IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management Reports
301 - 325 of 1910 Matches Previous Page  |  Next Page
It's Time to Take Cloud UC Seriously
sponsored by Carousel Industries
EGUIDE: This expert e-guide discusses the adoption trends for cloud-based UC services and reveals the results of a survey aimed at discovering the opinion of IT professionals towards cloud UC.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Carousel Industries

Are Sandboxes the Key to Network Security?
sponsored by Fortinet, Inc.
WHITE PAPER: This report by Forrester explores how sandboxes are becoming an essential part of a comprehensive network breach prevention, detection, and response strategy. Uncover their pros and cons, and learn best practices for picking a sandbox technology that can successfully protect your network.
Posted: 10 Feb 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Boost Collaboration With Video Conferencing-as-a-Service
sponsored by Dimension Data
CASE STUDY: This short case study shows how manufacturing giant Unilever has deployed cloud-based video collaboration to grow their business while limiting their environmental impact.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Dimension Data

A Case for Enterprise SDN: Making Your Network Programmable
sponsored by F5 Networks
WHITE PAPER: A software-defined network (SDN) can help you spend less time managing complexities. Access this infographic and discover the steps to a seamless integration between operations and the network.
Posted: 09 Feb 2016 | Published: 31 Mar 2014

F5 Networks

Video Everywhere: It's Time to Expand Your View on Visual Communications
sponsored by Dimension Data
WHITE PAPER: This short resource discusses how video communications, the new trend in visual communications and collaboration, has permeated enterprises to effectively allow users to connect to anything and everything, even from outside the boardroom.
Posted: 08 Feb 2016 | Published: 30 Jun 2015

Dimension Data

Why Manufacturers are Using the Cloud to Deliver Infosec
sponsored by OpenDNS
WEBCAST: In this webcast, review how Chart Industries, a global manufacturer with 5,000 employees and 45 locations, faced malicious activities every day and struggled to firefight data breaches.
Posted: 08 Feb 2016 | Premiered: Nov 20, 2015

OpenDNS

Behavioral Analytics: Let Your Data Tell the Story
sponsored by Prelert
WEBCAST: In this brief webcast, learn how to analyze log data, find anomalies, and like them together faster. Uncover the steps to understand not only what happened in an incident, but how it happened as well. View now to learn more.
Posted: 02 Feb 2016 | Premiered: Jan 20, 2016

Prelert

2016 WAN Crystal Ball
sponsored by Silver Peak
WHITE PAPER: Which new trends and technologies will be game-changing in 2016? What benefits will these new concepts bring and what challenges will you have to tackle? These are just some of the questions addressed in this eBook as Silver Peak shares the predictions for the New Year and looks at the trends that are expected to go mainstream in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Silver Peak

A Definitive Guide to Windows 10 Management for Your Enterprise
sponsored by VMware
WHITE PAPER: In this white paper will help you evolve your Windows management from a disruptive PC-centric approach to one that offers maximum flexibility. Discover how to leverage conventional Windows management tools utilized today, and delve into the specific management technologies that W10 requires.
Posted: 25 Jan 2016 | Published: 30 Nov 2015

VMware

Interroll Deploys Hybrid WAN with MPLS and Broadband
sponsored by Silver Peak
CASE STUDY: This case study discusses how one enterprise built a hybrid WAN with MPLS and broadband in order to dramatically reduce WAN costs and improve SaaS application performance.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Silver Peak

Guide to WAN Architecture and Design
sponsored by Silver Peak
EBOOK: This e-book presents a project plan that network organizations can follow to make a significant upgrade to their WAN architecture, at a time where the WAN is the focus of considerable innovation.
Posted: 20 Jan 2016 | Published: 30 Jun 2015

Silver Peak

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

Delivering Path Control Over Multiple Connections: The Foundation for Your Hybrid WAN
sponsored by Silver Peak
WHITE PAPER: This white paper reveals how you can begin the transition towards an SD-WAN deployment by incorporating path control.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Silver Peak

Top Tips for Managing a Remote Workforce
sponsored by LogicNow
WHITE PAPER: This whitepaper discusses some of the best ways to manage and protect your mobile workforce, such as setting up certain policies and key tools that can help.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

LogicNow

SD-WAN CIO Solution Brief
sponsored by Silver Peak
RESOURCE: This resource describes how you can implement a software-defined WAN as a way to revolutionize your existing network infrastructure and keep up with the pressures of the cloud.
Posted: 15 Jan 2016 | Published: 15 Jan 2016

Silver Peak

Assessing the Benefits of Application Delivery Optimization: An Expert E-Guide
sponsored by Citrix
EGUIDE: In this expert e-guide, you will discover how to meet your service-level agreements by optimizing your application delivery processes. Access this exclusive guide to improve throughput by preventing numerous round trips and multiplex multiple connections, and accelerate your app delivery to meet SLAs.
Posted: 14 Jan 2016 | Published: 14 Jan 2016

Citrix

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

The Evolution of Application Performance Management
sponsored by CA Technologies
WHITE PAPER: Only 25% of companies report confidence in their ability to meet user expectations. Learn how a simple acronym can transform the application performance status quo and put the user at the center.
Posted: 08 Jan 2016 | Published: 08 Jan 2016

CA Technologies

SSL Certificate Management: How to Avoid Common Mistakes
sponsored by Symantec Website Security
EGUIDE: This expert e-guide describes the most common SSL certificate management mistakes and provides advice on how to avoid them. Discover how to choose the best certificates for your enterprise's needs, manage renewal of certificates, and more.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

SSL Certificate Management: A Practical Guide
sponsored by Symantec Website Security
EGUIDE: This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Protect Revenue and Emphasize User Experience with APM Tools
sponsored by eG Innovations, Inc.
EGUIDE: Looking to boost revenue and keep your customers happy with an improved user experience? Access this expert guide to learn how to leverage the latest in application performance management (APM) tools and discover a host of approaches to evaluate end-user experience across all channels.
Posted: 05 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.

Networking Engineering in Extraordinary Places
sponsored by SearchNetworking.com
EZINE: In this edition of the Network Evolution e-zine, find out how network locations dictate the need to adapt to new and sometimes unusual challenges.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

SearchNetworking.com

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone

Planning for Wireless Hospital Networks and RTLS Technologies
sponsored by Ekahau, Inc.
EGUIDE: This exclusive e-guide explores critical considerations for planning a hospital wireless network. Learn about planning access points, uncover the impact of real-time location systems (RTLS) for healthcare systems, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

Ekahau, Inc.

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry
301 - 325 of 1910 Matches Previous Page    11 12 13 14 15 16    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement