IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management White Papers (View All Report Types)
26 - 50 of 1057 Matches Previous Page  |  Next Page
Quality Contact Recording Increases Workforce Optimization
sponsored by Avaya CenturyLink
WHITE PAPER: Choosing top tier contact recording services can empower businesses by optimizing the performance of their customer-facing resources. Read this white paper that educates you on communication monitoring services and how they can help you achieve performance improvement that increases customer retention.
Posted: 30 Jun 2016 | Published: 31 Dec 2015

Avaya CenturyLink

Global Fiber CDN: Fast, Secure, Reliable
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Make sure you meet user expectations by delivering video content and digital downloads to any type of device, anywhere. Read this infographic for all the benefits of employing a global fiber CDN at your business.
Posted: 29 Jun 2016 | Published: 27 Jun 2016

Level 3 Communications, Inc.

Top Reasons for Implementing App Delivery on Hyperconverged Infrastructure
sponsored by Array Networks
WHITE PAPER: To ensure your network infrastructure always meets its full potential, it's in your best interest to make your infrastructure invisible. Read this white paper that provides the top ten reasons for deploying an invisible infrastructure at your business.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Array Networks

State of Network Function Virtualization (NFV)
sponsored by Accelerated Concepts
WHITE PAPER: Find out how a network function virtualization (NFV) appliance takes the action of a single device and converting it to a virtual machine to simplify your networks decision making process. You'll also learn how to select and NFV vendor, other functions you can run besides networking, and more.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Accelerated Concepts

Content Delivery Networks in the Cloud World
sponsored by Level 3 Communications, Inc.
WHITE PAPER: As more organizations make the move to the cloud, imminent infrastructure changes are ahead for your business. You need to be certain you have a plan in place to adapt and scale your network to efficiently utilize cloud. Access this extensive guide that boasts 7 must-read articles on preparing your network for the shift to the cloud.
Posted: 28 Jun 2016 | Published: 02 May 2016

Level 3 Communications, Inc.

The Global Evolving Workforce: Key Trends and Future Outlook
sponsored by Dell and Microsoft
WHITE PAPER: Enabling users with their preferred devices is crucial to promoting productivity and growth. Discover ways implementing BYOD policies takes pressure off of IT decision-makers, and how to make security an integral part of your strategy.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Dell and Microsoft

Next-Generation Monitoring Fabrics for Mobile Networks
sponsored by Big Switch Networks
WHITE PAPER: Today, despite massive investments in network infrastructure, operators are still struggling to keep up with customer demands and service expectations. This white paper highlights how implementing a highly scalable, centrally managed and cost-effective SDN-based solution can solve these struggles quickly.
Posted: 24 Jun 2016 | Published: 31 Dec 2014

Big Switch Networks

Your Guide to Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in usage, devices, and applications create an enormous challenge for IT organizations to protect the network from threat vectors. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyber-attacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Build, Manage, and Secure Your Cloud Infrastructure
sponsored by TechData Corporation
WHITE PAPER: With 81% of US companies already using public cloud services, your business is most likely working with a cloud service or planning on working with a cloud service in the near future. Read this white paper that provides detailed explanations of public cloud services to ensure your business is utilizing the best one.
Posted: 23 Jun 2016 | Published: 02 May 2016

TechData Corporation

Beyond the Basics of SD-WAN: Why Performance and QoS Matter
sponsored by Silver Peak
WHITE PAPER: Looking to take SD-WAN to the next level, but unsure of where to start? This white paper highlights how to improve your network management to deliver superior performance and quality of service.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Silver Peak

How to Achieve End-to-End Unified Communications Visibility
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Only by adopting an integrated approach to monitoring and troubleshooting UC applications will the benefits promised by UC adoption be fully realized. Uncover ways IT organizations address the adoption of complex, highly interdependent UC applications.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Riverbed Technology, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Automated Infrastructure Management Delivers Real-Time Network Visibility
sponsored by CommScope
WHITE PAPER: Explore how to gain real-time, granular visibility into the critical connectivity that drives your business with automated network infrastructure management (AIM).
Posted: 20 Jun 2016 | Published: 31 Dec 2015

CommScope

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

Insights into Networking Technologies in the Workplace: Best Practices
sponsored by CommScope
WHITE PAPER: The following guidelines are designed to help organizations facilitate a connected, efficient organization. Access now to discover tips, answers, and insight to demystify networking technologies such as LAN, Wi-Fi, audio visual, and more.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

CommScope

Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Network
sponsored by Citrix
WHITE PAPER: An influx of new devices and applications, bandwidth requirements, and a lack of end-to-end visibility are causing challenges and you are not alone. Overcome these challenges and enable the secure, reliable, cost-effective delivery of applications to any user, over any network.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Citrix

Fabric Networks: Design Your Network for the Future
sponsored by CommScope
WHITE PAPER: Explore an overview of how fabric technology, along with design considerations and a practical look at implementing fiber connectivity, can accommodate changes in architecture as your network grows.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

CommScope

Market Guide for Network Access Control
sponsored by Aruba Networks
WHITE PAPER: NAC solutions enable organizations to implement policies for controlling device and user access to corporate networks. Explore this research to understand how analysts recommend evaluating and selecting NAC solutions that meet your needs.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Aruba Networks

Top 10 Cyber Incident Pain Points: Are You Prepared?
sponsored by Delta Risk
WHITE PAPER: Discover the 10 most prevalent factors that lead to a network being especially prone to cyber incidents. Interestingly, these characteristics are common across industries.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Delta Risk

Citrix networking from the customer perspective
sponsored by Citrix
WHITE PAPER: IT teams need to securely deliver virtual applications and desktops across wide-spread networks. Explore several case studies to learn about the challenges and solutions to securely deliver these technologies across vast networks.
Posted: 13 Jun 2016 | Published: 30 Nov 2015

Citrix

Modern Adaptive Security
sponsored by Illumio
WHITE PAPER: Discover how the need for more segmentation, protecting high-value assets, and meeting stricter compliance rules will shift how security budgets are allocated in the near-future.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Canon U.S.A. Fully Automates VMOTION and Storage VMOTION with VMTurbo
sponsored by VMTurbo
WHITE PAPER: Resource allocation is the key to succeeding in virtualized environments. Read this brief case study to learn how one company was able to implement a solution that automatically made intelligent adjustments, allowing them to expand their virtual footprint and control over a complex virtual environment.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

VMTurbo

When VoIP Absolutely, Positively Has to be High Quality
sponsored by Citrix
WHITE PAPER: Discover how to ensure that your VoIP call quality is top notch, even as stresses on the network proliferate. Learn how SD-WAN can enhance VoIP sessions to be continuously and dynamically routed to the best-performing, highest-quality path available.
Posted: 10 Jun 2016 | Published: 31 Dec 2015

Citrix

Laying the Groundwork for a New Level of Power over Ethernet
sponsored by CommScope
WHITE PAPER: Discover an overview of Power over Ethernet (PoE) technology, as well as recommendations to ensure that your cabling infrastructure is capable of supporting the PoE evolution.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

CommScope
26 - 50 of 1057 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement