IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management Reports
251 - 275 of 1871 Matches Previous Page  |  Next Page
Performance Matters: SD-WAN Improves Speed and Reliability
sponsored by Silver Peak
VIDEO: The internet is an incredibly fast way to conduct a great deal of business, but some data needs extra protection. Harness the speeds of the internet for connecting to applications, while remaining secure in the knowledge that your data is safe.
Posted: 22 Jun 2016 | Premiered: 22 Jun 2016

Silver Peak

Beyond the Basics of SD-WAN: Why Performance and QoS Matter
sponsored by Silver Peak
WHITE PAPER: Looking to take SD-WAN to the next level, but unsure of where to start? This white paper highlights how to improve your network management to deliver superior performance and quality of service.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Silver Peak

Redefining Networking with Network Virtualization
sponsored by VMware
WHITE PAPER: 82% of enterprises have mapped out a hybrid cloud strategy, but there is a major road block; hardware-centric networking. Discover why legacy network infrastructures are being held back from hybrid clouds by inflexible hardware and how to move forward.
Posted: 14 Jun 2016 | Published: 29 Feb 2016

VMware

Key Insights on Securing Networks Against Modern Cyber Threats
sponsored by Fortinet, Inc.
RESOURCE: Understand the capabilities, requirements and benefits of an evolved network security infrastructure. Inside, you'll see how an enterprise firewall can – and perhaps should – be the core of your security layout.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Fortinet, Inc.

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Five simple strategies to help enable a more productive mobile workforce
sponsored by HPE and Intel®
RESOURCE: How do you keep your mobile workforce productive? Explore best practices and five strategies to make sure that your workers are making the most of mobility.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

Delivering Enterprise-Class Communications with WebRTC
sponsored by Oracle Corporation
WHITE PAPER: Explore potential WebRTC applications, review WebRTC deployment considerations, and discover how WebRTC service enablers help enterprises reap all the benefits of browser-based communications. All of this without compromising security, reliability, or service quality.
Posted: 03 Jun 2016 | Published: 29 Jan 2016

Oracle Corporation

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

How Cloud Computing Changes the Role of IT
sponsored by MASERGY
RESOURCE: Optimize the performance of your SaaS-based apps by examining network traffic to determine how much of your bandwidth they consume. Discover how to work with end users to improve their cloud-based app experience, and ensure your network is in top shape to accommodate all workloads.
Posted: 25 May 2016 | Published: 15 Jan 2015

MASERGY

Build a Secure Network Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

How to Yield the Benefits of Converged Infrastructure
sponsored by Dell, Inc. and Intel®
EGUIDE: Is converging corporate infrastructure—to eliminate siloed servers, storage, data and processes—worth the risk of potential vendor lock-in? Discover how to yield maximum benefit from implementing converged infrastructure in your data center, as well as learn CI implementation best practices.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

Dell, Inc. and Intel®

Picking the Right Spots for SDN
sponsored by SearchSDN.com
EBOOK: This 3 part guide covers the top misconceptions that plague SDN, its importance to horizontal scaling and virtues of two SDN technologies: SD-WAN and NFV. In addition, discover how Microsoft aims to be a top contender in the SDN enterprise market.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

SearchSDN.com

Cloud Migration Strategies for a Hybrid Cloud World
sponsored by New Relic
EGUIDE: Cloud computing strategies aren't always easy to carry out – especially when migrating between cloud providers or public and private clouds. This e-guide reveals recommended cloud migration practices and explores three common approaches to migrating apps to the cloud.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

New Relic

How to Implement Network Microsegmentation
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Discover how microsegmentation can break up your data center into logical elements and reduce its susceptibility to catastrophic lateral movement of malicious activity once a breach occurs.
Posted: 21 Jun 2016 | Published: 14 Jun 2016

NTT Com Security (UK) Ltd

Schools Talking to Schools
sponsored by Avaya
WEBCAST: Overcoming the obstacles to deliver the modern learning demands of a smart campus. From secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Posted: 21 Jun 2016 | Premiered: Aug 20, 2015

Avaya

9 Essential Elements for Effective Enterprise Mobility
sponsored by VMware, Inc.
EGUIDE: Expert-level mobility comes in threes. Uncover three essentials for an effective mobile app strategy, three steps to a successful mobile initiative, and three steps to better mobile data protection.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

Why It's Important to Have a Mobile Enterprise Strategy
sponsored by VMware, Inc.
EGUIDE: We sat down with the general manager of VMware's end-user computing group to learn about the vendor's EMM evolution. Explore additional expert resources that detail ways to integrate EMM into a broader mobile enterprise strategy, and what it means to have a mobile-first strategy.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

The Network Takes Center Stage
sponsored by IBM
EGUIDE: Pinpointing issues is becoming more challenging as networks expand and become more complex, but there are ways to monitor your network more effectively in order to spot the early warning signs of downtime. Access this special report to learn about analytics technology, outsourcing options, and more.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

IBM

Transforming the Networking Capabilities of Norway's Largest Hospital
sponsored by Avaya
CASE STUDY: Norway's largest health system needed a smart, scalable network to bring together 3 hospitals and absorb future growth. Read this case study to learn how employing a virtual enterprise network architecture fulfilled the health system's networking needs and could soon be fulfilling yours.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Avaya

25 GbE and the Future of the Data Center
sponsored by QLogic Corporation
EGUIDE: Expanded performance and throughput in 25 Gigabit Ethernet (25 GbE), a new Ethernet standard, reflects continued advances in server processing – and also may be the cure for oversubscribed data centers. Access this e-guide for more on these claims, and what 25 GbE means for the future of networking.
Posted: 15 Jun 2016 | Published: 08 Jun 2016

QLogic Corporation

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Canon U.S.A. Fully Automates VMOTION and Storage VMOTION with VMTurbo
sponsored by Turbonomic
WHITE PAPER: Resource allocation is the key to succeeding in virtualized environments. Read this brief case study to learn how one company was able to implement a solution that automatically made intelligent adjustments, allowing them to expand their virtual footprint and control over a complex virtual environment.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Turbonomic

Boston College Excels With VMTurbo to Assure Performance and Intelligently Plan for Growth
sponsored by Turbonomic
CASE STUDY: What if you could increase your virtual footprint by 30% or more? That's what one of Boston's top colleges did. Read on to find out how the college was able to incease its IT staff productivity by 20% and create a viable plan to meet future demands by improving its network infrastructure.
Posted: 10 Jun 2016 | Published: 31 Dec 2015

Turbonomic

Windows 10, EMM, and the Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: Enterprise mobility management (EMM) is one big key to unlocking mobility's full potential. We had previously required a variety of solutions to deal with every aspect of mobile management. Now there is an EMM solution that does it all. Read on to learn more about EMM and this simplifying solution.
Posted: 03 Jun 2016 | Published: 31 May 2016

MobileIron
251 - 275 of 1871 Matches Previous Page    9 10 11 12 13 14    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement