IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network ManagementReports
126 - 150 of 1592 Matches Previous Page  | Next Page
802.11ac Deployment Considerations
sponsored by Extreme Networks
WHITE PAPER: This informative resource examines deployment considerations for getting the most value from the first wave of 802.11ac wireless products, discussing how your organization can best reap the benefits of the latest in Wi-Fi technology.
Posted: 20 May 2014 | Published: 20 May 2014

Extreme Networks

Get Ready for Unified Communications!
sponsored by Arkadin
WHITE PAPER: This informative guide explores a 5 step plan for smooth, effective implementation of your newly acquired unified communications platform.
Posted: 20 May 2014 | Published: 20 May 2014

Arkadin

Planning a Private Enterprise Cloud?
sponsored by KEMP Technologies
WHITE PAPER: This informative whitepaper explores the role of SDN and load balancing when planning your private cloud.
Posted: 14 May 2014 | Published: 14 May 2014

KEMP Technologies

Absolute Post: Delivering Fast, Flexible and Easy Access to Post-Production Systems
sponsored by Avocent
WHITE PAPER: This informative whitepaper explores a unique solution for your networking infrastructure woes and how it can greatly improve your business functions.
Posted: 14 May 2014 | Published: 31 Dec 2012

Avocent

The BMC and IPMI Vulnerabilities
sponsored by Avocent
WHITE PAPER: Recent analyst studies have shown that there are potential security flaws in BMCs, also known as service processors, and the Intelligent Platform Management Interface protocol. Read this whitepaper to learn how you can contain the risk.
Posted: 13 May 2014 | Published: 31 Dec 2013

Avocent

Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center
sponsored by Citrix
WHITE PAPER: When it comes to the new demands of network infrastructure, it is critical to have an effective application device controller (ADC). This brief guide explores an effective ADC that can help improve your network performance and provide you with effective scalability solutions.
Posted: 13 May 2014 | Published: 06 Jan 2014

Citrix

Magic Quadrant for Application Delivery Controllers
sponsored by Citrix
WHITE PAPER: This informative guide compares a variety of industry leading ADCs and outlines their strengths and weaknesses.
Posted: 13 May 2014 | Published: 30 Oct 2013

Citrix

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell Software
WHITE PAPER: Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common. Decoding and normalizing traffic across the network to detect and combat these attacks is critical for your network security plan.
Posted: 12 May 2014 | Published: 12 May 2014

Dell Software

Managing and Monitoring Hybrid Cloud Resource Pools: 3 Steps to Ensure Optimum Application Performance
sponsored by Windstream Communications
EGUIDE: This expert e-guide walks through a three step process on how to make sure that work productivity isn't impacted by performance issues.
Posted: 12 May 2014 | Published: 12 May 2014

Windstream Communications

Next-gen Application Delivery Controllers: An Intelligent Path to Active-Active Clusters
sponsored by Citrix
WHITE PAPER: This informative guide explores the role of these next-generation ADCs and provides insight on their effectiveness.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Guarding the Castle
sponsored by Dell Software
WHITE PAPER: Learn the strategies and tools that cybercriminals use to infiltrate your network and how you can stop them. See how you can secure your network every minute of the day, against all types of malware, with a high performance firewall that protects against the latest global threats.
Posted: 08 May 2014 | Published: 08 May 2014

Dell Software

Three Key Strategies to Prevent Network Outages
sponsored by KEMP Technologies
WHITE PAPER: This informative whitepaper explores 3 key strategies for preventing network outages and highlights the top 3 threats to your network uptime.
Posted: 08 May 2014 | Published: 31 Dec 2013

KEMP Technologies

The Network is Key as Cloud Drives Converged Infrastructure Solution
sponsored by Windstream Communications
EGUIDE: This expert e-guide discusses how the cloud provides three important lessons on fully converged infrastructure solutions and outlines the role of the network in the cloud.
Posted: 08 May 2014 | Published: 08 May 2014

Windstream Communications

When Network Monitoring Tools Improve Business Intelligence
sponsored by Gigamon
EGUIDE: This expert e-guide highlights new emerging monitoring strategies that tie together cloud provisioning and service and application delivery. Discover how creating a clearer view of application performance can help you improve business processes, and explore the various tools that are part of modern networking strategies.
Posted: 07 May 2014 | Published: 07 May 2014

Gigamon

APM e-guide: How network-based tools change the game
sponsored by Gigamon
EGUIDE: While network-based APM offers a crucial perspective on performance and provides deeper visibility, it begs the question: who will bear the burden of APM? Will it be the application team or the networking team? In this expert e-guide, discover how networking-based APM is changing IT.
Posted: 07 May 2014 | Published: 07 May 2014

Gigamon

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering
sponsored by Citrix
WHITE PAPER: This informative whitepaper explores the importance of application delivery controllers and why they are essential to the performance of your data centers and networks.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM

Mastering Active Directory Migrations: Controlling Critical Issues
sponsored by Dell Software
WHITE PAPER: This whitepaper covers the four steps to completing a successful active directory migration during a network operating system upgrade.
Posted: 05 May 2014 | Published: 06 May 2013

Dell Software

Overcoming the Challenges of Mobile APM
sponsored by Aternity
WHITE PAPER: This informative whitepaper explores a unique mobile application performance management solution and outlines its core benefits.
Posted: 13 May 2014 | Published: 13 May 2014

Aternity

An Essential Guide to Application Delivery Controllers
sponsored by Citrix
WHITE PAPER: This guide explores a top-tier application delivery controller and how it can help your organization with web application delivery, load balancing and more.
Posted: 12 May 2014 | Published: 12 May 2014

Citrix

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

The Differences Between End User Experience Management and APM
sponsored by Aternity
WHITE PAPER: This guide explores the benefits of application performance management can benefit your network and end-user experience.
Posted: 09 May 2014 | Published: 31 Dec 2013

Aternity

Is Your Network Traffic Invisible?
sponsored by GlobalScape
WHITE PAPER: This brief guide explores the importance of network monitoring and outlines the benefits of increased visibility.
Posted: 09 May 2014 | Published: 09 May 2014

GlobalScape

Monitor Your Virtual Network to Maintain 100% Visibility
sponsored by APCON, Inc.
WHITE PAPER: This brief whitepaper explores a unique tool for monitoring your network and maintaining 100% visibility.
Posted: 07 May 2014 | Published: 07 May 2014

APCON, Inc.

Multi Stage Filtering
sponsored by APCON, Inc.
WHITE PAPER: This informative guide explores the current challenges networks face when it comes to increased traffic and how effective packet filtering can help you.
Posted: 07 May 2014 | Published: 07 May 2014

APCON, Inc.
126 - 150 of 1592 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement