IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network Management Reports
1 - 25 of 1731 Matches Previous Page  |  Next Page
Network Specialist Curvature Calls For New Approach To End-of-Life Kit
sponsored by Curvature
EGUIDE: In this e-guide, learn why there is still work to be done in persuading the vendor community to ditch old models of thinking and embrace refurbishment and recycling.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

Curvature

The State of IT Infrastructure & Operations
sponsored by Curvature
RESEARCH CONTENT: Read this report to find the results of a Forrester research survey to capture the current state of IT infrastructure and operations.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

Curvature

Data Center Architectures for the New Age of Business
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: In this white paper, you'll discover a new hybrid approach to data center network design that improves scalability and security for mobile business.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

Cisco Systems, Inc and Citrix

Building Application Centric, ADC-enabled Data Centers
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: Access this white paper to learn about a new approach to data center architecture that is based on an application centric infrastructure and allows you to enhance business agility.
Posted: 24 Apr 2015 | Published: 26 Sep 2014

Cisco Systems, Inc and Citrix

A Closer Look At Primary Storage Clouds and Cloud for Backup
sponsored by Carbonite
EGUIDE: In this e-guide, get a closer look at the differences between backup and storage clouds, and also learn about the pros and cons of cloud-based backup.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

Carbonite

The 15 Enterprise Mobile Management Vendors You Should Know
sponsored by Citrix
WHITE PAPER: In this white paper, Forrester Research, Inc., provides an in-depth buyer's guide to the 15 biggest players in the enterprise mobility management space.
Posted: 23 Apr 2015 | Published: 30 Sep 2014

Citrix

5 Best Practices to Reduce Incident Response Time
sponsored by Great Bay
WEBCAST: Join security guru Ty Powers as he explains the 5 best practices for reducing incident response (IR) time.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

Great Bay

The Future of Enterprise Mobility Management
sponsored by BlackBerry
WEBCAST: Tune in to discover the results of the Forrester Wave: Enterprise Mobility Management Q3 report for even more insight into crafting an EMM strategy.
Posted: 22 Apr 2015 | Premiered: Feb 17, 2015

BlackBerry

Are you providing VPN access for your consultant?
sponsored by BalaBit
WHITE PAPER: Access this white paper to learn how you can easily monitor and control your VPN, so you can know exactly what's going on in your network.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

BalaBit

Building Trust in the Business Services Industry
sponsored by SHI International Corporation
WHITE PAPER: Access this white paper now to discover how SHI and HP have partnered up to offer more trustworthy services in mobile networking, data center design and more.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

SHI International Corporation

An Innovative New Approach to Network Automation
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: Access this webcast now to discover how a new open-source SDN infrastructure allows you to automate and standardize your network infrastructure without sacrificing the features you've come to love.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2014

Cisco Systems, Inc and Citrix

Transform Your Customer's Network Infrastructure and Amplify Your Profitability
sponsored by Hewlett-Packard Company
WEBCAST: Check out this video to see how HP's Networking Converged Campus offerings can work for your organization.
Posted: 21 Apr 2015 | Premiered: Apr 16, 2015

Hewlett-Packard Company

The Critical Role of Support in Enterprise Mobility
sponsored by BlackBerry
WHITE PAPER: This informative white paper explains why support is an essential piece of your enterprise mobility management (EMM) strategy and outlines the factors necessary to ensure you choose the best solution for your specific needs.
Posted: 20 Apr 2015 | Published: 26 Dec 2014

BlackBerry

3 Key Insights of UC&C Complexity
sponsored by PGi
WHITE PAPER: This exclusive white paper highlights the 3 complex forces of UC&C complexity and how to work around them. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

PGi

Wireless Networking: What You Need to Know
sponsored by Fluke Networks
EGUIDE: Join networking experts Chuck Moozakis and Lee Badman to discover the benefits and challenges of implementing a high-density wireless infrastructure as well as 7 key wireless networking trends you need to be aware of.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

Fluke Networks

Understanding the 7 Different Personalities of Telecommuters
sponsored by PGi
WHITE PAPER: This exclusive white paper will help you understand the personalities of your workforce and how you can cater a mobile plan to the right employees. Read on to learn more.
Posted: 17 Apr 2015 | Published: 26 Feb 2015

PGi

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: Explore this white paper to learn how decryption is a necessary tool in network security and monitoring.
Posted: 16 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: In this research report, discover just how complicated SSL/TLS decryption and inspection methodologies have become and learn why you should make encrypted traffic management a near-term priority to address sophisticated SSL cyber threats.
Posted: 15 Apr 2015 | Published: 27 Feb 2015

Blue Coat Systems

Best Practices in BYOD
sponsored by BlackBerry
WHITE PAPER: Access this white paper now to discover the 7 best practices for choosing the right BYOD solution for your organization.
Posted: 15 Apr 2015 | Published: 26 Dec 2014

BlackBerry

Build Security Awareness with Incident Response Plans, Endpoint Management and Compliance
sponsored by Great Bay
EGUIDE: In this eGuide, security experts Paul Kirvan, Kevin Beaver and Mike Chapple explain everything you need to know about building an incident response plan.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Great Bay

Meet BYOD Challenges
sponsored by SHI International Corporation
WHITE PAPER: In this white paper, discover one potential BYOD solution that delivers an access-agnostic approach which leverages a universal security and compliancy policy across all devices, while also reducing the IT burden with an easy-to-use self-registration process.
Posted: 14 Apr 2015 | Published: 28 Mar 2014

SHI International Corporation

Encrypted Traffic Management for Dummies
sponsored by Blue Coat Systems
EBOOK: In this eBook, learn all about the world of encrypted traffic management, an easy solution to all of these SSL traffic headaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Blue Coat Systems

Are You Ready for the Next Generation of Network Management?
sponsored by Fluke Networks
WHITE PAPER: There are a number of significant changes coming to the network engineering role in IT. Staying ahead of those changes will ensure the success of network professionals and their enterprises. Going into the future unprepared could be devastating.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Fluke Networks

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: In this white paper, discover 5 key design principles for security professionals looking to better protect their networks from the latest generation of cyber criminals.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

Leveraging Traffic Visibility and IPS for Comprehensive Continuous Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Dec 2014

Gigamon
1 - 25 of 1731 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement