IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
26 - 50 of 1047 Matches Previous Page  |  Next Page
7 Keys to Rock Solid Communications – Year after Year after Year
sponsored by Unify
WHITE PAPER: This exclusive white paper offers 7 helpful tips for a rock-solid unified communications plan.  Read on to learn more.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Unify

The Current State of IT for Network Engineers
sponsored by Fluke Networks
WHITE PAPER: In this white paper, examine the state of the IT landscape today and what network engineers are up against. Read on to explore the benefits cloud computing has bestowed upon data center and the challenges it presents for network engineers.
Posted: 18 Feb 2015 | Published: 07 Jan 2015

Fluke Networks

Operationalizing the Network: SDN
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at a solution for today's application world: SDN. Read on to learn more.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

F5 Networks

CW Buyer's Guide: Software-Defined Everything
sponsored by ComputerWeekly.com
EBOOK: In this 10-page buyer's guide, Computer Weekly looks at the practicalities of the software-defined approach to everything including computing, networks, storage and more.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

ComputerWeekly.com

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

Integrated Network Security Architecture: Threat-focused Next-generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: How bad have things gotten and what should CISOs do to address these issues? Find out now by reading this whitepaper.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Cisco Systems, Inc.

Take Control of Converged Applications With a Smarter Network Operating System
sponsored by Extreme Networks
WHITE PAPER: Access this informative white paper to learn why a particular modular operating system plays a vital role in building networks that run today's business applications.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Extreme Networks

Dissecting The Era of Application Centric Networking
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights the growing popularity of applications, and why IT application delivery will continue to affect the business world.
Posted: 16 Feb 2015 | Published: 01 Aug 2013

Cisco Systems, Inc.

What You Need to Know Before a Windows Server 2003 Migration
sponsored by Hewlett-Packard Company
EGUIDE: Inside this expert e-guide, discover three questions you need to ask before a Windows server 2003 migration. Find out the hidden costs of migrating from this server and how to avoid its upgrade errors.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

Hewlett-Packard Company

The Three Drivers of Converged Systems
sponsored by Dell, Inc.
WHITE PAPER: Converged systems are easy to set up and manage and reduce staff resource expenses. Enterprises can create initiatives with more agility.Access this white paper to discover the value of convergence.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Dell, Inc.

Enterprises Need Monitoring to Ensure Lync UC Performance
sponsored by Nectar Corp
WHITE PAPER: In this eguide learn tips on leveraging network performance monitoring tools to ensure UCC performance success
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Nectar Corp

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Experts and Early Adopters Share Successes and Pitfalls of 40 Gigabit Ethernet
sponsored by Comcast
EGUIDE: Check out this e-guide to learn about what experts and early adopters of 40 Gigabit Ethernet have to say about their successes and pitfalls.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Comcast

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

La-Z-Boy Incorporated
sponsored by Zscaler
CASE STUDY: This case study describes how La-Z-Boy partnered with Zscaler to reduce bandwidth costs and complexity while increasing the visibility of web activity.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

Comcast Ethernet V. Dark Fiber: The Dark Side of Dark Fiber
sponsored by Comcast
WHITE PAPER: This white paper investigates the dark side of dark fibers used for networking, and may not be the best solution to meet your business needs.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Comcast

Evolve Your UC Strategy with the Cloud
sponsored by Dimension Data
PRODUCT OVERVIEW: This exclusive white paper offers an in-depth look at the always-changing UC & C market and explains why UCC is something every organization should consider. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data

The Rise of UC Applications
sponsored by SearchUnifiedCommunications.com
EBOOK: Unified communications applications are increasingly important to enterprise users who want communications functions incorporated into their existing systems, including cloud- and premises-based options. Employees need to learn about the advantages of streamlining communications, and how UC applications may simplify UC integration issues.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

SearchUnifiedCommunications.com

CW Buyer's Guide: Emerging technologies in networking
sponsored by ComputerWeekly.com
EBOOK: Check out this extensive buyers' guide to explore technologies that are designed to improve networking, and for an inside glance at what established suppliers are doing to re-invent their offerings.
Posted: 09 Jan 2015 | Published: 06 Jan 2015

ComputerWeekly.com

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks
26 - 50 of 1047 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement