=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
July 2, 2003
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
Take Advantage of the Nation's Leading Broadband Buying Service!
http://searchNetworking.com/r/0,,15833,00.htm?speedanywhere
___________________________________________________________________
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: Secure incoming connections on XP 
   - MOM: Network management, Microsoft style   
   - What's involved in risk assessment?

2. ESSENTIAL LINKS
   - Article: Preparing networks, and people, for times of trouble
   - Expert advice on network measurement/diagnostics 
   - Chapter download: Reaping value from storage networks
   - The 2003 Networking Innovator Award Program
   - Networking Decisions Conference - Make plans to attend!
___________________________________________________________________ 
****************>> Sponsored by Speed Anywhere <<******************

Take Advantage of the Nation's Leading Broadband Buying Service!

If you need a T1, a T3, a VPN, or Frame Relay, you can benefit from
our convenient One-Stop-Shop service. Speed Anywhere has helped over
15,000 businesses in their broadband buying decisions. We are
affiliated with the leading national and regional broadband
providers. Please fill-out our short form describing your needs, and
receive custom quotes from multiple providers within 12 hours! Click
here: http://searchNetworking.com/r/0,,15833,00.htm?speedanywhere

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

SECURE INCOMING CONNECTIONS ON XP 
by Barrie Sosinsky
 
There may come a time that you want to set up remote access to a
location that doesn't have a Windows 2000 or 2003 server. If that's
the case, you can use Windows XP as a Remote Access Server, accepting
incoming calls from outside clients. XP doesn't offer the same level
of security that Windows RRAS does; you can't use call-back to
authenticate a user for example. However, even simple incoming
connections can be made a little more secure by using the encryption
feature in XP's Incoming Connection Properties dialog box.
 
Read the entire tip here:
http://www.searchNetworking.com/tip/1,289483,sid7_gci912638,00.html
 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
MOM: NETWORK MANAGEMENT, MICROSOFT STYLE | Robert J. Shimonski

You've heard the buzz about managing your systems before. You know
the big names in network management like NAI, Concord, IBM, HP, CA
and their entire suites of products. What about Microsoft? The
company's SMS (Systems Management Server) offers desktop and server
management, but is far cry from a full-blown network management
system (NMS) that catches and records traps and offers a wide range
of network management utilities and services. Up until MOM, the
Microsoft Operations Manager 2000, Microsoft was clearly lacking in
this area. What does MOM do? Microsoft Operations Manager 2000 will
provide your enterprise with quite a few helpful tools to manage your
systems efficiently and effective. 

Let's look at some of the things MOM can help you accomplish:
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci823053,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
WHAT'S INVOLVED IN RISK ASSESSMENT? | Rick Cook 

Backing up so that you can recover in the event of untoward events,
be they simple hardware failure or disasters, starts with assessment.
A thorough risk assessment should point out vulnerabilities you can
fix now, possibly heading off trouble, as well as providing a
starting point for disaster recovery planning for the risks you can't
fix.

Click here to find out more about disaster recovery planning:
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci888468,00.html

-------------------------------------------------------------------
For more network and systems management tips and advice, visit the
extensive tip library on SearchNetworking.com: 
http://searchnetworking.techtarget.com/tipsIndex/0,289482,sid7_tax289202_alpD_idx0,00.html

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FEATURED ARTICLE | SearchNetworking.com

PREPARING NETWORKS, AND PEOPLE, FOR TIMES OF TROUBLE
According to experts who spoke at CeBit America 2003, network
planning and redundancy are vital in order to recover quickly from a
disaster. IT organizations must also take special steps to protect
their people.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci911058,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
EXPERT ADVICE | Network Measurement/Diagnostics

In this recent Q&A, Loki Jorgenson, research director at jaalaM
Technologies offers guidance on enterprise network monitoring
requirements:
http://searchnetworking.techtarget.com/ateQuestionNResponse/0,289625,sid7_cid537693_tax293255,00.html


Click here to learn more about Dr. Jorgenson:
http://searchnetworking.techtarget.com/ateExpertBio/0,289623,sid7_cid507001,00.html

Click here to ask your network measurement/diagnostics question:
http://searchnetworking.techtarget.com/ateQuestion/0,289624,sid7_cid507001_tax293255,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 
REAPING VALUE FROM STORAGE NETWORKS | Chapter download

The competitive business climate demands increasing data storage
capabilities ranging from availability and recovery, to capacity
management, to vendor aggregation. Multiprotocol storage networks
serve all of these requirements in the form of block-based SANs or
file-based NAS. As an enabling platform, networked storage naturally
assumes a greater role in the cost and control of the overall storage
infrastructure. This chapter excerpt from IP Storage Networking
covers the cost component of the storage networking layer by looking
at the strategic reasons to combine both defensive and offensive
measures and the value achieved by doing so across a common
networking platform.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci906158,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NETWORKING INNOVATOR AWARDS | SearchNetworking.com

Do you know someone who is an innovator in the field of networking? 
Take advantage of the opportunity to publicly acknowledge the
networking contributions of someone you know. We are currently
accepting nominations recognizing businesses that are blazing new
trails in implementing and managing enterprise networks.

This year we'll be focusing on two areas:
1) Network Trailblazer Award
2) Network Performance Pioneer Award

The deadline for nominations for the Networking Innovator Awards is
Monday, September 8, 2003.

Click here for details and to submit your nomination:
http://searchnetworking.techtarget.com/awards/0,293912,sid7,00.html

Click here to see the profiles of the 2002 award winners:
http://searchnetworking.techtarget.com/awardsPreviousWinners/0,293918,sid7,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NETWORKING DECISIONS CONFERENCE | Atlanta, GA - Nov. 5-7, 2003

FEATURED SESSION: MAKE THE RIGHT DECISION OR RISK ZERO ROI
If you have a network -- you should have an analyzer. Network
slowdowns, outages, and security breaches can cost your organization
much more than you may know. Your IT team spends precious time
tracking these faults and security lapses using a hit-and-miss
formula. Analyzers (such as X-Ray technology) provide your IT team
with valuable visibility into the network. But you have to understand
the key considerations.  In this session, Laura A. Chappell, Founder,
Sr. Protocol Analyst, Protocol Analysis Institute, will demonstrate
the capabilities of several top analyzers and guide you through her
ROI analysis to define the savings one of her top clients realized
when implementing an analysis solution so you benefit from the same
rewards at your own organization. 

Don't miss out. Register here:
http://www.networkingdecisions.com/html/registration.htm

___________________________________________________________________

For more network and systems management tips and advice, visit the
extensive tip library on SearchNetworking.com: 
http://searchnetworking.techtarget.com/tipsIndex/0,289482,sid7_tax289202_alpD_idx0,00.html
___________________________________________________________________
****************  SEARCHNETWORKING.COM CONTACTS   *****************

SUSAN FOGARTY, Site Editor ([EMAIL PROTECTED])
   >> Send your suggestions for tips and articles.
___________________________________________________________________ 

KARA GATTINE, Associate Site Editor ([EMAIL PROTECTED])
   >> Send white papers, tips and best Web link recommendations.
___________________________________________________________________ 

ERIC B. PARIZO, News Editor ([EMAIL PROTECTED])
   >> Send your product announcements and poll ideas. 
___________________________________________________________________ 

JIM RENDON, News Writer ([EMAIL PROTECTED])
   >> Send your press releases and story ideas.
___________________________________________________________________

GABRIELLE DERUSSY ([EMAIL PROTECTED])
   >> Sponsor this or any other TechTarget newsletter.


___________________________________________________________________
::::::::::::::::::::  ABOUT THIS NEWSLETTER   :::::::::::::::::::::

Published by TechTarget (http://www.techtarget.com)
 TechTarget - The Most Targeted IT Media
 Copyright 2003, All Rights Reserved.

If you no longer wish to receive this newsletter simply reply to this
message with "REMOVE" in the subject line.  Or, visit
http://searchNetworking.techtarget.com/register and adjust your
subscriptions accordingly.If you choose to unsubscribe using our
automated processing, you must send the "REMOVE" request from the
email account to which this newsletter was delivered.  Please allow
24 hours for your "REMOVE" request to be processed.

Reply via email to