IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management Reports
126 - 150 of 1924 Matches Previous Page  |  Next Page
Build, Manage, and Secure Your Cloud Infrastructure
sponsored by TechData Corporation
WHITE PAPER: With 81% of US companies already using public cloud services, your business is most likely working with a cloud service or planning on working with a cloud service in the near future. Read this white paper that provides detailed explanations of public cloud services to ensure your business is utilizing the best one.
Posted: 23 Jun 2016 | Published: 02 May 2016

TechData Corporation

How to Use a Hyperconverged Infrastructure
sponsored by Hewlett Packard Enterprise
RESOURCE: Can HCI come to the rescue of VDI? Solve the challenges of inadequate data protection, lackluster remote network performance, and the difficulty of management plaguing your ROBOs by implementing a hyperconverged system.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Hewlett Packard Enterprise

Picking the Right Spots for SDN
sponsored by SearchDataCenter.com
EBOOK: This 3 part guide covers the top misconceptions that plague SDN, its importance to horizontal scaling and virtues of two SDN technologies: SD-WAN and NFV. In addition, discover how Microsoft aims to be a top contender in the SDN enterprise market.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

SearchDataCenter.com

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

How to Implement Network Microsegmentation
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Discover how microsegmentation can break up your data center into logical elements and reduce its susceptibility to catastrophic lateral movement of malicious activity once a breach occurs.
Posted: 21 Jun 2016 | Published: 14 Jun 2016

NTT Com Security (UK) Ltd

Unlock the Unlimited Possibilities of Composable Infrastructure
sponsored by Hewlett Packard Enterprise
RESOURCE: This exclusive solution brief introduces you to composable infrastructure. View now and learn how to integrate this purpose-built platform into your existing environment and further automate your infrastructure to pave the way for a more innovative and cost-effective approach to modern IT.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Hewlett Packard Enterprise

Schools Talking to Schools
sponsored by Avaya
WEBCAST: Overcoming the obstacles to deliver the modern learning demands of a smart campus. From secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Posted: 21 Jun 2016 | Premiered: Aug 20, 2015

Avaya

Automated Infrastructure Management Delivers Real-Time Network Visibility
sponsored by CommScope
WHITE PAPER: Explore how to gain real-time, granular visibility into the critical connectivity that drives your business with automated network infrastructure management (AIM).
Posted: 20 Jun 2016 | Published: 31 Dec 2015

CommScope

Overcoming the Video Conferencing Adoption Void
sponsored by Vyopta
RESEARCH CONTENT: Learn the results of a survey which discovered that many enterprises are experiencing disconnects in their video conferencing policies.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

Vyopta

Transforming the Networking Capabilities of Norway's Largest Hospital
sponsored by Avaya
CASE STUDY: Norway's largest health system needed a smart, scalable network to bring together 3 hospitals and absorb future growth. Read this case study to learn how employing a virtual enterprise network architecture fulfilled the health system's networking needs and could soon be fulfilling yours.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Avaya

Insights into Networking Technologies in the Workplace: Best Practices
sponsored by CommScope
WHITE PAPER: The following guidelines are designed to help organizations facilitate a connected, efficient organization. Access now to discover tips, answers, and insight to demystify networking technologies such as LAN, Wi-Fi, audio visual, and more.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

CommScope

Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Network
sponsored by Citrix
WHITE PAPER: An influx of new devices and applications, bandwidth requirements, and a lack of end-to-end visibility are causing challenges and you are not alone. Overcome these challenges and enable the secure, reliable, cost-effective delivery of applications to any user, over any network.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Citrix

Fabric Networks: Design Your Network for the Future
sponsored by CommScope
WHITE PAPER: Explore an overview of how fabric technology, along with design considerations and a practical look at implementing fiber connectivity, can accommodate changes in architecture as your network grows.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

CommScope

Key Insights on Securing Networks Against Modern Cyber Threats
sponsored by Fortinet, Inc.
RESOURCE: Understand the capabilities, requirements and benefits of an evolved network security infrastructure. Inside, you'll see how an enterprise firewall can – and perhaps should – be the core of your security layout.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Fortinet, Inc.

Top 10 Cyber Incident Pain Points: Are You Prepared?
sponsored by Delta Risk
WHITE PAPER: Discover the 10 most prevalent factors that lead to a network being especially prone to cyber incidents. Interestingly, these characteristics are common across industries.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Delta Risk

Citrix networking from the customer perspective
sponsored by Citrix
WHITE PAPER: IT teams need to securely deliver virtual applications and desktops across wide-spread networks. Explore several case studies to learn about the challenges and solutions to securely deliver these technologies across vast networks.
Posted: 13 Jun 2016 | Published: 30 Nov 2015

Citrix

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

How to Yield the Benefits of Converged Infrastructure
sponsored by Dell, Inc. and Intel®
EGUIDE: Is converging corporate infrastructure—to eliminate siloed servers, storage, data and processes—worth the risk of potential vendor lock-in? Discover how to yield maximum benefit from implementing converged infrastructure in your data center, as well as learn CI implementation best practices.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

Dell, Inc. and Intel®

Cloud Migration Strategies for a Hybrid Cloud World
sponsored by New Relic
EGUIDE: Cloud computing strategies aren't always easy to carry out – especially when migrating between cloud providers or public and private clouds. This e-guide reveals recommended cloud migration practices and explores three common approaches to migrating apps to the cloud.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

New Relic

Mobility Joins the 27 Club: Three Steps to Effective Enterprise Mobility, Cubed
sponsored by VMware, Inc.
EGUIDE: Expert-level mobility comes in threes. Uncover three essentials for an effective mobile app strategy, three steps to a successful mobile initiative, and three steps to better mobile data protection.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

Why it's Important to Have a Mobile Enterprise Strategy
sponsored by VMware, Inc.
EGUIDE: We sat down with the general manager of VMware's end-user computing group to learn about the vendor's EMM evolution. Explore additional expert resources that detail ways to integrate EMM into a broader mobile enterprise strategy, and what it means to have a mobile-first strategy.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

The Network Takes Center Stage
sponsored by IBM
EGUIDE: Pinpointing issues is becoming more challenging as networks expand and become more complex, but there are ways to monitor your network more effectively in order to spot the early warning signs of downtime. Access this special report to learn about analytics technology, outsourcing options, and more.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

IBM

25 GbE and the Future of the Data Center
sponsored by QLogic Corporation
EGUIDE: Expanded performance and throughput in 25 Gigabit Ethernet (25 GbE), a new Ethernet standard, reflects continued advances in server processing – and also may be the cure for oversubscribed data centers. Access this e-guide for more on these claims, and what 25 GbE means for the future of networking.
Posted: 15 Jun 2016 | Published: 08 Jun 2016

QLogic Corporation

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security
126 - 150 of 1924 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement