IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network Management Reports
151 - 175 of 1679 Matches Previous Page  |  Next Page
Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

How to Make the Most of your Unified Communications Strategy
sponsored by Dell, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at a UC solution that was able to deliver the amazing benefits listed above, for a fraction of the cost. Plus, take a look at Lync 2013 and what it means for UC. Read on to learn more and take the first step towards a more effective UC solution.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

Dell, Inc.

Make your UC strategy worthwhile
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at why UC should be a leading process for small and medium businesses. Read on to learn more.
Posted: 31 Oct 2014 | Published: 31 Oct 2014

Cisco Systems, Inc.

Beyond the Executive Suite: Video Conference Is Now Available To Virtually Everyone
sponsored by LifeSize
WHITE PAPER: This exclusive white paper takes a look at one executive suite that harnesses the power of video for all. Read on to learn more.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

LifeSize

Gartner Report: Best Practices for Choosing, Implementing and Using MDM and EMM
sponsored by Citrix
WHITE PAPER: This whitepaper looks at the best practices and provides a step-by-step approach for mobile and security specialists.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Citrix

Enterprise deploys voice solution for 5,000 users flawlessly
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines a UC solution that was able to rise to current communication challenges.  Read on to learn more.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Dell, Inc.

The New Economics of Video Conferencing: Now Affordable Anywhere, Anytime With Anyone
sponsored by LifeSize
WHITE PAPER: This exclusive white paper takes an in-depth look at the economics behind video and web conferencing, as well as other key factors.  Read on to learn more.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

LifeSize

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Dell Higher Education Solutions Guide
sponsored by Dell, Inc. and Intel®
VIDEO: Accessing network data from remote locations anywhere is no longer a luxury, but an expectation. End-users expect to not only have the same experience from the network in a mobile setting, but also expect a fast and secure connection.
Posted: 14 Oct 2014 | Premiered: 22 Sep 2014

Dell, Inc. and Intel®

How We Define a Network is About to Change, Again
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn how VMware NSX changes the way that you build, manage, and secure your network.
Posted: 06 Oct 2014 | Published: 25 Sep 2014

Global Knowledge

How Mobile Management Services Fill a Critical Security Need
sponsored by Global Knowledge
WHITE PAPER: For organizations considering Mobile Management Services (MMS), such an increase demonstrates why it's critical to address MMS adoption and deployment now, before unchecked proliferation can cause serious problems.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Global Knowledge

Troubleshooting Fibre Channel Boot from SAN on the Cisco UCS B Series Chassis
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses one component of Cisco's Unified Computing Solution: Stateless computing, which allows all the hardware settings of a server to be saved on a location outside the server itself, and is implemented through an XML-based software feature called a service profile.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Failover Strategies on the Cisco UCS B Series Chassis
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses how Cisco's popular and powerful Unified Computing Solution is driven by the flexibility and agility of the hardware failover options and Service Profiles.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Enterprise Mobility & BYOD:Four Biggest Challenges—And How to Solve Them
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This exclusive white paper reviews the 4 biggest challenges of enterpise mobility management and BYOD, and how to solve them. Read on to learn more.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

FrontRange Solutions Inc.

Empowering Your Mobile Workforce: Change is in Your Hands
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper explains how to power up your mobile management strategy in the workplace.
Posted: 20 Oct 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Innovating Through Cloud Technologies Change is in Your Hands
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper takes a look into the challenges surrounding the implementation of the cloud among businesses.
Posted: 17 Oct 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Embracing Trends and Technologies: Change is in Your Hands
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, discover why organizations must embrace best practices for implementing change, as well as unified management solutions that facilitate simplified, reliable and cost-effective implementation.
Posted: 17 Oct 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Enterprise Lifecycle Management in a Changing World: Best Practices for Resolving Emerging Challenges in Desktop and Server Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper reveals several evolving IT management challenges and best practices for tackling them.
Posted: 16 Oct 2014 | Published: 31 Dec 2011

FrontRange Solutions Inc.

How SSL and TLS Secure Network Transactions
sponsored by Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Blue Coat Systems

Balancing wireless LAN troubleshooting strategies for BYOD
sponsored by Extreme Networks
EGUIDE: This expert E-Guide highlights the variety of tools available for proactive and responsive BYOD troubleshooting.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks

What network virtualization technology can do for your network
sponsored by Extreme Networks
EGUIDE: This expert E-Guide discusses why a hybride approach may be the best way to begin.  Additionally, find out where data center network fabric and SDN intersect.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks

IBM SmartCloud for Social Business Mobility
sponsored by IBM
WHITE PAPER: This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

IBM

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

WAN Aggregation: Shaking Enterprise Reliance on MPLS
sponsored by Talari Networks
EGUIDE: This expert e-guide highlights the capabilities of WAN aggregation tools and how vendors are stepping up their game.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Talari Networks

Getting Down to Business with Mobile APM
sponsored by SearchNetworking.com
EZINE: Mobile APM matures with more granular visibility than ever for mobile apps. Also discover what's behind the big push for 25 Gigabit Ethernet, plus new uses for SDN in wireless.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

SearchNetworking.com
151 - 175 of 1679 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement