Title: TechTarget
a weekly newsletter fromTechTarget
searchWin2000This Week
June 03, 2002>> Receive this email as text  >> About this e-mail 
 In this Issue

>> From the Editor: Pushing the envelope of Windows-centric computing
>> Featured Topic: Close users Window of opportunity to muck up the OS
>> Featured Expert: Scott Blake, security strategist
>> Site Highlights:
  • Live Expert Webcast: .NET and XML Web services: Issues for admins
  • Live Expert Webcast: Keeping Johnny out of the Command Line
  • Get 10% off .NET training

  •  From the Editor:

    by Jan Stafford
    Site Editor, SearchWindowsManageabilty

    Like detectives, our editors are constantly on the trail of innovative Windows implementations. Our snooping has resulted in a dossier of in-depth reports on Windows projects, all told from the user's perspective.

    We recently uncovered two Windows projects that really pushed the envelope in the deployment of Windows-centric computing. In fact, TechTarget gave them this year's SearchWin2000's Windows Innovators Awards. These IT innovators -- Louisiana Department of Health and Hospitals and Wake Forest University Baptist Medical Center -- won this year's awards for scalability and manageability, respectively.

    Find out how they increased performance and reduced costs with their innovative projects. Then, tell us about your latest Windows deployment by writing to the editor.


     Featured Topic:

    Reining in Users
    by Marilyn Cohodas
    Site Editor, SearchWin2000

    What network hasn't suffered because an individual downloaded a game that turned out to be a Trojan horse? Check out the security resources in this week's featured topic and learn how to close the Window of opportunity to users who just can't resist adjusting some Control Panel switch or poking around in the registry.

    Read more about this topic

     Expert Technical Advice:

    Featured Expert Scott Blake
    Director of Security Strategy, BindView Corp.

    Categories: Security
    Blake has designed perimeter security, network security architectures and security policies for several large companies including leaders in financial services, telecommunications, large hospitals and universities.
    View all Scott's answers

    Exclusives
    >> Oops! True IT blooper #34: It's a bad thing A network technician gets an itchy trigger finger. The result is a network as full of holes as the OK Corral.
    >> Lotus Sametime saves law firm much time David Beckman was sick of having unwilling and unwanted office eavesdroppers. So he went on the prowl for a tool to make communication more instant, efficient ... and quiet!

    Tip of the Week:
    Let's call this the anti-tip: What not to do with Group Policy Objects.
    >> Oops! True IT blooper #35: What About Bob?

     Site Highlights

    Live Expert Webcast
    Date: Tuesday, June 4, at 1:00 PM EDT

    .NET and XML Web services: Issues for the Windows admin
    Learn from Bugslayer columnist John Robbins how .NET will bring peace between network admins and developers, what exactly a .NET app is, and the future of XML Web services.
    Sponsored By: VERITAS

    Live Expert Webcast
    Date: Thursday, June 6, at 2:00 EDT

    Keeping Johnny out of the Command Line
    Security maven Roberta Bragg tells how users can access system resources thru admin, reg editing and hacker tools, and offers a simple prevention strategy.
    Sponsored By: VeriSign
    Get 10% off .NET training!
    Course Title: Introducing .NET
    Take advantage of our discounted training and receive a clear understanding of .NET, its origin, architecture, applicability, and its probable impact on the development world. See .NET in action via functional examples and code. Most importantly, visualize .NET possibilities for your own development efforts. Get your discounted CDROM now.


    When's it coming?
    It's a bird, it's a plane -- it's Microsoft's .NET. In this Win2000Talk segment, we go behind the hype and get the real scoop from leading industry reporters and columnists.
    Tune in now


    IT Blooper Contest
    Submit yours biggest bloopers for the chance to win one of three sets of Motorola T6220 2-way radios (a $450 value).
    Enter today

    Security Report 2002
    How has IT security changed since September 11? Complete our new SearchSecurity Survey and be on the lookout for a comprehensive state-of-the-industry report.
    Thank you



    A B O U T   T H I S   N E W S L E T T E R
    Created by TechTarget
    TechTarget - The Most Targeted IT Media
    Copyright 2002, All Rights Reserved.

    To unsubscribe from Updates on new site content:

    >> Simply Reply to this Email with REMOVE within the Body or Subject
    -OR-
    >> Go to: http://searchWin2000.techtarget.com/register
       - Log in to edit your profile.
       - Click on the link to Edit email subscriptions.
       - Uncheck the box next to the newsletter you wish to unsubscribe from.
       - When finished, click "Save Changes to My Profile".

    Reply via email to