IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management Reports
301 - 325 of 1934 Matches Previous Page  |  Next Page
Network Virtualization Brings Agility to the Enterprise
sponsored by MASERGY
WHITE PAPER: A recent survey indicates that over 40% of CIOs surveyed plan to upgrade their WANs this year, and they cited networking as the area most in need of a refresh. Network function virtualization (NFV) is a significant innovation in network design and it comes at an opportune time. Can you boost your company's agility with NFV?
Posted: 17 Mar 2016 | Published: 08 Mar 2016

MASERGY

Transform Your Enterprise With Software-Defined Hybrid WANs
sponsored by MASERGY
WEBCAST: There is a large migration toward software-defined networking and should this trend continue, SDN will become the way of the future. We're already seeing improvements over legacy IT, but some organizations are still behind on this trend. In this webcast three experts will teach you what you need to understand about SD hybrid WANs.
Posted: 16 Mar 2016 | Premiered: Mar 1, 2016

MASERGY

The Enterprise Guide to Managed Services
sponsored by Comcast
WHITE PAPER: Your network is slated to fall victim to BYOD initiatives. Your WAN will need an upgrade, and now it's decision time. This white paper invites you to explore several considerations before you employ network managed services. Access now to examine what managed services are, how they work, and who benefits from them.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Comcast

How You Connect to the Cloud Matters
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This short infographic discusses displays how you can create a high performance application environment in the cloud. By moving to secure connections on private and hybrid clouds you'll be able to improve performance and flexibility.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Understanding Tomorrow's Ethernet Speeds
sponsored by Comcast
EGUIDE: This e-guide discusses the emerging standards that mean more bandwidth and versatility for tomorrow's Ethernet networks, whether in 25, 40, 50 or 100 GigE deployments.
Posted: 14 Mar 2016 | Published: 09 Mar 2016

Comcast

Building, Installing, and Configuring a RADIUS Server
sponsored by Global Knowledge
WHITE PAPER: A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Global Knowledge

SIP Trunking and Disaster Recovery
sponsored by Level 3 Communications, Inc.
WHITE PAPER: In this white paper you will learn about the ways SIP trunking can improve your DR efforts. You'll also learn the key SIP trunking service attributes to look for to support quality of service and reliability.
Posted: 11 Mar 2016 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Connected Enterprise Report - Media & Communications
sponsored by Dimension Data
WHITE PAPER: Cloud-based collaboration is a strategic goal for many organizations, but not yet a current reality. According to a recent study, only 20-25% of companies rely on hosted collaboration services. This report discusses the collaboration trends, insights and strategies common to the digital age, as they apply to your corner of the marketplace.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Dimension Data

Connected Enterprise Report - Pharmaceutical
sponsored by Dimension Data
RESEARCH CONTENT: This report discusses how pharmaceutical companies use unified communications (UC) technology in an ever-changing global marketplace. Discover the UC trends, insights and strategies common to the digital age.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Dimension Data

Exploring the Business Benefits of a SIP Solution
sponsored by Level 3 Communications, Inc.
EBOOK: This short e-book discusses the 3 key business benefits of embracing a SIP deployment in your enterprise.
Posted: 10 Mar 2016 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Optimizing Your Network
sponsored by Extreme Networks
WEBCAST: The Internet of Things (IoT) is bigger than most people realize and growing constantly. Interconnectivity is the way of the future and is going to rapidly become the way of life. As "smart" technology becomes more available, more technology and machines will become connected, continuing the growth of the IoT.
Posted: 09 Mar 2016 | Premiered: Mar 9, 2016, 16:31 EST (21:31 GMT)

Extreme Networks

Connecting a School Whose Network "Never Stands Still"
sponsored by Extreme Networks
WHITE PAPER: This case study will show how one school was able to leverage technology to enhance student learning, boost staff productivity, lower the cost of education, and improve instruction and retention rates.
Posted: 09 Mar 2016 | Published: 24 Feb 2016

Extreme Networks

5 Tenets of Instant Evolution: Your Path to the Cloud
sponsored by Juniper Networks, Inc.
WHITE PAPER: This guide highlights the 5 tenets of a network that can achieve a fully automated and self–provisioned data center in the cloud. Learn how a simple, open architecture can reduce your costs, accelerate growth, and smooth your path to technological transformation.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

Juniper Networks, Inc.

The Wireless 802.11ac Buyer's Guide
sponsored by Extreme Networks
RESOURCE: Access this buyer's guide for 802.11ac Wave 2, and discover how it can provide you with higher speeds and bandwidth to support latency-sensitive video and voice traffic, and mobile devices. Read on to accommodate for the increased density demands of clients and address several considerations before planning your installation.
Posted: 08 Mar 2016 | Published: 31 Dec 2015

Extreme Networks

Securing Valuable Data at the Edge
sponsored by Riverbed Technology, Inc.
RESOURCE: This solution brief discusses protecting the valuable data that you have spread out over multiple offices and databases.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

Riverbed Technology, Inc.

Hype or Ripe? 5 Essential Elements of the 802.11ac Wave 2 Business Case
sponsored by Extreme Networks
EBOOK: In this e-book, you will discover the five key justifications required to build a business case for investment in Wave 2 of 802.11ac. Read on to receive the benefits of this wireless technology and learn how it helps maximize end user productivity.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Extreme Networks

How (and How Often) Should Utilization Rates be Measured?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Running a lean and efficient system saves time and money, reduces the potential for service bottlenecks and ensures satisfied users. Learn how to attain this efficiency with tools that consistently measure utilization.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Dell, Inc. and Intel®

What to Consider When Choosing the Best Ethernet Switch
sponsored by Comcast
EGUIDE: This e-guide discusses how you can plan the best Ethernet infrastructure for your organization. You'll learn how Ethernet switches work, and which features should be on your must-have list.
Posted: 14 Mar 2016 | Published: 09 Mar 2016

Comcast

Computer Weekly: Robots at Your Service
sponsored by ComputerWeekly.com
EZINE: Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.
Posted: 11 Mar 2016 | Published: 15 Mar 2016

ComputerWeekly.com

Threat Intelligence Services: An Introduction
sponsored by OpenDNS
EGUIDE: Improve your enterprise security with threat intelligence services, as presented in this e-guide, and learn what you can expect when you hire an incident response provider to handle your ongoing crisis.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

OpenDNS

Measuring the Business Benefits of Unified Communications
sponsored by Dimension Data
EGUIDE: This guide discusses the waning enthusiasm for UC, but more importantly, how IT can rethink the business benefits and the best ways to manage UC services in order to increase adoption and enthusiasm.
Posted: 02 Mar 2016 | Published: 25 Feb 2016

Dimension Data

Top UC Trends Impacting 2016
sponsored by Dimension Data
EGUIDE: This guide discusses the top 5 unified communications (UC) trends to watch in 2016. UC has undoubtedly entered the mainstream, but knowing the shape that deployments will take moving forward will lead to competitive advantage.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

Dimension Data

Apply New Nagios Plugins and Network Alerts
sponsored by BigPanda
EGUIDE: This guide discusses how to create different configurations of Nagios that will send notifications to different administrators at various times during the day. It shows in detail how to make the actual changes to the configuration that you'll need to make.
Posted: 26 Feb 2016 | Published: 25 Feb 2016

BigPanda

Analyze Bigger Data with Summarized Input
sponsored by Prelert
RESOURCE: This detailed blog post describes how an API engine for anomaly detection can achieve high performance with summarized input. Read on to find examples of how to write job configurations to send pre-summarized data to this API.
Posted: 25 Feb 2016 | Published: 17 Mar 2015

Prelert

Bringing Alert Management to the Present with Advanced Analytics
sponsored by Prelert
RESOURCE: This brief blog post explains how advanced machine learning analytics can filter out the background noise to identify and prioritize anomalies. Learn how this advanced analytics approach can empower you to identify problems before they impact the user experience.
Posted: 25 Feb 2016 | Published: 12 May 2015

Prelert
301 - 325 of 1934 Matches Previous Page    11 12 13 14 15 16    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement