IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management White Papers (View All Report Types)
101 - 125 of 974 Matches Previous Page  |  Next Page
Unified Communications: Providing Quality of Service over Any Connection
sponsored by ThinkingPhones
WHITE PAPER: This resource tells the story of one unified communications provider and how they have evolved to meet the needs of mobility.
Posted: 17 Mar 2015 | Published: 01 Jan 2015

ThinkingPhones

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to uncover how a next-gen firewall closes network gaps and explore the top 10 considerations for platform evaluation.
Posted: 17 Mar 2015 | Published: 12 Feb 2014

Cisco Systems, Inc.

The Buyer's Guide to Mobile Management Products
sponsored by IBM
WHITE PAPER: This research study reveals which enterprise mobile management products performed the best in terms of offerings, strategy and more.
Posted: 13 Mar 2015 | Published: 30 Sep 2014

IBM

How Mobile and BYOD Transform Business
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explains the benefits of and barriers to adopting mobility and gives you ideas for how you can implement mobility in your workplace.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

Dell, Inc. and Intel®

Better Manage Your BYOD Program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper provides indispensible advice on how to select device specifications for BYOD, how to streamline management, and more.
Posted: 11 Mar 2015 | Published: 31 Oct 2014

Dell, Inc. and Intel®

Enhancing employee flexibility while reducing IT complexity
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this exclusive case study to find out what solutions Dell took to embrace BYOD, streamline IT, and manage their security at the same time.
Posted: 11 Mar 2015 | Published: 31 Aug 2014

Dell, Inc. and Intel®

How to choose your Unified Communication and Collaboration Platform Vendor
sponsored by Dimension Data
WHITE PAPER: This exclusive white paper takes an in-depth look at the best way to choose your unified communication and collaboration vendor, and best practices along the way to make the transition smooth. Read on to learn more.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

Dimension Data

More Performance, Please: How to Future-Proof Your Enterprise Network
sponsored by Equinix
WHITE PAPER: Access this e-book to learn about the latest trends in enterprise networking and how to improve your network performance.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

Equinix

The PBX Dilemma: Hosted or Premises-Based?
sponsored by XO Communications
WHITE PAPER: This exclusive white paper offers a look at hosted VoIP vs. on-premises, and why hosted VoIP has so many benefits for organizations.  Read on to learn more.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

XO Communications

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

Changing Face of Mobility: Raises The Stakes For Endpoint Data Protection
sponsored by Commvault
WHITE PAPER: This white paper highlights some potentially troubling byproducts of that movement. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Commvault

The four cornerstones of a successful BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this informative e-guide, learn about the four cornerstones of a successful BYOD program: quality of user experience, device flexibility, vendor independence, and security policy. Information is one of the most valuable pieces of an organization – discover how to implement to right BYOD policy to secure it
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Dell, Inc. and Intel®

DDoS Attack Mitigation Technologies Demystified
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper dives into the technologies used traditionally to detect and mitigate DDoS attacks, and explains how they evolved to the level they're at today. Read on to learn more.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

Is Your Printing/Imaging Environment Exposing Your Sensitive Data?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper dives into some of the toughest challenges with data security.  Read on to learn more.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Hewlett-Packard Limited

ADCs for SaaS That Are Scalable, Adaptable, Affordable & Simple
sponsored by Array Networks
WHITE PAPER: Check out this white paper to discover the attributes of a SaaS optimized ADC and how these attributes link to the requirements of DevOps and infrastructure teams tasked with operationalizing SaaS applications.
Posted: 22 Jan 2015 | Published: 01 Jul 2014

Array Networks

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

The Enterprise Mobility Policy Guidebook
sponsored by Maas360 by IBM
WHITE PAPER: This guide can help you create a mobility policy that will increase productivity, efficiency, and cooperation in your workplace.
Posted: 13 Mar 2015 | Published: 30 Apr 2012

Maas360 by IBM

Selecting Your Enterprise Mobility Management Solution
sponsored by Maas360 by IBM
WHITE PAPER: This report will tell you how each mobile management product performed on a variety of criteria and help you choose the one that's best for your organization.
Posted: 13 Mar 2015 | Published: 17 Sep 2014

Maas360 by IBM

Research Report Reveals Mobile Device Management Solutions
sponsored by Maas360 by IBM
WHITE PAPER: This research report presentsthe results of several tests conducted on MDM and EMM products and reveals who the leaders in the field are.
Posted: 13 Mar 2015 | Published: 17 Sep 2014

Maas360 by IBM

Deliver Reliable and Robust Wi-Fi for Healthcare
sponsored by Xirrus
WHITE PAPER: This exclusive white paper takes an in-depth look at how one wireless solution was able to deliver rock-solid Wi-Fi service to healthcare organizations. Read on to learn more.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Xirrus

Leverage the Network Infrastructure for Competitive Success
sponsored by Cisco Systems, Inc.
WHITE PAPER: This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Optimizing the Datacenter Network for Improved Scalability, Orchestration, and Automation
sponsored by Cisco Systems, Inc.
WHITE PAPER: View this informative resource to access key trends that are reshaping datacenter infrastructure and to learn how an application centric infrastructure can help network managers address ongoing challenges.
Posted: 07 Jan 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Long-Distance IT: Driving Efficiency in Remote Offices
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at increasing the efficiency of IT in remote offices. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Citrix
101 - 125 of 974 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement