IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
51 - 75 of 1045 Matches Previous Page  |  Next Page
Making Networks Virtual: The Latest on SDN Technologies.
sponsored by VMware
EBOOK: This TechGuide edition lays out the basics of SDN and network virtualization, and how they work with one another.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

VMware

How a Luxury Hotel Solved their Wireless Challenge
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive case study describes what a luxury hotel in Bangkok did to solve their wireless Internet problem.
Posted: 11 Mar 2015 | Published: 31 Oct 2013

Hewlett-Packard Limited

Boost Sales with CNAM
sponsored by Flowroute
WHITE PAPER: This white paper explains the benefits of Caller ID Name (CNAM), a simple service that can boost sales simply by showing who's calling.
Posted: 11 Mar 2015 | Published: 31 Dec 2013

Flowroute

Group-Based Policy for OpenStack
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper introduces the new OpenStack Group-Based Policy (GBP) framework designed to offer a new set of API extensions to manage OpenStack infrastructure through declarative policy abstractions. Find out how GBP is based on four main concepts and explore a broad range of use cases.
Posted: 10 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

How to Delivery Cutting Edge Productivity via Mobility
sponsored by Dimension Data
WEBCAST: Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

Dimension Data

Case Study: How One Organization Powered a Private Cloud for 110 Million people
sponsored by XO Communications
CASE STUDY: This exclusive case study shows how one organization, Gannett, powers a private cloud that engages more than 110 people every month. Read on to learn more and gain a better understand of how the right partners can make all the difference for your WAN.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

XO Communications

March Network Evolution – Cloud Networking Gets Real
sponsored by SearchNetworking.com
EZINE: In this issue of "Network Evolution," discover what it means to build a cloud networking strategy and learn from several IT departments that have already done so.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

SearchNetworking.com

3 Key Insights of UC&C Complexity
sponsored by Premiere Conferencing
WHITE PAPER: This exclusive white paper highlights the 3 complex forces of UC&C complexity and how to work around them. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015


What to Look for in Data Center Switches
sponsored by SearchNetworking.com
EBOOK: Speed, density and agility are things to consider when purchasing a new data center switch. This Buyer's Essentials guide will lay out the must-have data center switch features, along with some "nice to have" extras.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

SearchNetworking.com

Gartner Magic Quadrant for Application Delivery Controllers
sponsored by F5 Networks
WHITE PAPER: This exclusive vendor comparison brought to you by the experts at Gartner reveal the top vendors in each quadrant - plus an in-depth look at pros and cons to all. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

F5 Networks

7 Keys to Rock Solid Communications – Year after Year after Year
sponsored by Unify
WHITE PAPER: This exclusive white paper offers 7 helpful tips for a rock-solid unified communications plan.  Read on to learn more.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Unify

The Current State of IT for Network Engineers
sponsored by Fluke Networks
WHITE PAPER: In this white paper, examine the state of the IT landscape today and what network engineers are up against. Read on to explore the benefits cloud computing has bestowed upon data center and the challenges it presents for network engineers.
Posted: 18 Feb 2015 | Published: 07 Jan 2015

Fluke Networks

Operationalizing the Network: SDN
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at a solution for today's application world: SDN. Read on to learn more.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

F5 Networks

CW Buyer's Guide: Software-Defined Everything
sponsored by ComputerWeekly.com
EBOOK: In this 10-page buyer's guide, Computer Weekly looks at the practicalities of the software-defined approach to everything including computing, networks, storage and more.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

ComputerWeekly.com

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

Dissecting The Era of Application Centric Networking
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights the growing popularity of applications, and why IT application delivery will continue to affect the business world.
Posted: 16 Feb 2015 | Published: 01 Aug 2013

Cisco Systems, Inc.

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Making Your Enterprise Mobile Ready
sponsored by Accellion, Inc.
WHITE PAPER: Read this eBook to understand the needs and wants of a mobile workforce and the security policies and solutions enterprise IT should be considering.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

The Security Impact of Mobile Device Use by Employees
sponsored by Accellion, Inc.
WHITE PAPER: Read this report to learn about the behaviors that companies must address to prevent the misuse and abuse of their sensitive information and the recommendations to mitigate the risks created by these behaviors.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

Deliver Reliable and Robust Wi-Fi for Healthcare
sponsored by Xirrus
WHITE PAPER: This exclusive white paper takes an in-depth look at how one wireless solution was able to deliver rock-solid Wi-Fi service to healthcare organizations. Read on to learn more.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Xirrus
51 - 75 of 1045 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement