IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
226 - 250 of 1197 Matches Previous Page  |  Next Page
The State of Software-Defined WAN
sponsored by Silver Peak
WHITE PAPER: This resource explores key trends in software-defined networks and offers in-depth advice on how to address the limitations of today's VPN. Read on to see how software-defined WANs could help your company maximize its investments with the cloud.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Silver Peak

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by SearchMobileComputing
EBOOK: Enterprise mobility management (EMM) it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Read on to learn about the role EMM should play in your mobile strategy.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

SearchMobileComputing

Is Your Network Security Limited to Defending Yesterday's Threats?
sponsored by IBM
WHITE PAPER: In this infographic, you will discover how to safeguard your organization from new and emerging threats with a next-gen IPS. Read on how to move beyond pattern matching and apply behavior-based protection to combat advanced and unknown threats to defend your organization.
Posted: 25 Jan 2016 | Published: 03 Nov 2015

IBM

The Expansion of the IPS Appliance Market and Intrusion Prevention Systems Assessment
sponsored by IBM
RESOURCE: In this report, you will evaluate several best-in-class intrusion prevention systems, and determine which stand-alone IPS appliances offer the functionality needed in your enterprise. Read on to learn which vendors offer IPS and IDS functionality to provide control over public cloud workloads.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

IBM

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

A Guide to Enterprise Linux For IBM Z Systems
sponsored by Red Hat
DATA SHEET: In this datasheet, you will discover how to extend your IBM z Systems to accommodate more applications and emerging workloads by implementing Red Hat Enterprise Linux. Read on to better utilize your available computing resources.
Posted: 19 Jan 2016 | Published: 31 Dec 2015

Red Hat

Simplify the Data Center with Junos Fusion
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this document discover a product that addresses the challenges posed by traditional network architectures and provides customers with a bridge from legacy networks to software-defined cloud networks.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

Juniper Networks, Inc.

Top 10 Data Center Network Switch Considerations
sponsored by Juniper Networks, Inc.
WHITE PAPER: How will you choose a network solution for your data center? What should be your top considerations? In this helpful guide dive into the top ten data center network switch considerations you should take into account.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

Juniper Networks, Inc.

Buying the Right Video Conferencing System
sponsored by Carousel Industries
EGUIDE: This e-guide discusses the benefits of video conferencing, and aims to help you choose between on-premise, cloud-based, and hybrid video conferencing options in order to implement the best tool for your enterprise.
Posted: 17 Feb 2016 | Published: 15 Feb 2016

Carousel Industries

Hosted UC and UCaaS Offer Five Major Advantages Over On-Premise UC
sponsored by Carousel Industries
EGUIDE: This guide discusses the 5 critical advantages of UCaaS over premise-based alternatives. Inside, learn how these new technologies offer enterprises lower costs, centralized management and more.
Posted: 17 Feb 2016 | Published: 12 Feb 2016

Carousel Industries

How to Evaluate UCaaS Providers' Security Measures
sponsored by Carousel Industries
EGUIDE: This e-guide discusses ways you can address the security concerns of UCaaS, including multi-tenancy and encryption. It goes on to provide ways you can evaluate the security measures that potential UCaaS vendors are building into their services.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

Carousel Industries

Shopping for a UC Cloud Services Provider
sponsored by Carousel Industries
EGUIDE: This e-guide discusses the UC cloud services market and the factors you should consider to find the most appropriate UC provider for your enterprise.
Posted: 15 Feb 2016 | Published: 09 Feb 2016

Carousel Industries

SSL Certificate Management: How to Avoid Common Mistakes
sponsored by Symantec Website Security
EGUIDE: This expert e-guide describes the most common SSL certificate management mistakes and provides advice on how to avoid them. Discover how to choose the best certificates for your enterprise's needs, manage renewal of certificates, and more.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

SSL Certificate Management: A Practical Guide
sponsored by Symantec Website Security
EGUIDE: This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Breach Detection System: Detecting the Pros and Cons
sponsored by Fortinet, Inc.
ANALYST REPORT: In this report by NSS Labs, independent experts take a closer look at a breach detection system. Evaluate the strengths, weaknesses, opportunities, and threats of this network security approach to determine if it's the right step for your enterprise.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Protect Revenue and Emphasize User Experience with APM Tools
sponsored by eG Innovations, Inc.
EGUIDE: Looking to boost revenue and keep your customers happy with an improved user experience? Access this expert guide to learn how to leverage the latest in application performance management (APM) tools and discover a host of approaches to evaluate end-user experience across all channels.
Posted: 05 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

ComputerWeekly.com

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Buyer's Guide: What to Look for in a Content Delivery Network
sponsored by SearchNetworking.com
EBOOK: Demand for fast, secure content delivery is on the rise. Learn about the latest in content delivery networks (CDNs) and why you should consider adopting one. This buyer's guide also discusses the features available from CDN providers, and how you can evaluate their offerings to choose the right CDN for your enterprise.
Posted: 13 Jan 2016 | Published: 08 Jan 2016

SearchNetworking.com

Modern Mobility E-zine – January
sponsored by SearchMobileComputing
EZINE: Discover why many IT departments continue to struggle with compliance in the mobile era and what tools are available to help admins get a better grasp on best practices. Access this e-zine to also get an exclusive, in-depth look at how to ease into EMM in the modern era.
Posted: 13 Jan 2016 | Published: 08 Jan 2016

SearchMobileComputing

January Ezine: An issue covering what will happen in storage and networking in 2016
sponsored by MicroScope
EZINE: What does the year ahead hold? Plenty of action if you are involved with the software-defined networking market and the storage arena
Posted: 05 Jan 2016 | Published: 08 Jan 2016

MicroScope

Assure Your Delivery of Quality UC Service with Network and Data Center Visibility
sponsored by NetScout Systems, Inc.
VIDEO: In this webcast, you will discover how to swiftly resolve problems that affect your UC with a service assurance platform that offers end-to-end networking and data center visibility. Tune in to pinpoint the cause of your UC problems by addressing voice and video media impairments.
Posted: 21 Dec 2015 | Premiered: 21 Dec 2015

NetScout Systems, Inc.

How to Analyze the SIP Failures in Your Network
sponsored by NetScout Systems, Inc.
VIDEO: VoIP is commonly thought of as making external connections via simple paths. The truth is that these paths are often complex. This brief video demonstrates how to improve visibility, drill into network issues and triage SIP failures.
Posted: 11 Dec 2015 | Premiered: 11 Dec 2015

NetScout Systems, Inc.
226 - 250 of 1197 Matches Previous Page    8 9 10 11 12 13    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement