IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
201 - 225 of 1227 Matches Previous Page  |  Next Page
Monitoring the Quirky
sponsored by SevOne
WEBCAST: This webcast serves as a demonstration of an infrastructure monitoring tool that can help you harness your distributed devices and data. Whether your enterprise is monitoring fitness trackers on employees, or keeping track of mission critical information, you need to make sure the data you collect is useful.
Posted: 06 Mar 2016 | Premiered: Mar 4, 2016

SevOne

Keeping Quality of Service High Despite LTE Traffic Increases
sponsored by SevOne
WHITE PAPER: With consumer expectations at an all-time high, wireless carriers are under constant pressure to keep the network humming and the cost of operations down. Discover in this white paper several ways that you can keep network costs down, even as the service you provide requires network speed to remain brisk while demands increase.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

SevOne

Avoiding the Hidden Costs of Performance Monitoring Tools
sponsored by SevOne
WHITE PAPER: This white paper discusses the 7 sources of hidden costs of performance monitoring tools and discusses ways that you can avoid them.
Posted: 02 Mar 2016 | Published: 31 Dec 2015

SevOne

5 Proof Points the IoT is Impacting Today's IT
sponsored by SevOne
WHITE PAPER: This paper highlights 5 recent research findings about how IoT is impacting enterprise IT and service providers today, and the challenges that network and IT teams must overcome to embrace IoT.
Posted: 02 Mar 2016 | Published: 31 Dec 2015

SevOne

Gaining a Competitive Advantage With a Better Data Center Network Strategy
sponsored by Juniper Networks, Inc.
WHITE PAPER: Your consumers want more but you won't be able to deliver without a proper data center networking strategy. Access this white paper to discover how simple, open and smart network architectures can drive you past your competitors and put you at the forefront of innovation.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Juniper Networks, Inc.

10 Metrics to Monitor in the LTE Network
sponsored by SevOne
WHITE PAPER: Did you know that deployment of LTE increases dependency on your underlying network? Discover in this white paper the 10 metrics which you should monitor and collect in your LTE network to ensure efficient delivery of services to your customers.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

SevOne

New Requirements for Performance Management Vendors
sponsored by SevOne
WHITE PAPER: This white paper discusses the next-generation performance monitoring tools that are providing data on every aspect of the application delivery chain, including network equipment, web servers, storage devices, and more.
Posted: 29 Feb 2016 | Published: 30 Sep 2015

SevOne

6 Steps to an Effective Performance Monitoring Strategy
sponsored by SevOne
WHITE PAPER: This white paper highlights 6 steps you should have in your performance monitoring strategy, and supplies questions you should ask performance monitoring vendors to ensure they support the vision you have of your network.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

SevOne

Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Network security is failing to keep up with the rapid influx of mobile devices. Security professionals have realized that BYOD, mobility and cloud are exposing flaws in network security architectures. This vendor-neutral resource highlights how your enterprise can mitigate risk effectively in this type of dynamic environment.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Secure Remote Access Your Users Will Love
sponsored by Citrix
WHITE PAPER: An organization's remote access strategy focuses on IT priorities—protecting the enterprise network and avoiding unnecessary complexity. But the ultimate customer is the user who depends on reliable access to get work done. Learn how IT can address its requirements while delivering a solution people love.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

Citrix

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
PRODUCT OVERVIEW: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace allowing users to have the freedom to connect to any network and IT is struggling to maintain control. Discover how to maintain policy control, workflow automation and enhance visibility for a seamless mobile experience.
Posted: 18 Feb 2016 | Published: 18 Feb 2016

Aruba Networks

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

Building a Trust-Based Internet of Things
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses the security you need to implement as the IoT pervades every part of the enterprise. Included within is a description of how the IoT is changing certain industries specifically, and what you'll need to do to secure your business.
Posted: 15 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

How to Design a Network for Mobile Initiatives
sponsored by Aruba Networks
WHITE PAPER: This guide details how to design your network for mobile initiatives. Learn how to overcome the key challenges facing network administrators today in setting up and managing a modern infrastructure, including security and access control, defining network users, and more.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Aruba Networks

Maximize Cloud Benefits with Five Keys to Private Cloud Automation
sponsored by SPS Commerce, Inc.
EGUIDE: In this expert e-guide, discover how to maximize cloud benefits in your organization by uncovering the 5 keys to private cloud automation. Read on to access two bonus articles: learn how to maintain excellent private cloud network performance and application performance monitoring, as well as how to adopt a successful private cloud strategy.
Posted: 01 Mar 2016 | Published: 24 Feb 2016


Computer Weekly – 1 March 2016: Protecting the UK from cyber attacks
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the National Crime Agency's top cyber cop about tackling IT security threats against the UK through global collaborations. We ask CIOs for their tips on building an IT strategy for the digital age. And we review the big six storage suppliers' plans for all-flash arrays. Read the issue now.
Posted: 29 Feb 2016 | Published: 01 Mar 2016

ComputerWeekly.com

Moving UC to the Cloud
sponsored by Carousel Industries
EGUIDE: This e-guide provides an overview of unified communications as a service (UCaaS), including the companies that offer UCaaS, the services that are involved, the key benefits, and reasons you should consider UCaaS for your business.
Posted: 23 Feb 2016 | Published: 09 Feb 2016

Carousel Industries

Computer Weekly – 23 February 2016: Surviving broadband failure
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after the recent BT broadband outage, we examine the options to keep your communications in place in the event of a failure. We look at the prospects for the OpenStack open source cloud platform in the enterprise. And we see how Ireland is making progress on delivering a digital health service. Read the issue now.
Posted: 19 Feb 2016 | Published: 23 Feb 2016

ComputerWeekly.com

Workplace Collaboration Partners Pursue Skype for Business
sponsored by Carousel Industries
EGUIDE: This e-guide discusses how Skype for Business has changed the way that enterprises collaborate, and examines how collaboration has evolved beyond the conference room and into workers' pockets.
Posted: 18 Feb 2016 | Published: 15 Feb 2016

Carousel Industries

Taking the UCaaS Plunge
sponsored by SearchUnifiedCommunications.com
EBOOK: Are you considering unified communications as a service (UCaaS)? Access this handbook and learn about UCaaS models, business benefits and use cases, and how to determine whether it is the right move for your enterprise.
Posted: 18 Feb 2016 | Published: 15 Feb 2016

SearchUnifiedCommunications.com

Buying the Right Video Conferencing System
sponsored by Carousel Industries
EGUIDE: This e-guide discusses the benefits of video conferencing, and aims to help you choose between on-premise, cloud-based, and hybrid video conferencing options in order to implement the best tool for your enterprise.
Posted: 17 Feb 2016 | Published: 15 Feb 2016

Carousel Industries

Hosted UC and UCaaS Offer Five Major Advantages Over On-Premise UC
sponsored by Carousel Industries
EGUIDE: This guide discusses the 5 critical advantages of UCaaS over premise-based alternatives. Inside, learn how these new technologies offer enterprises lower costs, centralized management and more.
Posted: 17 Feb 2016 | Published: 12 Feb 2016

Carousel Industries

How to Evaluate UCaaS Providers' Security Measures
sponsored by Carousel Industries
EGUIDE: This e-guide discusses ways you can address the security concerns of UCaaS, including multi-tenancy and encryption. It goes on to provide ways you can evaluate the security measures that potential UCaaS vendors are building into their services.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

Carousel Industries

Shopping for a UC Cloud Services Provider
sponsored by Carousel Industries
EGUIDE: This e-guide discusses the UC cloud services market and the factors you should consider to find the most appropriate UC provider for your enterprise.
Posted: 15 Feb 2016 | Published: 09 Feb 2016

Carousel Industries

SSL Certificate Management: How to Avoid Common Mistakes
sponsored by Symantec Website Security
EGUIDE: This expert e-guide describes the most common SSL certificate management mistakes and provides advice on how to avoid them. Discover how to choose the best certificates for your enterprise's needs, manage renewal of certificates, and more.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security
201 - 225 of 1227 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement