Correct bad network behavior to bolster application experience

Legacy hardware-based applications existed happily in isolation, untethered from a network. The thing that really mattered was the speed of the hard drive and having enough memory.

Source: Help Net Security

 


Date:

Categorie(s):

Tag(s):