IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
26 - 50 of 1058 Matches Previous Page  |  Next Page
Customer Use Case: JMAC Lending
sponsored by Quest Systems
CASE STUDY: Explore how desktop-as-a-service enabled an organization to align all of its virtualization efforts in order to support a flexible work environment from anywhere, on any device while keeping applications and data secure.
Posted: 19 Dec 2014 | Published: 19 Dec 2014

Quest Systems

Enterprise Mobility Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility for financial services companies, and how taking control of the benefits of mobility today can pay off big time tomorrow. Read on to learn more.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

BlackBerry

Powering the hybrid enterprise
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at the hybrid enterprise, and how each must develop new strategies for optimizing multiple kinds of networks. Read on to learn more.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Riverbed Technology, Inc.

Enterprise Mobile Checklist: Reaching Regulatory Compliance
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility for organizations with strict regulatory compliance. Read on to learn more.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

BlackBerry

A powerful defense against denial of service attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 16 Dec 2014 | Published: 27 Dec 2013

Citrix

SDN 101: An Introduction to Software Defined Networking
sponsored by Citrix
WHITE PAPER: This white paper highlights the key opportunities that SDN can address for your business, as well as the relationship between SDN and NV.
Posted: 16 Dec 2014 | Published: 01 May 2014

Citrix

Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

The Rise of the Super-User
sponsored by Telstra Global
WHITE PAPER: This exclusive research report takes an in-depth look at what users in the unified communications network find the most helpful, and more. Read on to take the first step towards a better understanding of the future for UC.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Telstra Global

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Implementing Virtual Routing and Forwarding (VRF) on Cisco Nexus Data Center Switches
sponsored by Global Knowledge
WHITE PAPER: This white paper addresses Virtual Routing and Forwarding (VRF), which is a Layer 3 isolation mechanism for routing protocols.
Posted: 11 Dec 2014 | Published: 18 Nov 2014

Global Knowledge

Cloud collaboration 101: Managing the Mobile Storm
sponsored by Telstra Global
VIDEO: This exclusive video explores a cloud collaboration solution that focuses on processes that deal with the individual over the enterprise with a consumption model that goes from system to service.
Posted: 09 Dec 2014 | Premiered: 03 Sep 2014

Telstra Global

Why converged infrastructures are gaining momentum
sponsored by Presidio Network Solutions
EGUIDE: Access this white paper to explore why converged infrastructures are gaining popularity and a comparison of different converged infrastructure options and the benefits they can provide.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Presidio Network Solutions

Battle of the Ethernet Switches: Cisco vs. NETGEAR
sponsored by IT Central Station
ESSENTIAL GUIDE: Have you ever wondered exactly how many options there are for purchasing enterprise level Ethernet switches? Take a look at this comprehensive list of all enterprise Ethernet switches in this expert report which includes real user reviews from IT professionals, like you.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Product vs. Product: Everything you need to know before you buy
sponsored by IT Central Station
ESSENTIAL GUIDE: When making a buying decision for Application Performance Management, it can be challenging to know which product is the best fit for you and your organization. To make your decision easier, IT Central Station is offering you a comprehensive, unbiased guide of the most popular APM products on the market today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Product Comparison: Network Performance Monitoring
sponsored by IT Central Station
ESSENTIAL GUIDE: With the number of network performance monitoring products on the market, searching for the right one for your organization can be a challenge. With IT Central Station's comprehensive report, you will find IT Professionals' honest opinions about the most popular vendors and products in network performance management today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Step it Up with Microsoft Lync Room System
sponsored by Polycom, Inc.
WHITE PAPER: Learn how the Polycom® CX8000 and Polycom® CX5100, the 360-degree panoramic room view camera with HD active speaker tracking for Lync 2013, are designed to extend the familiar desktop Lync collaboration experience into the conference room making meetings more effective and engaging
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Polycom, Inc.

Top 10 Ways to Maximize your Lync Investment
sponsored by Polycom, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at 10 ways to maximize your Lync investment.  Read on to learn more.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Polycom, Inc.

Integrating Microsoft UC Solutions
sponsored by Polycom, Inc.
WHITE PAPER: You need a communication solution that anchors fast-moving teams and enables communication from any device, anywhere; and communication tools that integrate with applications you use daily that are managed through a single interface to streamline deployment and speed your return on investment (ROI). Read on to learn more.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Polycom, Inc.

UC Risk Management and ROI: Why Lync Deployments Lead the Way
sponsored by Polycom, Inc.
WHITE PAPER: Read why Polycom is a top strategic partner for Microsoft Lync for mission-critical voice and video services.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Polycom, Inc.

Lowering the Cost of Communications and Six More Benefits of Lync Enterprise Voice
sponsored by Polycom, Inc.
WHITE PAPER: Lync Enterprise Voice and Lync video can improve worker productivity and streamline business processes, while lowering the overall total cost of communications. Read insights into the biggest benefits of Lync Enterprise Voice and video.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Polycom, Inc.

Staying Secure in the Cloud: Considerations for Migrating Communications Solutions to Cloud Services
sponsored by ShoreTel
WHITE PAPER: This white paper examines security considerations for migrating communication solutions into the cloud and offers insight into how a cloud service protects your valuable data. Read on to learn more.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

ShoreTel
26 - 50 of 1058 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement