IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network ManagementWhite Papers (View All Report Types)
126 - 150 of 1023 Matches Previous Page  | Next Page
Step up performance with a network upgrade
sponsored by Dell, Inc.
WHITE PAPER: Rising end-user expectations for better network mobility has left IT in limbo, especially while also trying to meet security needs.  This whitepaper will help you enhance workforce productivity and support guest access all while keeping the networking secure.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Dell, Inc.

The Ten Principals of BYOD
sponsored by IBM
WHITE PAPER: Uncover the top ten Bring Your Own Device (BYOD) considerations to keep in mind when composing a BYOD policy to ensure a productive and secure environment which allows your employees to use their consumer-based devices to complete day to day tasks.
Posted: 03 Sep 2014 | Published: 28 May 2014

IBM

Future-proof your mobility strategy with Dell Enterprise Mobility Management
sponsored by Dell Software
WHITE PAPER: Read this paper to discover best practices to future-proof your mobile strategy in the evolving world of devices, operating systems, work habits and mobile business models. Also, find out how Dell Enterprise Mobility Management (EMM) can help maintain security and control administrative complexity.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

Dell Software

Address Security Challenges Without Re-Engineering the Underlying Physical Network
sponsored by Zentera Systems Inc.
WHITE PAPER: Zentera zNet™ virtual hybrid network addresses this challenge by providing secure end-to-end network connections without having to re-engineer any of the underlying physical network and security infrastructure.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

Zentera Systems Inc.

Enabling devices and device management for your mobility/BYOD program
sponsored by Dell Software
WHITE PAPER: Read this white paper to learn how to support employees with the best devices to increase flexibility, productivity and job satisfaction. Get tips on how to reduce IT complexity as you manage a wider variety of devices, operating systems and user needs. Also, find out how Dell devices and Enterprise Mobility Management can help.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

Dell Software

The Basics of Configuring and Using Cisco Network Address Translation
sponsored by Global Knowledge
WHITE PAPER: This white paper describes the process of changing the identity of a private host to a legal public host, known as Network Address Translation (NAT), and provides network engineers with a foundational understanding of how to design, implement, and troubleshoot NAT.
Posted: 28 Aug 2014 | Published: 31 Jul 2014

Global Knowledge

Subnetting an IP Address
sponsored by Global Knowledge
WHITE PAPER: This paper focuses on the process rules and helpful hints for learning to subnet an IPv4 address.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Introduction to Troubleshooting Cisco Networks
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how you can obtain the skills for troubleshooting Cisco networks.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Binary and IP Address Basics of Subnetting
sponsored by Global Knowledge
WHITE PAPER: This paper focuses on the mathematics of binary numbering and IP address structure.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

The Center of Performance: Enhancing the App Experience for End Users
sponsored by Equinix
WHITE PAPER: This paper explores the challenges that today's CIOs face in regard to application performance, and how a more strategic data center approach, like distributing applications closer to your users, can help optimize application performance and reduce IT costs.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Equinix

5 Things to Think About as You Deploy and Use Hybrid WANs
sponsored by Talari Networks
WHITE PAPER: As more organizations deploy cloud computing services and bandwidth-hungry applications like video conferencing and data backup, there are plenty of costs involved.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Talari Networks

Securing the Small Business Network
sponsored by Dell Software
WHITE PAPER: This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Securing Your IT Infrastructure with SOC/NOC Collaboration
sponsored by Hewlett-Packard Company
WHITE PAPER: Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.
Posted: 19 Aug 2014 | Published: 28 Sep 2012

Hewlett-Packard Company

2014 Gartner Magic Quadrant for Enterprise Backup Software and Integrated Appliances
sponsored by Asigra
WHITE PAPER: Enterprise backup is among the oldest, most-performed tasks for IT professionals. Gartner provides analysis and evaluation of the leading providers that offer a range of traditional to innovative recovery capabilities.
Posted: 11 Aug 2014 | Published: 16 Jun 2014

Asigra

Case Study: FIS Global Partners with Asigra to Provide Clients Enhanced Secure Data Protection that Meets Compliance Mandates
sponsored by Asigra
WHITE PAPER: For financial services business, it's critical that client data remains accessible and securely stored. As business grows, you will need to upgrade your backup service portfolio with an advanced solution – but there are questions you should ask before choosing.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Asigra

Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.
Posted: 06 Aug 2014 | Published: 01 Mar 2014

Dell Software

Is Network Functions Virtualization (NFV) Moving Closer to Reality?
sponsored by Global Knowledge
WHITE PAPER: This paper examines the history of Network Functions Virtualization (NFV) and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model.
Posted: 05 Aug 2014 | Published: 23 Jul 2014

Global Knowledge

Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity.
Posted: 04 Aug 2014 | Published: 08 Jul 2014

Global Knowledge

Cisco VM-FEX, Adapter FEX, and Nexus 1000v Clarified
sponsored by Global Knowledge
WHITE PAPER: This paper addresses three Cisco data center server and hypervisor integration technologies—Cisco Nexus 1000v, Cisco VM-FEX, and Cisco Adapter FEX—clarifying their function, purpose, and benefits.
Posted: 04 Aug 2014 | Published: 08 Jul 2014

Global Knowledge

The Basics of Configuring and Using Cisco Access Control Lists
sponsored by Global Knowledge
WHITE PAPER: This resource discusses how to design, configure, and troubleshoot Cisco Access Control Lists (ACLs), which is a requirement for all network engineers working within a Cisco network.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Global Knowledge

Breaking Blackberry: 10 Steps to Mobile Recovery & Continuity
sponsored by IBM
WHITE PAPER: As BlackBerry currently sits on over $1 billion unsold smartphones in the wake of a global lay off which left 40% of its workers jobless, many IT professionals are starting to ask the question: What would we do if BlackBerry was no longer available?
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

The ABCs of Mobile Device Management
sponsored by IBM
WHITE PAPER: Securely managing mobile devices, apps and docs can be difficult without the right tools. However, with so many options employees have when a BYOD campaign is set in place, differences in operating systems and hardware create even more trouble.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

Resolve Performance Issues Within Your Citrix XenApp Environment
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Enabling Ubiquitous Visibility in Virtualized Enterprises
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper discusses the lack of visibility in the context of monitoring and troubleshooting end-to-end application performance and introduces one company's network performance management solution.
Posted: 04 Aug 2014 | Published: 31 Dec 2012

Riverbed Technology, Inc.
126 - 150 of 1023 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement