IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management White Papers (View All Report Types)
76 - 100 of 974 Matches Previous Page  |  Next Page
Why So Many are Turning to WAN Optimization Software
sponsored by Silver Peak
WHITE PAPER: Access this exclusive resource to learn how virtual WAN optimization combines the benefits of server virtualization – rapid deployment, ease of management and more – with the established performance and cost gains of WAN optimization.
Posted: 04 May 2015 | Published: 24 Oct 2013

Silver Peak

Flexible Infrastructure Solves Wireless Challenge for W Hotel Bangkok
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines how the W Hotel of Bangkok was able to find a reliable, flexible strategy for Wi-Fi delivery that made guests happy and reduced the management burden's placed on the hotel's IT staff.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Discover the Power of Network Simplicity
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why organizations like yours need to seriously consider the value of unifying and converging wired and wireless systems in order to deal with increased network demands, reinforce security at the edge, increase the use of SaaS and more.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Virtualized Network Services: SDN for Enterprise
sponsored by Alcatel-Lucent
WHITE PAPER: In this white paper, you'll learn how software-defined networking (SDN) helps you seamlessly link locations and unlock the true power of the cloud.
Posted: 30 Apr 2015 | Published: 28 Nov 2014

Alcatel-Lucent

Hyper-Connected Enterprise Infrastructure
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, you'll learn about a mobile-first IT infrastructure approach that enables employees to use powerful apps on any device.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

The Critical Role of Support in Enterprise Mobility
sponsored by BlackBerry
WHITE PAPER: This informative white paper explains why support is an essential piece of your enterprise mobility management (EMM) strategy and outlines the factors necessary to ensure you choose the best solution for your specific needs.
Posted: 20 Apr 2015 | Published: 26 Dec 2014

BlackBerry

Best Practices in BYOD
sponsored by BlackBerry
WHITE PAPER: Access this white paper now to discover the 7 best practices for choosing the right BYOD solution for your organization.
Posted: 15 Apr 2015 | Published: 26 Dec 2014

BlackBerry

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: In this white paper, discover 5 key design principles for security professionals looking to better protect their networks from the latest generation of cyber criminals.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

Leveraging Traffic Visibility and IPS for Comprehensive Continuous Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Dec 2014

Gigamon

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

Case Study How the University of Wisconsin-Madison Achieved Large-Scale Data Center Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you'll discover how the University of Wisconsin-Madison was able to adapt its WAN design to accommodate the increasing volume of data without sacrificing the high level of security the research facilities required.
Posted: 13 Apr 2015 | Published: 26 Sep 2014

Gigamon

Case Study: How University of Glasgow Scaled its Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: In this white paper, you'll discover how one IDS infrastructure solution helped the IT professionals at the University of Glasgow upgrade their limited network for easier monitoring and increased protection.
Posted: 13 Apr 2015 | Published: 27 Jun 2014

Gigamon

Busting myths about mobility: Why tablets are more than just companion devices
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at BYOD and mobile device management, exposing common myths about mobility and much more. Read on to learn more.
Posted: 06 Apr 2015 | Published: 26 Nov 2014

Dell, Inc. and Intel®

Attack Mitigation Service
sponsored by Radware
WHITE PAPER: This comprehensive white paper provides an in-depth explanation of all of the latest cyber threats and explains the benefits of one potential cyber security solution.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware

The Enterprise Mobile Security Technology Buyer's Guide
sponsored by Dropbox for Business
WHITE PAPER: In this research report, Forrester Research, Inc., defines the use cases, business value, and outlook for the 14 technologies at the heart of mobile security.
Posted: 30 Mar 2015 | Published: 13 Dec 2013

Dropbox for Business

The Shifting Role of IT Balancing Corporate Needs and Employee Expectations
sponsored by Dropbox for Business
WHITE PAPER: In this white paper, you'll learn what you need to do to effectively secure your enterprise data in this world of BYOA movements.
Posted: 30 Mar 2015 | Published: 28 Mar 2014

Dropbox for Business

Hybrid Cloud Places New Demands on the Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this analyst report, discover what changes IT decision-makers had to make to their networks, and how smart IT teams choose the right cloud network.
Posted: 28 Mar 2015 | Published: 30 Apr 2014

Juniper Networks, Inc.

Readiness, Benefits, and Barriers: An SDN Progress Report
sponsored by Juniper Networks, Inc.
WHITE PAPER: This report gives you an inside look at how IT leaders in the United States feel about the rise of SDN.
Posted: 27 Mar 2015 | Published: 28 Nov 2014

Juniper Networks, Inc.

Network Virtualization: 6 Best Practices for Overcoming Common Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, you'll find the 6 best practices for breaking through network virtualization roadblocks.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Juniper Networks, Inc.

Build a Business Case for Network Virtualization
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, you'll learn how to design network architectures that will take advantage of all that the future of virtualization and cloud computing has to offer.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Juniper Networks, Inc.

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

Think of Your Service Desk as a Competitive Advantage
sponsored by Novell Ltd.
WHITE PAPER: In this white paper, find out how you can maximize your service desk to its fullest potential.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Novell Ltd.

Find the Anomalies in Your Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Leveraging Bring Your Own Device Programs
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: This exclusive white paper examines the rise of BYOD programs and teaches you how to take advantage of their benefits. Read on to learn how to tailor a BYOD program to the specific needs of your company.
Posted: 18 Mar 2015 | Published: 29 Nov 2013

Alcatel-Lucent Enterprise
76 - 100 of 974 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement