Network packet

Results: 2869



#Item
381OSI protocols / Network architecture / Network performance / Transmission Control Protocol / Metro Ethernet / TCP tuning / ISCSI / Low latency / Ethernet / VMware / Computing

DeepStorage.net Labs Validation Report latency, packet loss and jitter levels consistent with the types of links medium and large enterprises would use between their primary and secondary data centers. The values for the

Add to Reading List

Source URL: www.deepstorage.net

Language: English - Date: 2013-03-12 14:06:43
382Videotelephony / Mobile telecommunications / Universal Mobile Telecommunications System / Smartphones / Software-defined radio / High-Speed Uplink Packet Access / 3G / Ericsson / Mobile phone / Technology / Electronic engineering / Electronics

ericsson White paper Uen | February 2015 3G smartphones optimizing user experience and network efficiency Rapid global smartphone uptake is creating new mobile data traffic patterns. There is an opportunity f

Add to Reading List

Source URL: economictimes.indiatimes.com

Language: English - Date: 2015-05-13 02:19:13
383Deep packet inspection / Network architecture / Computer networking / Packet Processing / Mobile data offloading / Quality of service / Transmission Control Protocol / System Architecture Evolution / Deep content inspection / Computing / Computer network security / Electronic engineering

Application Datasheet Mobile Data Offloading Use Case Application awareness to enable data delivery with network technologies complementary to 3G/4G such as WiFi networks or femtocells.

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:07:49
384Deep packet inspection / Internet privacy / Network architecture / SonicWALL / Research In Motion / Virtual private network / WatchGuard / Technology / Economy of Canada / Computer network security / Computing / Content-control software

Microsoft PowerPoint - security notes 3-6

Add to Reading List

Source URL: signalhill.in

Language: English - Date: 2013-09-25 15:28:43
385Network architecture / TCP/IP / Flow control / Internet protocols / Packet loss / Transmission Control Protocol / TCP tuning / Explicit Congestion Notification / Slow-start / Network performance / Data / Computing

Reducing Web Latency: the Virtue of Gentle Aggression Tobias Flach* , Nandita Dukkipati† , Andreas Terzis† , Barath Raghavan† , Neal Cardwell† , Yuchung Cheng† , Ankur Jain† , Shuai Hao* , Ethan Katz-Bassett*

Add to Reading List

Source URL: nsl.cs.usc.edu

Language: English - Date: 2013-05-30 13:36:04
386Cisco Systems / Deep packet inspection / Videotelephony / Computer security / Identity theft / Computing / International Cybercrime / HITRUST / Security / Computer network security / Crime

Combating Cybercrime in the Healthcare Industry White Paper Insights on Overcoming the Obstacles of

Add to Reading List

Source URL: www.cisco.com

Language: English
387Technology / Teleconferencing / Cisco Systems / Deep packet inspection / Tandberg / CT Connect / Videotelephony / Electronic engineering / Electronics

CREATE THE OPPORTUNITY Founders Equity Portfolio Company - CTi Continues Quest to Build World Class Converged Network Systems Integrator AAA Networks is third major acquisition of CTi’s consolidation strategy

Add to Reading List

Source URL: www.fequity.com

Language: English - Date: 2009-06-15 20:21:04
388Electronics / Teletraffic / Cloud computing / Fast And Secure Protocol / Packet loss / Streaming media / Transmission Control Protocol / Adaptive bitrate streaming / Quality of service / Computing / Network performance / Network architecture

Aspera FASPstream for near-live and live video streaming An Aspera Labs Whitepaper AprilWHITE PAPER

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2015-04-20 17:07:13
389Electronic engineering / Deep packet inspection / Videotelephony / Job Corps / Computer network / Cisco Career Certifications / Cisco Certified Entry Networking Technician / Education / Computing / Cisco Systems

Computer Networking/Cisco Career Technical Training Area

Add to Reading List

Source URL: recruiting.jobcorps.gov

Language: English - Date: 2015-04-27 10:56:58
390Voice over IP / Videotelephony / Computer network security / Internet privacy / Broadband / Skype protocol / Deep packet inspection / Tor / Traffic shaping / Software / Computing / Skype

SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-08-25 10:47:50
UPDATE