, IT and users.
Posted: 19 May 2016 | Published: 30 Dec 2015

Matrix42

Secure Access for Large Public Venues
sponsored by Fortinet, Inc.
RESOURCE: For large public venues, poor Wi-Fi performance can be very damaging to popularity and success. Learn how these enterprises are overcoming the challenges and deploying secure, reliable Wi-Fi despite hostile environments and a large number of user expectations.
Posted: 19 May 2016 | Published: 04 May 2016

Fortinet, Inc.

Surfing the Windows 10 Wave with UEM
sponsored by Matrix42
WHITE PAPER: Mobile devices are going largely unmanaged in the workplace. Windows 10 looms large on the horizon. Chaos seems inevitable. Read on to uncover a unified endpoint management solution that will manage all devices across various operating systems and help prepare for the Windows 10 rollout.
Posted: 19 May 2016 | Published: 31 Dec 2015

Matrix42

Boston College Excels With VMTurbo to Assure Performance and Intelligently Plan for Growth
sponsored by Turbonomic
CASE STUDY: What if you could increase your virtual footprint by 30% or more? That's what one of Boston's top colleges did. Read on to find out how the college was able to incease its IT staff productivity by 20% and create a viable plan to meet future demands by improving its network infrastructure.
Posted: 10 Jun 2016 | Published: 31 Dec 2015

Turbonomic

The State of Latency, Containers, & Microservices: Survey Methodologies & Results
sponsored by Turbonomic
RESOURCE: 91% of people surveyed agreed that latency reduction is important to their company. Read on to learn about the role, measurement and mitigation of latency in the datacenter. You will also learn about deploying containers and microservices to reduce latency.
Posted: 06 Jun 2016 | Published: 30 Dec 2015

Turbonomic

Hardware is Dead; Long Live Hardware
sponsored by SearchNetworking.com
EZINE: Will physical network gear disappear in the era of software-defined networking and virtualization? Not likely. In this month's issue of Network Evolution, find out why networks still need hardware, and how early adopters are using hardware in their virtual environments.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchNetworking.com

The Rise of Hyper-Converged Architecture for Storage
sponsored by SimpliVity
EGUIDE: In this essential guide, take an in-depth look at hyper-converged architecture as our experts deconstruct the technology and help you decide if it's right for your organization. Weigh the pros and cons of a hyper-converged infrastructure, discover the top 7 seven criteria for selecting the right hyper-converged system, and more.
Posted: 20 May 2016 | Published: 09 May 2016

SimpliVity
126 - 150 of 1200 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement