IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management Reports
151 - 175 of 1900 Matches Previous Page  |  Next Page
Managing Software-Defined Networks
sponsored by Turbonomic
WHITE PAPER: Network-heavy workloads place considerable stress on today's virtualized and cloud data centers. SDN technologies aim to reduce the bottlenecks that can precipitate at the network layer in such environments. Access this whitepaper that explores the benefits of incorporating network topology and traffic-matrix information in VM placement decisions.
Posted: 31 Aug 2016 | Published: 31 Dec 2014

Turbonomic

Addressing Issues in the Local Area Network
sponsored by Nokia
WHITE PAPER: This white paper examines the limitations of traditional enterprise networks built on Ethernet technologies. Access now to also explore the benefits of an enterprise-level passive optical LAN (POL.)
Posted: 30 Aug 2016 | Published: 30 Aug 2016

Nokia

Global Healthcare Company Improves Prescription Processing with APM Platform
sponsored by CA Technologies
WEBCAST: Being able to rapidly detect application issues is essential to quality application deployment. Watch this video that details how a global healthcare company was able to find application issues in virtually real time, by employing an advanced APM platform.
Posted: 29 Aug 2016 | Premiered: Apr 14, 2016

CA Technologies

Competitive Landscape: Carrier-Class Network Firewalls
sponsored by Juniper Networks, Inc.
WHITE PAPER: As communications service providers (CSPs) move toward software-defined networking (SDN), and virtualizing network functions, new security capabilities must be in place. Access this report to uncover essential competitive insights into carrier network firewall providers.
Posted: 23 Aug 2016 | Published: 25 Nov 2015

Juniper Networks, Inc.

Deliver Security Virtually Everywhere with SDN and NFV
sponsored by Juniper Networks, Inc.
WHITE PAPER: Security vendorsĀ are progressing toward secure SDN and NFV rollouts. Read this report and explore approaches and exhibits for adding a layer of security to virtual network infrastructures.
Posted: 23 Aug 2016 | Published: 15 Jul 2016

Juniper Networks, Inc.

A 6-Step Guide to Getting Started with Network Automation
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper features a six-step guide to getting started with network automation. Read on to find an outline of the processes involved in planning for automation, how different areas of business can benefit, and how to ensure the tools and partners you've selected are the right ones.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Juniper Networks, Inc.

Your SD-WAN Roadmap
sponsored by Citrix
EGUIDE: Discover how making the transition to SD-WAN can save you money and simplify your current WAN structure.
Posted: 19 Aug 2016 | Published: 15 Aug 2016

Citrix

IT Project: Internet of Things
sponsored by ComputerWeekly.com
EGUIDE: The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

ComputerWeekly.com

Target Networking for Successful Cloud Deployments
sponsored by Juniper Networks, Inc.
WHITE PAPER: This analyst report invites you to foster culture and skill set changes to move beyond traditional network design practices. Discover ways to invest in automation, programmability, and multitenacity capabilities to ensure the network is "cloud ready."
Posted: 19 Aug 2016 | Published: 11 Aug 2015

Juniper Networks, Inc.

Understanding SD-WAN
sponsored by Citrix
EGUIDE: In this e-guide learn about deploying your WAN architecture onto the cloud, thus creating an SD-WAN architecture that can allow for smarter routing and improved networking. Uncover the benefits of SD-WAN and how its architecture better suits the demands of cloud, mobile and real-time applications.
Posted: 19 Aug 2016 | Published: 15 Aug 2016

Citrix

Managing IT at Multiple Clinics
sponsored by Citrix
WHITE PAPER: This resource discusses the unique requirements of healthcare remote office communication, and how SD-WAN can help you meet these requirements.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

Citrix

How to Make Your WAN Architecture Software-Defined
sponsored by Citrix
EGUIDE: In this e-guide, you will receive advice on how to choose the right SD-WAN for your enterprise needs. Discover how to analyze the vast array of SD-WAN vendors by isolating your particular needs, and uncover insight into securing and deploying the SD-WAN tool that will meet your goals.
Posted: 18 Aug 2016 | Published: 16 Aug 2016

Citrix

Penetration Testing: Protect Customer Data and Your Business From a Breach
sponsored by eTECH Channel
WHITE PAPER: Learn the importance of penetration testing for the payment card industry and why it's become an annual necessity for PCI enterprises. Discover PCI test results including an executive summary describing major findings and remediation info, severity score assignments, and more.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

eTECH Channel

IT Battles the Top Three Mobile Security Threats
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: Learn about 3 mobile security threats facing IT managers and security experts today. Access now to learn what best practices are being deployed to face the rapidly growing danger to your mobile devices.
Posted: 16 Aug 2016 | Published: 11 Aug 2016

Hewlett Packard - Intel Xeon

SD-WAN Helps Secure Hybrid Networks
sponsored by Citrix
EGUIDE: SD-WAN enables enterprises to create hybrid networks. But many network engineers eyeing hybrid WAN architectures are asking themselves the question: It can't be as safe as running on MPLS, right? Access this expert e-guide to learn about SD-WAN platforms' security features that finally make hybrid networks secure enough for widespread use.
Posted: 15 Aug 2016 | Published: 12 Aug 2016

Citrix

Incident Response with NetFlow for Dummies
sponsored by Cisco Systems, Inc.
EBOOK: Security incidents are critical times for information security pros, with the time period after the first identifications having a big impact on the incident's severity. Access this e-book to learn how to align your incident response processes with industry-standard practices and how to enhance your technical capabilities.
Posted: 15 Aug 2016 | Published: 31 Dec 2014

Cisco Systems, Inc.

Clientless Remote Support: Independent Review
sponsored by LogMeIn, Inc.
WHITE PAPER: This paper examines the business advantages of adopting video-aided remote support tools. With rapid investments in IOT taking place now, and the need for devices and systems to talk to each other, understanding remote support tools is more important than ever.
Posted: 09 Aug 2016 | Published: 31 Jul 2015

LogMeIn, Inc.

Mobility management 101: What you need to know
sponsored by IBM MaaS360
WEBCAST: Today, employees are using their devices to access corporate data and using company devices to access personal data. This usage presents new security risks that call for an integrated, comprehensive policy for managing mobile devices. View this webinar that discusses the mobile workplace and how to construct an effective and secure mobile policy.
Posted: 09 Aug 2016 | Premiered: Jun 30, 2016

IBM MaaS360

Common Hyper-Converged Network Concerns and Solutions
sponsored by NTT ICT
EGUIDE: Do your apps require either very high or very specific performance? Discover in this expert guide how to identify and resolve hyper-converged networking bottlenecks by implementing a dedicated storage network and examining how data is stored within your architecture.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

NTT ICT

Clientless Remote Support Software: A Key Service Desk Tool to Drive User Satisfaction and Productivity
sponsored by LogMeIn, Inc.
CASE STUDY: Discover how clientless remote software is changing the way two enterprises manage their devices to support end users in a holistic manner. Further, you'll see how security, features sets, and strong relationships underpin these tools.
Posted: 08 Aug 2016 | Published: 30 Oct 2015

LogMeIn, Inc.

How to Identify Effective Telemedicine Systems
sponsored by Avaya TSG
EGUIDE: As more telemedicine systems flood the market, providers should be aware of the key factors that make some products more suited to their organizations. Access this e-guide for the 5 areas by which you should judge potential telemedicine products to ensure you deploy the best tool.
Posted: 22 Aug 2016 | Published: 17 Aug 2016

Avaya TSG

The New WAN: How SDN Changes Wide Area Network Operations
sponsored by Citrix
EGUIDE: This e-guide discusses why network professionals should be rethinking the functions of their WAN, and how to approach the new technology coming to remake the WAN landscape.
Posted: 16 Aug 2016 | Published: 12 Aug 2016

Citrix

The 11 EMM Providers That Matter Most And How They Stack Up
sponsored by vmware airwatch
WHITE PAPER: Selecting the right partner for your enterprise mobile management (EMM) can be extremely difficult. An array of vendors exists that widely varies in both offerings and overall quality. Access this report that provides an evaluation of the 11 most significant EMM vendors (based on 25-criteria) to ensure you make the best decision.
Posted: 15 Aug 2016 | Published: 31 Dec 2015

vmware airwatch

Mobile Device Management for Windows Phone
sponsored by IBM MaaS360
DATA SHEET: If you are using Windows Phone at your business without the proper mobile device management, then you are missing out on the true benefits of workplace mobility. Access this data sheet that highlights one enterprise mobility management platform that provisions, manages and protects Windows Phone devices, apps and documents simply and efficiently.
Posted: 09 Aug 2016 | Published: 29 Feb 2016

IBM MaaS360

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360
151 - 175 of 1900 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement