IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
26 - 50 of 1212 Matches Previous Page  |  Next Page
Advanced Endpoint Protection for Windows Server 2003 After End-of-Support
sponsored by Palo Alto Networks
WHITE PAPER: Identify how you can maintain security in your network, despite the fact that Windows Server 2003 has reached its End-of-Support.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Palo Alto Networks

Common Hyper-Converged Network Concerns and Solutions
sponsored by Hewlett Packard Enterprise
EGUIDE: Do your apps require either very high or very specific performance? Discover in this expert guide how to identify and resolve hyper-converged networking bottlenecks by implementing a dedicated storage network and examining how data is stored within your architecture.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Hewlett Packard Enterprise

Exceed Expectations: Choose an Application Delivery Controller Based on Value
sponsored by Array Networks
RESOURCE: Discover, side-by-side, the features of two available application delivery controllers. The advantages of going with the more nimble alternative will become plain.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Array Networks

New Cloud Architectures: Fueling the Change of the WAN Landscape
sponsored by Silver Peak
EBRIEF: As more applications move to the cloud, your MPLS-based WAN will begin to cause more performance, cost, and user experience issues. This white paper presents an alternative to traditional WANs that will help you achieve success with new cloud architectures.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Silver Peak

The Shift to SD-WAN
sponsored by Silver Peak
RESEARCH CONTENT: Learn how SD-WAN has enabled organizations from many fields to replace landlines and traditional WAN architectures. In this research report you will discover how organizations feel about SD-WAN, what their implementation plan is, and what they expect to achieve by making the switch.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Silver Peak

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc.
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

A Look Behind the Firewall
sponsored by Fortinet, Inc.
RESOURCE: Discover in this infographic how to diagnose your network performance based on traffic devoted to social media, audio, and video—and determine how this media may compromise your security. Read on to discover how to run a cyber-threat assessment to ensure your core business assets are well protected.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Automated Infrastructure Management Delivers Real-Time Network Visibility
sponsored by CommScope
WHITE PAPER: Explore how to gain real-time, granular visibility into the critical connectivity that drives your business with automated network infrastructure management (AIM).
Posted: 20 Jun 2016 | Published: 31 Dec 2015

CommScope

The Network Takes Center Stage
sponsored by IBM
EGUIDE: Pinpointing issues is becoming more challenging as networks expand and become more complex, but there are ways to monitor your network more effectively in order to spot the early warning signs of downtime. Access this special report to learn about analytics technology, outsourcing options, and more.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

IBM

Transforming the Networking Capabilities of Norway's Largest Hospital
sponsored by Avaya
CASE STUDY: Norway's largest health system needed a smart, scalable network to bring together 3 hospitals and absorb future growth. Read this case study to learn how employing a virtual enterprise network architecture fulfilled the health system's networking needs and could soon be fulfilling yours.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Avaya

Modern Infrastructure E-zine – June 2016
sponsored by SearchDataCenter.com
EZINE: Are containers an open source lifeline? That remains to be seen, as the technology just might offer a saving grace to the OpenStack infrastructure. Find out how containers are impacting Openstack deployment.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

SearchDataCenter.com

NetScaler for the best XenApp/XenDesktop access and mobile experience
sponsored by Citrix
WHITE PAPER: Network virtualization and mobility are the keys to enhancing today's mobile and globally dispersed workforce. Read on to discover ten reasons to adopt an application delivery controller that empowers mobile workers.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

Citrix

Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Network
sponsored by Citrix
WHITE PAPER: An influx of new devices and applications, bandwidth requirements, and a lack of end-to-end visibility are causing challenges and you are not alone. Overcome these challenges and enable the secure, reliable, cost-effective delivery of applications to any user, over any network.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Citrix

Consolidate your Secure Remote Access Delivery Infrastructure with One URL
sponsored by Citrix
WHITE PAPER: Many enterprises are experiencing fragmented secure remote access infrastructure primarily characterized by multiple URLs. This is creating inconsistent and poor access experiences for employees and users. Read on to discover a next-generation secure remote access solution that addresses these issues, particularly those dealing with mobility.
Posted: 14 Jun 2016 | Published: 29 May 2015

Citrix

Citrix networking from the customer perspective
sponsored by Citrix
WHITE PAPER: IT teams need to securely deliver virtual applications and desktops across wide-spread networks. Explore several case studies to learn about the challenges and solutions to securely deliver these technologies across vast networks.
Posted: 13 Jun 2016 | Published: 30 Nov 2015

Citrix

Canon U.S.A. Fully Automates VMOTION and Storage VMOTION with VMTurbo
sponsored by VMTurbo
WHITE PAPER: Resource allocation is the key to succeeding in virtualized environments. Read this brief case study to learn how one company was able to implement a solution that automatically made intelligent adjustments, allowing them to expand their virtual footprint and control over a complex virtual environment.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

VMTurbo

How to Increase App Reliability & Scale Bandwidth While Lowering Network Costs
sponsored by Citrix
WHITE PAPER: See how WAN virtualization provides a solution to the overstressed WAN dilemma. Allowing enterprises to expand WAN bandwidth goes a long way towards ensuring that business critical applications remain uninterrupted – even when underlying networks are unreliable.
Posted: 10 Jun 2016 | Published: 31 Dec 2015

Citrix

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
WHITE PAPER: To manage all things mobile, enterprise-wide security policies must be implemented. Learn how to improve mobile visibility with authorization and access policies that boast network privileges based on real-time contextual data, simple BYOD guest access, and more.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Laying the Groundwork for a New Level of Power over Ethernet
sponsored by CommScope
WHITE PAPER: Discover an overview of Power over Ethernet (PoE) technology, as well as recommendations to ensure that your cabling infrastructure is capable of supporting the PoE evolution.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

CommScope

Boston College Excels With VMTurbo to Assure Performance and Intelligently Plan for Growth
sponsored by VMTurbo
CASE STUDY: What if you could increase your virtual footprint by 30% or more? That's what one of Boston's top colleges did. Read on to find out how the college was able to incease its IT staff productivity by 20% and create a viable plan to meet future demands by improving its network infrastructure.
Posted: 10 Jun 2016 | Published: 31 Dec 2015

VMTurbo

Cyber Risk Report 2016 Executive Summary
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.
Posted: 10 Jun 2016 | Published: 19 Feb 2016

Hewlett Packard Enterprise

Improve User Experience for Branch and Mobile Workers
sponsored by Citrix
WHITE PAPER: Poor performance over the WAN can degrade the virtual desktop experience for branch and mobile workers. Learn how to overcome this challenge with innovative WAN optimization techniques.
Posted: 09 Jun 2016 | Published: 31 Dec 2014

Citrix

Top 5 Considerations in Transitioning to SDN for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Software-defined networking is an important enabling technology for the digital workplace. By the end of 2020, it is expected to impact about 80% of network purchase decisions. Access this white paper to explore the top five factors you should consider as you transition to SDN.
Posted: 07 Jun 2016 | Published: 07 Jun 2016

Aruba Networks

A Unified View of the Enterprise Network for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Trends in mobility and cloud-host enterprise applications are prompting enterprises to reconsider how they deploy enterprise networks. Find out how these trends are changing approaches to network management, the need for more unified, proactive security and the challenges this all presents.
Posted: 08 Jun 2016 | Published: 31 Mar 2016

Fortinet, Inc.
26 - 50 of 1212 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement