IT Management  >   Systems Operations  >  

Networking

RSS Feed   
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 

Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
Networking Reports
1 - 25 of 1087 Matches Previous Page  |  Next Page
Juniper Connected Security: Dynamic, Adaptive Multi-cloud Security
sponsored by Juniper Networks
WHITE PAPER: Download this white paper to learn about Juniper Networks' Connected Security framework—which uses dynamic access groups and a unified and intuitive metadata-based policy model that can be ported across clouds—to give security admins complete command and control over their multi-cloud deployments.
Posted: 19 Apr 2019 | Published: 19 Apr 2019

Juniper Networks

Discover Unified Communications and Collaboration as a Service
sponsored by Verizon
WHITE PAPER: In this white paper, learn about Verizon's Global Private IP Service, a private network designed to support your critical unified communications and collaboration while maintaining security in the cloud.
Posted: 16 Apr 2019 | Published: 31 Dec 2018

Verizon

CW ASEAN Trend Watch April 2019
sponsored by ComputerWeekly.com
EZINE: Businesses the world over are gradually turning up the dial on 5G. In this handbook, focused on business IT in the ASEAN region, Computer Weekly looks at the great spectrum conundrum, considers the potential of digital indoor systems and weighs up the challenges and opportunities that 5G presents for edge computing
Posted: 12 Apr 2019 | Published: 12 Apr 2019

ComputerWeekly.com

CW ANZ Trend Watch April 2019
sponsored by ComputerWeekly.com
EZINE: Businesses the world over are turning up the dial on 5G.
Posted: 12 Apr 2019 | Published: 12 Apr 2019

ComputerWeekly.com

CloudHubs and the Future of WAN Architecture
sponsored by Apcela
WHITE PAPER: In today's "cloud-first" environment, many enterprises are coming to realize that they need to have data center resources hosted where their applications already are or are going: in the cloud. Read this white paper to learn the common reasons why enterprises are increasingly embracing a cloud-first data center infrastructure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Apcela

The Truths and Lies of IoT Security: Monitoring Connected Devices
sponsored by MASERGY
WHITE PAPER: As the Internet of Things (IoT) accelerates the pace of the enterprise with data-driven decision making, CEOs, CIOs, and CISOs are making the dash for the IoT playing field. But how do they get in the game while not jeopardizing security? In this white paper, learn about key security considerations for IoT.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

MASERGY

IoT Readiness: 5 Network and Security Necessities
sponsored by MASERGY
WHITE PAPER: In this white paper, learn about the 5 networking and security features that can help ensure your infrastructure is ready for IoT.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

MASERGY

CW Middle East ezine April 11 2019
sponsored by ComputerWeekly.com
EZINE: It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
Posted: 05 Apr 2019 | Published: 11 Apr 2019

ComputerWeekly.com

Beyond the Buzzword: SD-WAN
sponsored by Softchoice
WHITE PAPER: What is SD-WAN, really? Why should you consider it? Who is it for? How do you leverage it to meet your specific business and IT goals? In this guide, find out what all the buzz is about surrounding SD-WAN.
Posted: 04 Apr 2019 | Published: 04 Apr 2019

Softchoice

Citizens Broadband Radio Service (CBRS): Redefining Communications
sponsored by Motorola, Inc.
WHITE PAPER: What is the Citizens Broadband Radio Service (CBRS) and what does it mean for your organization? Find out in the white paper, and separate fact from fiction by busting 4 CBRS myths.
Posted: 04 Apr 2019 | Published: 31 Mar 2019

Motorola, Inc.

Global Payments Technology Company Achieves PCI Compliance
sponsored by comForte AG
CASE STUDY: An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

comForte AG

Intent-Based Networking: What to Know
sponsored by TechTarget
RESOURCE: The hype machine for intent-based networking (IBN) has been working overtime for the past 18 months. Yet, despite all the hoopla and attention, many people are left wondering what IBN can actually do for them in 2019. Find out in our guide, Complete Guide to Intent-Based Networking, which you'll receive after a multiple-choice survey.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

TOPICS:  Networking
TechTarget

April ezine: SD-WAN more than just networking
sponsored by MicroScope
EZINE: An issue covering SD-WAN, storage innovations and opportunities for channel growth
Posted: 28 Mar 2019 | Published: 28 Mar 2019

MicroScope

SD-WAN Network Connectivity Design: A 3-Step Process to Balance Price, Performance, and Risk
sponsored by MASERGY
WHITE PAPER: SD-WAN is making it easier than ever to diversify WAN connectivity but this new agility brings with it the responsibility to engineer the smartest network design. In this white paper, explore best practices and a 3-step process you can use to help you design your network.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

MASERGY

WAVE Push-to-Talk: Connect Mobile Workers Quickly & Securely
sponsored by Motorola, Inc.
WHITE PAPER: Whether you rely on smartphones, radios, computers, or landlines, find out how you can enable push-to-talk (PTT) communications across broadband and radio networks so that critical, time-sensitive information flows quickly and securely between mobile workers and teams.
Posted: 26 Mar 2019 | Published: 31 Dec 2018

Motorola, Inc.

Every Guest Experience Perfected with Unified Voice and Data Communications
sponsored by Motorola, Inc.
PRODUCT OVERVIEW: For the hospitality sector, embracing new technology while retaining the personal touch is crucial—but how do you do that? Having unified voice and data communications can significantly help. Learn more about it in this white paper.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Motorola, Inc.

The Benefits of Network Visibility for Industrial Automation
sponsored by Forescout
WHITE PAPER: Industrial assets owners have little to no visibility into existing industrial threats and flaws, and therefore no way to anticipate, analyze and respond to incidents. This whitepaper shows how the use of network monitoring technology in manufacturing networks brings tremendous value to both information technology and operational technology teams.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

Using Fiber-Based Internet to Sharpen Business Agility and Profitability
sponsored by Spectrum Enterprise
CASE STUDY: Mirazon, an IT consulting firm, wanted to upgrade their Internet service to offer remote security and managed solutions to a diverse range of customers. Mirazon chose to implement Spectrum Enterprise Fiber Internet Access. Learn about the benefits they've experience since switching to Spectrum in this case study.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Spectrum Enterprise

How Passive Monitoring Can Streamline NERC CIP Compliance
sponsored by Forescout
EBOOK: The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards are a set of requirements designed to secure the assets required for operating North America's bulk electric system. In this e-book, learn how SilentDefense can help North-American utilities by saving considerable effort and money.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

A Guide to Simplifying Compliance with NIST SP 800-53 and 800-82
sponsored by Forescout
RESOURCE: NIST Special Publication (SP) 800-53r4 provides a catalog of security controls for federal information systems and organizations and a process for selecting controls to protect operations and organizations. In this resource, explore the provided table which presents NIST SP's security controls applicable to ICS networks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

Securing the Critical Industrial Infrastructure
sponsored by Splunk Services UK Ltd
WHITE PAPER: Awareness of the impact of a breach in the ICS (Industrial Control Systems) and OT (operational technology) environment has risen considerably. Threats to ICS could have severe impacts on the business and reputation of an organization. In this white paper, learn how cyberattacks are affecting both IT and OT networks, including the risks involved.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk Services UK Ltd

Strengthen Network Security with DNS
sponsored by Farsight Security
WEBCAST: In this webinar, ThreatSTOP Chief Scientist Dr. Paul Mockapetris, the inventor of DNS, and Farsight Security CEO Dr. Paul Vixie, who designed, implemented and deployed several DNS protocol extensions and applications that are used throughout the Internet today, will discuss how you can use DNS to strengthen your network security.
Posted: 15 Mar 2019 | Premiered: Mar 15, 2019

Farsight Security

Building a Cloud Migration Launchpad: 3 Steps for Network and Security Readiness
sponsored by MASERGY
WHITE PAPER: Establishing an IT launchpad for cloud migration can help you significantly accelerate the process. In this white paper, learn 3 crucial steps you can take to help prepare your network for cloud migration.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

MASERGY

The Modality of Mortality in Domain Names
sponsored by Farsight Security
RESEARCH CONTENT: In this study, Farsight Security monitored an ongoing data feed of newly observed domains (NODs) to generate a cohort data set, and periodically probed those names to determine what happens to them. Learn more about NODs to help your organization create a more secure DNS policy and improve its security posture.
Posted: 15 Mar 2019 | Published: 31 Oct 2018

Farsight Security

Mobile World Congress 2019: The year 5G use cases got real
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we will examine some of the bigger themes that emerged over the course of Mobile World Congress 2019 - which now attracts over 100,000 people every year.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

ComputerWeekly.com
1 - 25 of 1087 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement