IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
NetworkingReports
151 - 175 of 857 Matches Previous Page  | Next Page
Network Monitoring and Troubleshooting for Dummies
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This in-depth guide explores the challenges of a complex network system and how with effective network monitoring and management you can optimize your network and enhance your end-user experience. Read now and learn how to better monitor and troubleshoot your network.
Posted: 24 Jan 2014 | Published: 24 Jan 2014

Riverbed Technology, Inc.

The Importance of Performance in Software-Defined Networking
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This guide explores the enterprise impact of virtualization. Reveal mistakes from previous efforts to virtualize in other domains so you can optimize your network, enabling systems to perform at an ideal level.
Posted: 23 Jan 2014 | Published: 31 Dec 2012

Riverbed Technology, Inc.

Economic Value Validation of Riverbed Performance Management Cascade
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Businesses continue to change their data centers and networks to better adapt to the global marketplace. This guide explores the role of the data center in the ever-changing IT landscape and how IT professionals are dealing with these changes.
Posted: 23 Jan 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Cisco IOS Digit Manipulation
sponsored by Global Knowledge
WHITE PAPER: Platform digit manipulation may be needed for many business phone calls as they traverse their gateways. his guide explores the role of digit manipulation techniques and various is ways it can benefit for your business.
Posted: 21 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Managing the growing pains in today’s expanding networks
sponsored by IBM
WHITE PAPER: The constant growth of network technologies and increased user mobility has led to a greater need for holistic network management. This guide explores the need for management in an expanding network and how to overcome potential challenges of implementing these strategies.
Posted: 20 Jan 2014 | Published: 31 Jan 2012

IBM

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

5 DNS Security Risks That Keep You Up At Night
sponsored by Dyn
WHITE PAPER: This guide explores 5 DNS security risks and what you can do to prevent them.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Dyn

5 Ways to Reduce Advertising Network Latency
sponsored by Dyn
WHITE PAPER: This guide outlines 5 guidelines used for reducing your overall network latency.
Posted: 06 Jan 2014 | Published: 06 Jan 2014

Dyn

NetScaler 2048-bit SSL performance advantage
sponsored by Citrix
WHITE PAPER: IT professionals are deploying application device controllers (ADCs) for their network due to their unique set of capabilities. This brief guide highlights one company's ADC solution and how it will improve your network functionality.
Posted: 06 Jan 2014 | Published: 31 Dec 2011

Citrix

Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center
sponsored by Citrix
WHITE PAPER: When it comes to the new demands of network infrastructure, it is critical to have an effective application device controller (ADC). This brief guide explores an effective ADC that can help improve your network performance and provide you with effective scalability solutions.
Posted: 06 Jan 2014 | Published: 06 Jan 2014

Citrix

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: The role of secure sockets layer (SSL) technology is no longer a luxury, it is now a crucial part of all networking systems. This guide explores some best practices for implementing 2048-bit SSL and how it can benefit your network infrastructure.
Posted: 03 Jan 2014 | Published: 31 Dec 2011

Citrix

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering
sponsored by Citrix
WHITE PAPER: One of the most critical parts of your network and data center are application delivery controllers. This guide explores the unique role that ADC plays for networking professionals and how they are utilizing them for their networks.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

Citrix

A Different Approach to Traffic Visibility
sponsored by Gigamon
WHITE PAPER: This guide explores the effects of new technologies on existing network infrastructure and how you can overcome potential issues with improvements in network visibility.
Posted: 23 Jan 2014 | Published: 31 Dec 2013

Gigamon

The F5 Intelligent DNS Scale Reference Architecture
sponsored by F5 Networks
WHITE PAPER: The Domain Name System (DNS) is arguably the primary technology enabling the internet. This guide explores why DNS architecture is essential to your network and how you can build an available, intelligent, secure, and scalable infrastructure.
Posted: 22 Jan 2014 | Published: 30 Nov 2013

F5 Networks

Taking Visual Collaboration to the Next Level: Plan Use Cases, Architecture, and Adoption
sponsored by Cisco
WHITE PAPER: This white paper highlights how IT professionals can continually raise the business value of telepresence and what you should consider when implementing your visual collaboration strategy.
Posted: 21 Jan 2014 | Published: 31 Dec 2012

Cisco

EMA: Managing Your Network for Optimal Application Performance
sponsored by CA Technologies.
WHITE PAPER: The days of focusing simply on network uptime are long gone. This guide explores the role of application and network performance management in today's enterprises and how it can benefit your business.
Posted: 21 Jan 2014 | Published: 30 Sep 2013

CA Technologies.

The Shortfall of Network Load Balancing
sponsored by F5 Networks
WHITE PAPER: This guide explores the role of network load balancers, the importance of network performance and how it can revolutionize the way your applications are delivered.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

F5 Networks

Hyperconvergence Infographic
sponsored by Riverbed Technology, Inc.
WHITE PAPER: A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster and further than anything the IT world has seen before. Is your network prepared to handle the upcoming onslaught of data?
Posted: 17 Jan 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

WAN Optimization Delivers Peace of Mind for IT
sponsored by Riverbed Technology, Inc.
WHITE PAPER: As organizations consolidate backup and disaster recovery operations, WAN optimization plays a key role in mitigating risk without sacrificing performance. Discover a new architectural approach that extends the virtual edge of the data center to the branch for complete server and data consolidation without a performance compromise.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Riverbed Technology, Inc.

The Future of Unified Communications in 2014
sponsored by Cisco
EGUIDE: This expert e-guide takes a stab at predicting the future of the unified communications and social enterprise markets in 2014.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Cisco

Everything You Need to Know About Business Social Collaboration
sponsored by Cisco
EGUIDE: This expert e-guide covers the convergence of unified communications and collaboration and social software to create collaborative communications.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Cisco

UC Trends That are Changing Collaboration
sponsored by Cisco
EGUIDE: This expert e-guide features information on the unified communications market with five key trends and a top 10 list of news stories from the past year.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Cisco

PEG Bandwidth Success Story
sponsored by Fujitsu
WHITE PAPER: As businesses continue to search for ways to reduce cost and limit risk, optimizing network infrastructure is a crucial part to achieve these goals. This guide explores one company and how they utilized PEG bandwidth to establish quality network operations and ensure customer satisfaction.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

Fujitsu

"How Can I Assure the Reliability of Complex, Mission Critical Applications and Deliver a Flawless End-User Experience?"
sponsored by CA Technologies.
WHITE PAPER: As end-users continue to demand faster services, IT departments are struggling to keep with these needs. This guide explores how crucial application performance management is for the end-user experience and how to deploy such a strategy across a multitude of platforms.
Posted: 09 Jan 2014 | Published: 31 Dec 2013

CA Technologies.

Master List of DNS Terminology
sponsored by Dyn
WHITE PAPER: In this eBook, you'll find the most common DNS terms and their definitions to help you better understand DNS.
Posted: 08 Jan 2014 | Published: 31 Dec 2013

Dyn
151 - 175 of 857 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement