IT Management  >   Systems Operations  >  

Networking

RSS Feed   
DEFINITION: A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency -- sometimes measured in hours or days -- is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.Delay-tolerant  … 

Networking definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
Networking Reports
76 - 100 of 1181 Matches Previous Page  |  Next Page
7 Insights into Today’s Network Monitoring and Management Approaches
sponsored by Gigamon
RESOURCE: Managing today’s complex networks isn’t an easy task to navigate. In this infographic, explore 7 monitoring and management trends and challenges network operations executives are experiencing today.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Gigamon

Cell Site Gateway Router
sponsored by Volta Networks
DATA SHEET: Mobile Network Operators (MNOs) need to make fundamental changes to their infrastructures to capitalize on the growth opportunities in expanded 4G and new 5G environments. In this brief, learn how Volta Networks can help by giving wireless network operators the ability to scale out their routing capacity right at their cell sites.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Volta Networks

Federal Agency Turns to SAIC for Cybersecurity Resiliency
sponsored by Gigamon
CASE STUDY: A large U.S. federal agency brought in SAIC (Science Applications International Corporation) to assess and revamp their aged network security infrastructure. Learn how the SAIC team brought new security tools into the agency’s infrastructure and helped improve their security posture and network operations.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Gigamon

Provider Edge Router: Changing the Economics of Edge Routing
sponsored by Volta Networks
DATA SHEET: For service providers, their provider edge (PE) routers are the points at which they deliver many of their revenue-generating services. Their PE routers’ capabilities need to evolve to meet customers’ changing needs. In this brief, learn how Volta Elastic Virtual Routing Engine can help address the limitations of legacy edge routers.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Volta Networks

Your Guide to End-to-End Unified Industrial Communications
sponsored by Motorola, Inc.
WHITE PAPER: Whether you work in hospitality, manufacturing, transportation, or any other industrial workplace, your business relies on many disparate technologies to get the job done. In this white paper, learn how Motorola Solutions’ end-to-end industrial communications suite can help to break down the walls between your disparate technologies.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Motorola, Inc.

Security at the Speed of Your Network
sponsored by Gigamon
WHITE PAPER: Read “Security at the Speed of Your Network” to learn how to use an architectural approach that improves security posture and reduces costs without painful compromises on performance.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Gigamon

Why SD-WAN Requires a New Approach to Security
sponsored by Zscaler
ANALYST REPORT: SD-WAN improves user experience by providing direct access to the Internet for cloud-based apps. However, local Internet connections must be secure to protect organizations from bad actors. In this report, learn how organizations can secure direct-to-cloud connections.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Zscaler

Peering Router: Meeting the Requirements of Dynamic Network Interconnection
sponsored by Volta Networks
DATA SHEET: IP peering has become increasingly critical which is pressuring service providers to increase connection speeds of their peering routers. However, many providers are still using routers that are too old to merit new investment. In this brief, learn about Volta Virtual Peering Router application which provides a modern approach to peer routing.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Volta Networks

Understanding the Value of Application-Aware Network Operations
sponsored by Gigamon
ANALYST REPORT: Achieving application-level visibility is hard. What’s needed are application-aware network packet brokers to reduce the overhead on packet inspection by delivering only relevant data to tools. Download the EMA report, “Understanding the Value of Application-Aware Network Operations” to learn more about the benefits of true application visibility.
Posted: 17 Feb 2020 | Published: 30 Jun 2019

Gigamon

ESG Brief: The Importance of a Common Distributed Data Services Layer
sponsored by Gigamon
RESEARCH CONTENT: Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools.
Posted: 14 Feb 2020 | Published: 13 Jun 2019

Gigamon

Apcela Arcus Platform: Enterprise Multi-Cloud WAN
sponsored by Apcela
DATA SHEET: Apcela Arcus Platform allows enterprises to easily plug their existing network into a SD-WAN that was built for today’s multi-cloud environment. In this brief, learn more about the Apcela Arcus Platform.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Apcela

GoAnywhere MFT
sponsored by Help/Systems
DATA SHEET: GoAnywhere MFT is an enterprise-level solution which will secure, automate and manage all of your organization’s file transfer needs through a single interface. In this data sheet, learn how GoAnywhere MFT can help your organization comply with data privacy regulations.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Help/Systems

Infographic: Comparing the leading SD-WAN vendors
sponsored by ComputerWeekly.com
EGUIDE: This SD-WAN vendor comparison chart is a useful starting point to get information about SD-WAN deployment options, pricing, cloud connectivity options and more.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Infographic: Which 5G applications will transform your business?
sponsored by ComputerWeekly.com
EGUIDE: The UK's operators have started work on their 5G network roll-outs, but what are the applications that are most likely to gain enterprise traction for the new standard?
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Replacing FTP Scripts with Managed File Transfer
sponsored by Help/Systems
WEBCAST: Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.
Posted: 12 Feb 2020 | Premiered: Feb 12, 2020

Help/Systems

SD-WAN Managed Services Trends
sponsored by Aryaka
ANALYST REPORT: Today, it is harder than ever to choose the right SD-WAN technology. Not only are there many SD-WAN vendors but SD-WAN is also being delivered from the cloud as a service and bundled with transport by major service providers and cloud providers as a managed service. In this report, learn more about the future direction of SD-WAN managed services.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Aryaka

Will SD-WAN Enhance Your Enterprise Networks for The Cloud?
sponsored by GTT Americas, LLC
EBOOK: Enterprises face the challenge of many cloud services being delivered from other continents, meaning increased latencies. In this e-book, discover best practices to help your organization reap the benefits of SD-WAN and make the unpredictable internet look and feel a lot more like your own network.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

GTT Americas, LLC

Industrial Giant Discovers 200,000 Network Endpoints in One Day
sponsored by Beta Systems
CASE STUDY: One of the world’s leading industrial companies planned to roll out IEEE 802.1X-based authentication. To pinpoint the scope and cost of this project, the industrial giant needed a precise categorization of all devices on its network. In this case study, learn why the company decided to use Auconet BICS to discover their network devices.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Beta Systems

Accelerate Office 365 Performance Up to 40X with Aryaka
sponsored by Aryaka
DATA SHEET: Team productivity within modern enterprises is highly dependent on a high performance and a reliable network, especially when using cloud applications such as Office 365. In this brief, learn about Aryaka’s SmartCONNECT SD-WAN as a Service which offers a solution for faster Office 365 performance for globally distributed enterprises.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Aryaka

The CIO Guide to SD-WAN
sponsored by Aryaka
ANALYST REPORT: In this report, explore how SD-WAN deployments can help save an enterprise millions of dollars in network costs, reduce bandwidth outages, and also lower the amount of support tickets for network troubleshooting.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Aryaka

5 benefits and challenges of DCI
sponsored by ComputerWeekly.com
EGUIDE: Data center interconnect, or DCI, is technology that links two or more data centers together so they can share resources. DCI technology offers many options and reacts differently with other areas of networking. This e-guide explores the benefits and challenges of DCI, as well as how it interacts with other technologies.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

ComputerWeekly.com

Business Infrastructure Control System – BICS
sponsored by Beta Systems
DATA SHEET: Up to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see. In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Beta Systems

Network Security Management for IT and Industrial Networks
sponsored by Beta Systems
WHITE PAPER: Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Beta Systems

Comparing traditional WAN vs. SD-WAN
sponsored by ComputerWeekly.com
EGUIDE: While comparing traditional WAN vs. SD-WAN, network professionals can see the many benefits of SD-WAN, including centralized control and dynamic traffic management.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

ComputerWeekly.com

Network Management for IP-based Networks
sponsored by Beta Systems
WHITE PAPER: In this white paper, explore a high-level introduction to network management in the Auconent Business Infrastructure Control Solution (BICS) for office and industrial networks.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Beta Systems
76 - 100 of 1181 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info