IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network ManagementWhite Papers (View All Report Types)
126 - 150 of 1025 Matches Previous Page  | Next Page
Binary and IP Address Basics of Subnetting
sponsored by Global Knowledge
WHITE PAPER: This paper focuses on the mathematics of binary numbering and IP address structure.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

The Center of Performance: Enhancing the App Experience for End Users
sponsored by Equinix
WHITE PAPER: This paper explores the challenges that today's CIOs face in regard to application performance, and how a more strategic data center approach, like distributing applications closer to your users, can help optimize application performance and reduce IT costs.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Equinix

5 Things to Think About as You Deploy and Use Hybrid WANs
sponsored by Talari Networks
WHITE PAPER: As more organizations deploy cloud computing services and bandwidth-hungry applications like video conferencing and data backup, there are plenty of costs involved.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Talari Networks

How to Migrate from BlackBerry Enterprise Server v4.0 or v5.0
sponsored by BlackBerry
WHITE PAPER: When it comes to mobility, every organization is trying to claim its stake.  Size, usage requirements, and security requirements play a role in the mobile environment - is your network built to date?
Posted: 21 Aug 2014 | Published: 21 Aug 2014

BlackBerry

Balance End User Satisfaction and Business Productivity: Making the case for COPE
sponsored by BlackBerry
WHITE PAPER: BYOD and other mobility trends have been taking the business world by storm, but the problem for IT professionals is the same throughout:  How can we balance security and user privacy?
Posted: 21 Aug 2014 | Published: 21 Aug 2014

BlackBerry

BlackBerry 10 Readiness Services: Migrate to BlackBerry 10 With Ease
sponsored by BlackBerry
WHITE PAPER: Having a trusted mobile computing partner that understands IT project phases is key to allignment of goals and company milestones.  Many have switched over to BlackBerry 10 for it's flexibility and level of service.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

BlackBerry

Securing the Small Business Network
sponsored by Dell Software
WHITE PAPER: This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

EMM Challenges: Three Ways to Balance IT Needs With User Demands
sponsored by BlackBerry
WHITE PAPER: End-users for mobility rapidly demand more from their network providers.  This puts stress on IT professionals who are already busy dealing with complex security issues and day-today tasks. Read this whitepaper to see how enterprise mobility management is changing.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Securing Your IT Infrastructure with SOC/NOC Collaboration
sponsored by Hewlett-Packard Company
WHITE PAPER: Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.
Posted: 19 Aug 2014 | Published: 28 Sep 2012

Hewlett-Packard Company

10 Reasons BlackBerry Smartphones Are Still the Best Way to Do Business
sponsored by BlackBerry
WHITE PAPER: It doesn't matter what device ownership model your organization is using - your mobile employees need smartphones that deliver on their specific needs and wants.  This white paper highlights mobile devices built for business that prove there's no better way to get it all done, day in, day out.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

BlackBerry

Choosing an MDM Platform: Where to Start the Conversation
sponsored by BlackBerry
WHITE PAPER: Mobile Device Management (MDM) can be difficult due to the robust mix of devices used by employees, and also the fear of a security breach.  Many MDM solutions claim to be doing more than the next, and you could spend hours trying to stay up to speed with all of the different options available.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

BlackBerry

Mitigating Security & Compliance Risks with EMM
sponsored by BlackBerry
WHITE PAPER: Due to potential threats to enterprise security that come along with workforce mobility, companies are discovering pitfalls from legal, competitive, and productivity standpoints.
Posted: 13 Aug 2014 | Published: 31 May 2014

BlackBerry

2014 Gartner Magic Quadrant for Enterprise Backup Software and Integrated Appliances
sponsored by Asigra
WHITE PAPER: Enterprise backup is among the oldest, most-performed tasks for IT professionals. Gartner provides analysis and evaluation of the leading providers that offer a range of traditional to innovative recovery capabilities.
Posted: 11 Aug 2014 | Published: 16 Jun 2014

Asigra

Best Practices in BYOD: Addressing BYOD Challenges in the Enterprise
sponsored by BlackBerry
WHITE PAPER: The complexity of managing multiple device types, separating and protecting work and personal data and providing effect support can be a daunting task for any IT professional. Will your IT group be able to keep up?
Posted: 11 Aug 2014 | Published: 08 Aug 2014

BlackBerry

Case Study: FIS Global Partners with Asigra to Provide Clients Enhanced Secure Data Protection that Meets Compliance Mandates
sponsored by Asigra
WHITE PAPER: For financial services business, it's critical that client data remains accessible and securely stored. As business grows, you will need to upgrade your backup service portfolio with an advanced solution – but there are questions you should ask before choosing.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Asigra

Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.
Posted: 06 Aug 2014 | Published: 01 Mar 2014

Dell Software

Is Network Functions Virtualization (NFV) Moving Closer to Reality?
sponsored by Global Knowledge
WHITE PAPER: This paper examines the history of Network Functions Virtualization (NFV) and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model.
Posted: 05 Aug 2014 | Published: 23 Jul 2014

Global Knowledge

Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity.
Posted: 04 Aug 2014 | Published: 08 Jul 2014

Global Knowledge

Cisco VM-FEX, Adapter FEX, and Nexus 1000v Clarified
sponsored by Global Knowledge
WHITE PAPER: This paper addresses three Cisco data center server and hypervisor integration technologies—Cisco Nexus 1000v, Cisco VM-FEX, and Cisco Adapter FEX—clarifying their function, purpose, and benefits.
Posted: 04 Aug 2014 | Published: 08 Jul 2014

Global Knowledge

The Basics of Configuring and Using Cisco Access Control Lists
sponsored by Global Knowledge
WHITE PAPER: This resource discusses how to design, configure, and troubleshoot Cisco Access Control Lists (ACLs), which is a requirement for all network engineers working within a Cisco network.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Global Knowledge

Breaking Blackberry: 10 Steps to Mobile Recovery & Continuity
sponsored by IBM
WHITE PAPER: As BlackBerry currently sits on over $1 billion unsold smartphones in the wake of a global lay off which left 40% of its workers jobless, many IT professionals are starting to ask the question: What would we do if BlackBerry was no longer available?
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

The ABCs of Mobile Device Management
sponsored by IBM
WHITE PAPER: Securely managing mobile devices, apps and docs can be difficult without the right tools. However, with so many options employees have when a BYOD campaign is set in place, differences in operating systems and hardware create even more trouble.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

Resolve Performance Issues Within Your Citrix XenApp Environment
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Enabling Ubiquitous Visibility in Virtualized Enterprises
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper discusses the lack of visibility in the context of monitoring and troubleshooting end-to-end application performance and introduces one company's network performance management solution.
Posted: 04 Aug 2014 | Published: 31 Dec 2012

Riverbed Technology, Inc.
126 - 150 of 1025 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement