Monitoring White Papers

Network Monitoring describes the use of a system that constantly monitors a computer network for slow or failing systems and that notifies the network administrator in case of outages via email, pager or other alarms. It is a subset of the functions involved in network management.
Results 1 - 25 of 152Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 15, 2015

IBM WebSphere Portal software helps bank offer a clearly differentiated digital experience.

Tags : ibm, portal, customer experience, web experience, sales, monitoring, quality of service, customer interaction service
    
By: Server Technology     Published Date: Mar 02, 2015

This white paper will “follow the money” and show where the power is being used within your data center facility, along with the effects of changes like increasing the overall temperature within your data center.

Tags : server technology, servers, rack space, data center power, power and energy, data center costs, bandwidth management, monitoring
    
By: Riverbed     Published Date: Apr 24, 2015

Identify the right NPMD tools to detect application issues, identify root causes and perform capacity planning.

Tags : networking, api, applications, management, visualizing, best practices, monitoring, network management
    
By: Riverbed     Published Date: Apr 24, 2015

Short video describing common issues of application performance management and how steelcentral Portal can resolve them.

Tags : api, applications, monitoring, application management, communications, network management, network performance, network performance management
    
By: Riverbed     Published Date: Apr 24, 2015

A whitepaper describing application performance management and new opportunities offered by unified communications technology.

Tags : api, unified communications, applications, monitoring, application management, communications, network performance, network performance management
    
By: IBM     Published Date: Apr 15, 2015

Still wondering what all the application monitoring hype is about? Read more to find out all the reasons why you still don't need to monitor your apps, no matter what everyone else says!

Tags : applications, monitoring, ibm, analytics, business intelligence, application performance management, application integration, analytical applications
    
By: IBM     Published Date: Apr 15, 2015

Technology Adoption Analyst whitepaper by Forrester. This IBM-commissioned profile of IT operations decision-makers at enterprise companies in the US, UK and Germany evaluates IT operations analytics adoption, benefits, and challenges based on Forrester’s own market data and a custom study of the same audience.

Tags : ibm, it operations, decision makers, analytics, market analysis, monitoring, business intelligence, business metrics
    
By: CA Technologies     Published Date: Feb 09, 2015

This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.

Tags : ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services, monitoring, business activity monitoring
    
By: Mentor Graphics     Published Date: Jan 25, 2015

This case study details the application of thermal characterization test methods to four medium power IGBT modules containing two half bridges, demonstrating results showing degradation of the thermal structure in conjunction with power cycling of the components

Tags : mentor graphics, power cycling, igbt, thermal structure, monitoring, power and cooling
    
By: Cisco     Published Date: Jan 21, 2015

Jimmy Ray takes to the whiteboard to explain how MediaNet has transformed deployment and operation of video surveillance and made it more accessible.

Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
By: Cisco     Published Date: Jan 21, 2015

Cisco estimates that the Internet of Everything (IoE) — the networked connection of people, process, data, and things — will generate $19 trillion in Value at Stake for the private and public sectors combined between 2013 and 2022. More than 42 percent of this value — $8 trillion — will come from one of IoE’s chief enablers, the Internet of Things (IoT). Gain an Edge by Taking Analytics to the Edge!

Tags : cisco, iot, internet, things, business, opportunity, value, automation
    
By: Entrust     Published Date: Jan 16, 2015

Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.

Tags : entrust, malware, history, threat, concern, virus, sql, stuxnet
    
By: IBM     Published Date: Jan 14, 2015

Explore this interactive infographic to discover how IBM makes it possible to manage all of these priorities while significantly reducing storage and maintenance costs.

Tags : big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
By: Dyn     Published Date: Jan 14, 2015

Read this whitepaper and learn the 5 ways to keeping your network up and your customers happy.

Tags : infrastructure, disaster planning, data center, ttl, monitoring, redirect traffic, server health, business intelligence
    
By: Dyn     Published Date: Jan 14, 2015

A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. By overwhelming your DNS infrastructure, malicious attackers can impair your website, tarnish your company’s reputation, and impact your bottom line. So what are your company’s risks and how can you mitigate them?

Tags : mitigation, dns ddos, ddos attacks, business security, bottom line, mitigation, improve results, cloud based
    
By: Imprivata     Published Date: Nov 17, 2014

This whitepaper will tell you what you need to know when it comes to implementing electronic prescriptions for controlled substances.

Tags : imprivata, epcs, electronic prescriptions, controlled substances, solution vendors, practitioners, regulatory compliance, transmitted electronically
    
By: Lumension     Published Date: Oct 20, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: IBM     Published Date: Oct 10, 2014

Confused by all the agile advice? Relax! With Agile for Dummies by your side you’ll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.

Tags : ibm, agility, software productivity, agile teams, agile practice, faster solutions, adoption mistakes, dummies
    
By: VSS Monitoring     Published Date: Aug 01, 2014

Learn how to leverage a big data model in the network monitoring domain and see how IT is shifting away from the long-term viability of the existing network monitoring model.

Tags : networking, big data, network monitoring, optimization, data center, monitoring
    
By: Dell Software     Published Date: May 05, 2014

In this research survey, EMA analysts set out to identify and quantify the factors impacting IT organizations as companies increasingly embrace the Cloud.

Tags : dell, dell software, dell foglight, apm, application performance, hybrid cloud, cloud computing, data center
    
By: IBM     Published Date: Mar 20, 2014

Application downtime is just one of many costs associated with a fragmented application performance management (APM) strategy. Learn the 5 steps to simplify Application Performance Management through this infographic.

Tags : ibm, apm, application services, data center, application downtime, business implications, visibility, infrastructure
    
By: nettime solutions     Published Date: Mar 04, 2014

This whitepaper covers the best practices, methods and standards for time off accruals that are affecting PTO policies and will explain how a customizable, automated time and attendance platform can provide workforce analytics and labor management solutions.

Tags : nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform
    
By: IBM     Published Date: Feb 27, 2014

Why should we bother automating deployments in the first place? What should the scope of the automation effort be? How do we get started? This white paper provides a solid introduction to these topics.

Tags : ibm, ibm software, deployment automation, manual deployments, automation, change management, automated solution, automated investments
    
By: Lumension     Published Date: Feb 07, 2014

Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.

Tags : lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
    
By: IBM     Published Date: Jan 02, 2014

Many organizations and agencies would like to improve their debt collection. They are aware that advanced analytics can help them optimize collections to drive down company debt and collection expenditures. However, they perceive that advanced analytics requires massive infrastructure changes, expensive software licenses, analytics expertise, long lead times and major upfront capital expenses.

Tags : ibm, analytic answers, prioritized collections, collection agencies, debt collection, constrained budgets, constrained resources, the cloud
    
Start   Previous   1 2 3 4 5 6 7    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.