IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network ManagementReports
201 - 225 of 1587 Matches Previous Page  | Next Page
The Four Elements of IS-IS
sponsored by Global Knowledge
WHITE PAPER: This informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

The Four Elements of OSPF
sponsored by Global Knowledge
WHITE PAPER: This whitepaper explores 4 key elements for the implementation of open shortest path first (OSPF).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

Latest IT Trends For Secure Mobile Collaboration
sponsored by Cisco
WHITE PAPER: This informative whitepaper explores some of the latest IT trends for secure mobile collaboration, and outlines how you can situate your network infrastructure for smooth deployment.
Posted: 02 Apr 2014 | Published: 30 Sep 2013

Cisco

Tips for Effective Cloud APM
sponsored by IBM
EGUIDE: This expert e-guide provides best practices and tips for effective cloud APM and for preserving all the good things that cloud APM can deliver.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

IBM

How to Prepare your Network for 802.11AC
sponsored by Ixia
EGUIDE: This expert guide from SearchNetworking.com provides key recommendations for preparing your network for 802.11ac, examining the steps that your organization can take to ensure you get the most from your wireless network.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Ixia

2014 Cloud Guide: Insights for a Great Migration
sponsored by Windstream Communications
RESOURCE: With so much information swirling in the cloud space, it's hard to know where to go or who to trust for information. Here's a quick look at important cloud computing trends and a short list of trusted resources.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Windstream Communications

How to Set a Network Performance Baseline for Network Monitoring
sponsored by Ixia
WHITE PAPER: This expert e-guide covers the benefits of a network performance baseline when it comes to solving top network monitoring challenges.
Posted: 26 Mar 2014 | Published: 26 Mar 2014

Ixia

Citrix XenMobile and Cisco ISE Integration
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Cisco Systems, Inc and Citrix

Avaya Aura Communication Manager COR/FRL/AAR Simplified
sponsored by Global Knowledge
WHITE PAPER: This white paper provides a useful list of Avaya Site Administration commands that will allow you to control what kind of calls employees are authorized to make and ensure least cost routing of outbound calls to keep phone bills down.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Global Knowledge

The Implementation of LISP as it Relates to Cisco OTV
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to examine the four common elements for the implementation of Open Shortest Path First (OSPF).
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Global Knowledge

AT&T and IBM's Private Cloud Partnership:  From Competition to Coopetition
sponsored by IBM
ANALYST REPORT: Access this Frost & Sullivan report for key findings on how the joint program between cloud and network providers will affect the individual providers, as well as the customers.
Posted: 20 Mar 2014 | Published: 30 Nov 2012

IBM

Build a network perimeter for the mobile age
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

Fundamental Networking Industry Trends to Expect in 2014
sponsored by TechTarget
RESOURCE: With technology evolving each year, you never know what to expect but being prepared for the unknown is imperative. This expert e-guide provides responses from three top industry analysts to predict the key networking industry trends for 2014.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Pocket Guide to Network Management and Monitoring
sponsored by TechTarget
RESOURCE: Unified network management is an ever-changing area of technology so researching and contacting potential vendors to learn more about their approach is imperative, as well as exploring its management tools and key features. Take this short survey and gain access to this e-guide providing best practices into the unified network pool.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

When Cloud-Based UC Makes Sense
sponsored by Windstream Communications
EGUIDE: In this expert e-guide, learn about the benefits of cloud-based UC and how this new strategy can enhance business collaboration.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Windstream Communications

Presentation: Virgin Media’s unified communications strategy
sponsored by ComputerWeekly.com
PRESENTATION: Colin Miles, director of IT Technical Services of Virgin Media explains how unified communications has transformed the company, in this presentation for Computer Weekly's 500 Club for IT leaders.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

The Critical Incident Response Maturity Journey
sponsored by Cisco
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 01 Apr 2014 | Published: 31 Dec 2013

Cisco

Network Evolution – April 2014
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, find out how APM vendors are focusing on network visibility. We also explore 802.11ac's bandwidth demands and video conferencing drivers.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

SearchNetworking.com

Network Solutions for your 21st Century Data Center
sponsored by Hewlett-Packard Limited
WHITE PAPER: This informative white paper explores the impact of virtualization and cloud computing on the data center and how to build the most efficient and cost effective data center network.
Posted: 31 Mar 2014 | Published: 31 May 2013

Hewlett-Packard Limited

The New Building Blocks of Network Design
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper explores network virtualization as a strategy to make corporations more agile and IT expenditure efficient.
Posted: 26 Mar 2014 | Published: 12 Jan 2009

Cisco Systems, Inc.

Memorial Hermann Delivers Secure, Reliable Wireless for Mission-Critical Patient Care
sponsored by Aerohive Networks
WHITE PAPER: In this case study, learn how Memorial Hermann Health System is benefiting after upgrading to a wireless network.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Aerohive Networks

BYOD, mobile collaboration and network security
sponsored by Cisco
WHITE PAPER: This guide explores the current state of workplace mobility, BYOD and what you can do to ensure security for user-devices.
Posted: 19 Mar 2014 | Published: 31 Dec 2013

Cisco

The Complex Powers of Network Virtualization
sponsored by SearchWindowsServer.com
EBOOK: In which situations is network virtualization worth the trouble that implementation would entail? Read this whitepaper to find out.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchWindowsServer.com

Big Data in Motion
sponsored by SearchCIO.com
EBOOK: When large information sets are in transit, bottlenecks inevitably occur. CIOs must overcome these obstacles in order to extract real value from their data. In this SearchCIO handbook, we confront the obstacles posed by big data in motion.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchCIO.com

Next-Gen WLAN: How 802.11ac Will Change Your Network Forever
sponsored by SearchNetworking.com
EBOOK: With the IEEE 802.11ac-2013 standard approved, WLAN data rates are poised to soar to multiple-gigabit territory. This Technical Guide focuses on the WLAN's evolution and why it will soon be a viable alternative to Ethernet.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

SearchNetworking.com
201 - 225 of 1587 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement