IT Management  >   Systems Operations  >  

Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 
Definition continues below.
Networking Reports
51 - 75 of 1042 Matches Previous Page  |  Next Page
Application Usage and Threat Report
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper offers a look at key findings with common sharing applications and why they are mostly used by hackers as a delivery system for cybercrime and theft. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Palo Alto Networks

What to Look for in Data Center Switches
sponsored by SearchNetworking.com
EBOOK: Speed, density and agility are things to consider when purchasing a new data center switch. This Buyer's Essentials guide will lay out the must-have data center switch features, along with some "nice to have" extras.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

SearchNetworking.com

How to Deliver Easy and Affordable Wi-Fi in High Density Networks
sponsored by Xirrus
WHITE PAPER: This exclusive white paper examines how a rock-solid Wi-Fi network can make all the difference for the students or end users on your network. Read on to learn more.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Xirrus

Technical Brief: Wall Mounted Access Points
sponsored by Xirrus
WHITE PAPER: This exclusive technical brief takes an in-depth look at how to manage your network infrastructure to create the most seamless Wi-Fi experience possible. Read on to learn more.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Xirrus

Technical Brief: High Density Access Points
sponsored by Xirrus
WHITE PAPER: This exlusive technical brief takes an in-depth look at overcoming the challenges of high density access points. Read on to learn more and take the first step towards a faster, more reliable wi-fi experience.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Xirrus

Gartner Magic Quadrant for Application Delivery Controllers
sponsored by F5 Networks
WHITE PAPER: This exclusive vendor comparison brought to you by the experts at Gartner reveal the top vendors in each quadrant - plus an in-depth look at pros and cons to all. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

F5 Networks

7 Keys to Rock Solid Communications – Year after Year after Year
sponsored by Unify
WHITE PAPER: This exclusive white paper offers 7 helpful tips for a rock-solid unified communications plan.  Read on to learn more.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Unify

The Current State of IT for Network Engineers
sponsored by Fluke Networks
WHITE PAPER: In this white paper, examine the state of the IT landscape today and what network engineers are up against. Read on to explore the benefits cloud computing has bestowed upon data center and the challenges it presents for network engineers.
Posted: 18 Feb 2015 | Published: 07 Jan 2015

Fluke Networks

Operationalizing the Network: SDN
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at a solution for today's application world: SDN. Read on to learn more.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

F5 Networks

CW Buyer's Guide: Software-Defined Everything
sponsored by ComputerWeekly.com
EBOOK: In this 10-page buyer's guide, Computer Weekly looks at the practicalities of the software-defined approach to everything including computing, networks, storage and more.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

ComputerWeekly.com

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

How to Meet the Needs of a Converged Network
sponsored by Extreme Networks
WHITE PAPER: This informative white paper discusses the needs of a converged network and introduces a network operating system that might meet them.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Extreme Networks

Dissecting The Era of Application Centric Networking
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights the growing popularity of applications, and why IT application delivery will continue to affect the business world.
Posted: 16 Feb 2015 | Published: 01 Aug 2013

Cisco Systems, Inc.

What You Need to Know Before a Windows Server 2003 Migration
sponsored by Hewlett-Packard Company
EGUIDE: Inside this expert e-guide, discover three questions you need to ask before a Windows server 2003 migration. Find out the hidden costs of migrating from this server and how to avoid its upgrade errors.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

Hewlett-Packard Company

The Three Drivers of Converged Systems
sponsored by Dell, Inc.
WHITE PAPER: Converged systems are easy to set up and manage and reduce staff resource expenses. Enterprises can create initiatives with more agility.Access this white paper to discover the value of convergence.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Dell, Inc.

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Making Your Enterprise Mobile Ready
sponsored by Accellion, Inc.
WHITE PAPER: Read this eBook to understand the needs and wants of a mobile workforce and the security policies and solutions enterprise IT should be considering.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

The Security Impact of Mobile Device Use by Employees
sponsored by Accellion, Inc.
WHITE PAPER: Read this report to learn about the behaviors that companies must address to prevent the misuse and abuse of their sensitive information and the recommendations to mitigate the risks created by these behaviors.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

Evolve Your UC Strategy with the Cloud
sponsored by Dimension Data
PRODUCT OVERVIEW: This exclusive white paper offers an in-depth look at the always-changing UC & C market and explains why UCC is something every organization should consider. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data

Deliver Reliable and Robust Wi-Fi for Healthcare
sponsored by Xirrus
WHITE PAPER: This exclusive white paper takes an in-depth look at how one wireless solution was able to deliver rock-solid Wi-Fi service to healthcare organizations. Read on to learn more.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Xirrus
51 - 75 of 1042 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORKING DEFINITION (continued): …  networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality.In a delay-tolerant network, … 
Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement