IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management Reports
151 - 175 of 1716 Matches Previous Page  |  Next Page
Hyper-Connected Enterprise Infrastructure
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, you'll learn about a mobile-first IT infrastructure approach that enables employees to use powerful apps on any device.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

A Closer Look At Primary Storage Clouds and Cloud for Backup
sponsored by Carbonite
EGUIDE: Access this e-guide to get a closer look at the differences between backup and storage clouds, and also to learn about the pros and cons of cloud-based backup.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

Carbonite

The Future of Enterprise Mobility Management
sponsored by BlackBerry
WEBCAST: Tune in to discover the results of the Forrester Wave: Enterprise Mobility Management Q3 report for even more insight into crafting an EMM strategy.
Posted: 22 Apr 2015 | Premiered: Feb 17, 2015

BlackBerry

The Critical Role of Support in Enterprise Mobility
sponsored by BlackBerry
WHITE PAPER: This informative white paper explains why support is an essential piece of your enterprise mobility management (EMM) strategy and outlines the factors necessary to ensure you choose the best solution for your specific needs.
Posted: 20 Apr 2015 | Published: 26 Dec 2014

BlackBerry

Best Practices in BYOD
sponsored by BlackBerry
WHITE PAPER: Access this white paper now to discover the 7 best practices for choosing the right BYOD solution for your organization.
Posted: 15 Apr 2015 | Published: 26 Dec 2014

BlackBerry

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: In this white paper, discover 5 key design principles for security professionals looking to better protect their networks from the latest generation of cyber criminals.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

Leveraging Traffic Visibility and IPS for Comprehensive Continuous Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Dec 2014

Gigamon

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

Case Study How the University of Wisconsin-Madison Achieved Large-Scale Data Center Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you'll discover how the University of Wisconsin-Madison was able to adapt its WAN design to accommodate the increasing volume of data without sacrificing the high level of security the research facilities required.
Posted: 13 Apr 2015 | Published: 26 Sep 2014

Gigamon

Case Study: How University of Glasgow Scaled its Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: In this white paper, you'll discover how one IDS infrastructure solution helped the IT professionals at the University of Glasgow upgrade their limited network for easier monitoring and increased protection.
Posted: 13 Apr 2015 | Published: 27 Jun 2014

Gigamon

Busting myths about mobility: Why tablets are more than just companion devices
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at BYOD and mobile device management, exposing common myths about mobility and much more. Read on to learn more.
Posted: 06 Apr 2015 | Published: 26 Nov 2014

Dell, Inc. and Intel®

Networking and Mobile Technology Classroom
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: It's a fast-moving mobile device world, and the network needs to move with it. This classroom will examine technologies CIOs are investing in to create mobile networks.
Posted: 02 Apr 2015 | Premiered: 06 Apr 2015

SearchCIO.com

Attack Mitigation Service
sponsored by Radware
WHITE PAPER: This comprehensive white paper provides an in-depth explanation of all of the latest cyber threats and explains the benefits of one potential cyber security solution.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware

The WAN Waiting Game: Can You Get New Connections Faster?
sponsored by SearchNetworking.com
EZINE: In this resource, you'll learn to assess your networking resources to see if they are working as well as they possibly can.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

SearchNetworking.com

The Enterprise Mobile Security Technology Buyer's Guide
sponsored by Dropbox for Business
WHITE PAPER: In this research report, Forrester Research, Inc., defines the use cases, business value, and outlook for the 14 technologies at the heart of mobile security.
Posted: 30 Mar 2015 | Published: 13 Dec 2013

Dropbox for Business

The Shifting Role of IT Balancing Corporate Needs and Employee Expectations
sponsored by Dropbox for Business
WHITE PAPER: In this white paper, you'll learn what you need to do to effectively secure your enterprise data in this world of BYOA movements.
Posted: 30 Mar 2015 | Published: 28 Mar 2014

Dropbox for Business

Hybrid Cloud Places New Demands on the Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this analyst report, discover what changes IT decision-makers had to make to their networks, and how smart IT teams choose the right cloud network.
Posted: 28 Mar 2015 | Published: 30 Apr 2014

Juniper Networks, Inc.

Empowering the Network: Software Defined Networking
sponsored by Cisco Systems, Inc.
RESOURCE: View this informative infographic to learn what's different about SDN and why it's growing so quickly in the data center.
Posted: 28 Mar 2015 | Published: 28 Mar 2015

Cisco Systems, Inc.

Do You Speak Automation?
sponsored by Juniper Networks, Inc.
WEBCAST: In this webcast, you'll learn the new skills that the modern data center network manager needs to know.
Posted: 27 Mar 2015 | Premiered: Mar 27, 2015

Juniper Networks, Inc.

Readiness, Benefits, and Barriers: An SDN Progress Report
sponsored by Juniper Networks, Inc.
WHITE PAPER: This report gives you an inside look at how IT leaders in the United States feel about the rise of SDN.
Posted: 27 Mar 2015 | Published: 28 Nov 2014

Juniper Networks, Inc.

Network Virtualization: 6 Best Practices for Overcoming Common Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, you'll find the 6 best practices for breaking through network virtualization roadblocks.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Juniper Networks, Inc.

Build a Business Case for Network Virtualization
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, you'll learn how to design network architectures that will take advantage of all that the future of virtualization and cloud computing has to offer.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Juniper Networks, Inc.

Building the Right Switching Architecture for New Business-Critical Applications
sponsored by Juniper Networks, Inc.
WEBCAST: Watch this webcast to discover how you can simplify your network for an architecture that supports today's IT landscape.
Posted: 26 Mar 2015 | Premiered: Dec 31, 2014

Juniper Networks, Inc.

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Watch this brief video to discover how you can more effectively monitor all your data and discover why a problem occurs before it can harm your network.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert
151 - 175 of 1716 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement