Network management system

Results: 4227



#Item
471Computing / Router / System software / Software / Network management / Networking hardware / Server appliance

AireNMS™ Network Monitoring Service Have your network proactively

Add to Reading List

Source URL: www.airespring.com

Language: English - Date: 2014-11-17 13:39:08
472Network management / Pandora FMS / Pandora Radio / Pandora / Cloud computing / Fictional universe of Avatar / Avatar / Film / Software / Computing

PANDORA FMS CASE STUDY “We needed a monitoring system that enabled us to guarantee the levels of services we pledged to our clients for our cloud platforms. We had to be able to implement it using limited resources to

Add to Reading List

Source URL: pandorafms.com

Language: English - Date: 2014-03-03 04:49:16
473Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

Add to Reading List

Source URL: it.akamai.com

Language: English - Date: 2013-10-01 04:06:01
474Computing / Nagios / Network management / Installation / Check MK / System software / Software / Multi-agent systems

Nagios XI – Manual Installation Instructions The Industry Standard in IT Infrastructure Monitoring Purpose This document is intended to outline the steps required to manually install Nagios XI, along with its prerequis

Add to Reading List

Source URL: www.equestind.com

Language: English - Date: 2013-10-04 07:49:17
475Computer security / Computer network security / Crime prevention / Identity management / Internet privacy / Access control / Security clearance / Malware / Duty of confidentiality / Security / National security / Law

SYSTEM AUTHORIZATION ACCESS REQUEST NAVY (SAAR-N) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law, the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and

Add to Reading List

Source URL: www.nps.edu

Language: English - Date: 2013-06-21 18:20:43
476Computer file formats / Standard Occupational Classification System / Delimiter-separated values / Delimiter / Management / Human resource management / Occupational Information Network / Computing

Lay Titles February 2007 Introduction The Lay Titles file provides a list of alternate occupational titles that are linked to the SOC and O*NET-SOC classification systems. The file was developed to improve keyword search

Add to Reading List

Source URL: webdata.xwalkcenter.org

Language: English - Date: 2007-02-13 20:43:42
477Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2013-10-01 04:06:01
478Network management / Software / Nagios / Check MK / Multi-agent systems / System software / Computing

Nagios XI - Hardware Requirements The Industry Standard in IT Infrastructure Monitoring Overview This document is intended to provide general guidelines on the hardware requirements needed to run Nagios XI. As each IT in

Add to Reading List

Source URL: www.equestind.com

Language: English - Date: 2013-10-04 07:49:17
479Computer network security / Directory services / Federated identity / Single sign-on / Integrated Windows Authentication / Kerberos / Active Directory / Unix / Pluggable authentication module / Software / System software / Computing

DATASHEET Authentication Services Compliance | Single Sign-on | Simplifying Identity Management Quest Authentication Services provides enterprise-wide access, authentication and authorization for Unix, Linux, and Mac sy

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:21:17
480Software / Computing / PRTG Network Monitor / Paessler Router Traffic Grapher / Paessler / Mobile apps / Android / IOS / Network monitoring / Smartphones / Network management / System software

Updated Mobile Apps Offer Host of New Features for Monitoring-on-the-Go: Company Also Unveils PRTG Mobile Probe for Android to Measure Mobile Network Performance Austin, Texas and Nuremberg, Germany (February 18, 2014) -

Add to Reading List

Source URL: assets.paessler.com

Language: English - Date: 2015-05-26 04:10:03
UPDATE