IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management White Papers (View All Report Types)
101 - 125 of 963 Matches Previous Page  |  Next Page
Readiness, Benefits, and Barriers: An SDN Progress Report
sponsored by Juniper Networks, Inc.
WHITE PAPER: This report gives you an inside look at how IT leaders in the United States feel about the rise of SDN.
Posted: 27 Mar 2015 | Published: 28 Nov 2014

Juniper Networks, Inc.

Network Virtualization: 6 Best Practices for Overcoming Common Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, you'll find the 6 best practices for breaking through network virtualization roadblocks.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Juniper Networks, Inc.

Build a Business Case for Network Virtualization
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, you'll learn how to design network architectures that will take advantage of all that the future of virtualization and cloud computing has to offer.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Juniper Networks, Inc.

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

Find the Anomalies in Your Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Leveraging Bring Your Own Device Programs
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: This exclusive white paper examines the rise of BYOD programs and teaches you how to take advantage of their benefits. Read on to learn how to tailor a BYOD program to the specific needs of your company.
Posted: 18 Mar 2015 | Published: 29 Nov 2013

Alcatel-Lucent Enterprise

Unified Communications: Providing Quality of Service over Any Connection
sponsored by ThinkingPhones
WHITE PAPER: This resource tells the story of one unified communications provider and how they have evolved to meet the needs of mobility.
Posted: 17 Mar 2015 | Published: 01 Jan 2015

ThinkingPhones

The Ultimate Enterprise Mobility Policy Guidebook
sponsored by Maas360 by IBM
WHITE PAPER: This guide can help you create effective and implement successful mobility strategies for your enterprise. Read it now for in-depth advice on how you can create a mobility policy that will increase productivity, efficiency, and cooperation in your workplace.
Posted: 13 Mar 2015 | Published: 30 Apr 2012

Maas360 by IBM

The Buyer's Guide to Mobile Management Products
sponsored by IBM
WHITE PAPER: This research study reveals which enterprise mobile management products performed the best in terms of offerings, strategy and more.
Posted: 13 Mar 2015 | Published: 30 Sep 2014

IBM

More Performance, Please: How to Future-Proof Your Enterprise Network
sponsored by Equinix
WHITE PAPER: Access this e-book to learn about the latest trends in enterprise networking and how to improve your network performance.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

Equinix

The PBX Dilemma: Hosted or Premises-Based?
sponsored by XO Communications
WHITE PAPER: This exclusive white paper offers a look at hosted VoIP vs. on-premises, and why hosted VoIP has so many benefits for organizations.  Read on to learn more.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

XO Communications

3 Key Insights of UC&C Complexity
sponsored by PGi
WHITE PAPER: This exclusive white paper highlights the 3 complex forces of UC&C complexity and how to work around them. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

PGi

Changing Face of Mobility: Raises The Stakes For Endpoint Data Protection
sponsored by Commvault
WHITE PAPER: This white paper highlights some potentially troubling byproducts of that movement. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Commvault

DDoS Attack Mitigation Technologies Demystified
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper dives into the technologies used traditionally to detect and mitigate DDoS attacks, and explains how they evolved to the level they're at today. Read on to learn more.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

Enterprise Mobility Management: The Big Bang Theory
sponsored by IBM
WHITE PAPER: This exclusive white paper takes and in-depth look at how enterprise mobility is expanding, and why device management will become key for organizations. Read on to learn more.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

IBM

ADCs for SaaS That Are Scalable, Adaptable, Affordable & Simple
sponsored by Array Networks
WHITE PAPER: Check out this white paper to discover the attributes of a SaaS optimized ADC and how these attributes link to the requirements of DevOps and infrastructure teams tasked with operationalizing SaaS applications.
Posted: 22 Jan 2015 | Published: 01 Jul 2014

Array Networks

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Selecting Your Enterprise Mobility Management Solution
sponsored by Maas360 by IBM
WHITE PAPER: This report will tell you how each mobile management product performed on a variety of criteria and help you choose the one that's best for your organization.
Posted: 13 Mar 2015 | Published: 17 Sep 2014

Maas360 by IBM

Research Report Reveals Mobile Device Management Solutions
sponsored by Maas360 by IBM
WHITE PAPER: This research report presentsthe results of several tests conducted on MDM and EMM products and reveals who the leaders in the field are.
Posted: 13 Mar 2015 | Published: 17 Sep 2014

Maas360 by IBM

Deliver Reliable and Robust Wi-Fi for Healthcare
sponsored by Xirrus
WHITE PAPER: This exclusive white paper takes an in-depth look at how one wireless solution was able to deliver rock-solid Wi-Fi service to healthcare organizations. Read on to learn more.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Xirrus

Leverage the Network Infrastructure for Competitive Success
sponsored by Cisco Systems, Inc.
WHITE PAPER: This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Optimizing the Datacenter Network for Improved Scalability, Orchestration, and Automation
sponsored by Cisco Systems, Inc.
WHITE PAPER: View this informative resource to access key trends that are reshaping datacenter infrastructure and to learn how an application centric infrastructure can help network managers address ongoing challenges.
Posted: 07 Jan 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.
101 - 125 of 963 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement