=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
August 13, 2003
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
Quick Guide to Windows Server 2003
http://searchNetworking.com/r/0,,17000,00.htm?microsoft
___________________________________________________________________
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: Working with log files 
   - Build your network utilization history
   - Enhance performance by creating a dedicated server backbone

2. ESSENTIAL LINKS
   - Network design advice from the Lippis Report
   - White paper: Dealing with network performance degradation
   - Live webcast today: Applications using the converged network
   - The 2003 Networking Innovator Award Program
___________________________________________________________________ 
******************>> Sponsored by Microsoft << ******************** 

The Quick Guide to Windows Server 2003. Get the latest information on
installation, new features and training. 
Click here: http://searchNetworking.com/r/0,,17000,00.htm?microsoft

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

WORKING WITH LOG FILES 
by Barrie Sosinsky
 
System logging is a very important management function. The
information in log files provides statistics for checking security
and network access, insight into system performance and failures, and
a measure of your system's behavior and baseline. All Unix
implementations provide logging functions, and some logs need to be
explicitly turned on to work. As a general rule you should enable
detailed logging and if possible use a central loghost. That is,
while still running local logs it is important to have all messages
mirrored to a central location. You should keep not only system logs,
but if you are running important network applications, logs for those
applications as well.
 
Read the entire tip here:
http://www.searchNetworking.com/tip/1,289483,sid7_gci918712,00.html
 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
BUILD YOUR NETWORK UTILIZATION HISTORY
by Barrie Sosinsky

Creating a historical record of network utilization is an important
tool for optimizing your applications, planning hardware and software
upgrades, and setting a baseline for many other types of future
projects.  Network monitoring and performance logging should be part
of your administrator's toolbox, but often, busy network admins don't
put these tools in place until they are absolutely required to.
 
Read more about utilization history here:
http://www.searchNetworking.com/tip/1,289483,sid7_gci894880,00.html
 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
ENHANCE PERFORMANCE BY CREATING A DEDICATED SERVER BACKBONE
by Brien M. Posey

Have you ever looked at how much overhead traffic your servers are
putting onto your network? If not, you might be surprised. Windows
servers are constantly sending things like replication traffic and
time syncs across the network. All of this traffic steals bandwidth
from your other network nodes.  One way you can combat the problem is
to create a dedicated server backbone.   

Click here to learn how:
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci886129,00.html

-------------------------------------------------------------------
For more network and systems management tips and advice, visit the
extensive tip library on SearchNetworking.com: 
http://searchnetworking.techtarget.com/tipsIndex/0,289482,sid7_tax289202_alpD_idx0,00.html

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NETWORK DESIGN ADVICE FROM THE LIPPIS REPORT | SearchNetworking.com 

We are proud to announce our partnership with Nick Lippis and Lippis
Enterprises Inc., which produces the Lippis Report and the upcoming
Enterprise Networks 2004 conference.

Nick is the author of the Lippis Report, a column written for
architects, builders and managers of enterprise networks to provide
them with insight into industry activities, developments and
technologies exclusively from the enterprise perspective. We'll be
posting each new issue of the Lippis Report on SearchNetworking so
that our readers can benefit from its advice and expertise. The
newest report, "Remote IP telephony installs drive new wide area
networking model" explains, surprisingly, how the adoption of VoIP in
small offices is creating a shift in WAN structure from the outside
in. Read the report here:
http://www.searchNetworking.com/tip/1,289483,sid7_gci918038,00.html

Hear from Nick in our exclusive interview, "The network architect:
One part designer, one part psychiatrist":
http://www.searchNetworking.com/qna/0,289202,sid7_gci918115,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
DEALING WITH NETWORK PERFORMANCE DEGRADATION
By Loki Jorgenson, Ph.D., SearchNetworking.com site expert

The challenge in troubleshooting your network is to detect
traffic-like behaviors, distinguish them from real traffic, and
determine what is reasonable and what performance degradation can be
avoided.  This white paper discusses occurrences of "normal" traffic,
and further reviews  "traffic-like" problems causing performance
degradations.  Treating each cause of performance degradation as a
unique kind of problem makes optimizing your network's performance a
near impossible task.  See how you can implement a means to identify
and resolve the causes of performance degradation that will greatly
simplify the challenging job of troubleshooting your network.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci903169,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
EXPERT ADVICE | Carrie Higbie on emerging technologies

There's always something new in networking. Carrie can help explain
developing technologies and what they mean to your network. 

Get personalized expert advice from Carrie:
http://searchnetworking.techtarget.com/ateQuestion/0,289624,sid7_tax294652,00.html

Here are some recent Q&As that Carrie addressed that you may find
interesting:
What is the long-term direction within technology? 
http://searchnetworking.techtarget.com/ateQuestionNResponse/0,289625,sid7_cid542476_tax294652,00.html

What do you think about biometric signatures?
http://searchnetworking.techtarget.com/ateQuestionNResponse/0,289625,sid7_cid542481_tax294652,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
LIVE WEBCAST | SearchNetworking.com 

TITLE:    The next phase -- Applications using the converged network
PREMIERE: TODAY, August 13, 2003 - AVAILABLE 24/7
SPEAKER:  Juanita Ellis, industry expert and author

WEBCAST DESCRIPTION: The real driving force behind converged networks
is the ability to deploy new applications that take advantage of the
converged infrastructure. In this webcast, we will discuss
applications that drive the need for converged networks in the
enterprise; specifically: contact centers/customer relationship
management (CRM), unified communications/messaging, teleworkers, SIP,
presence and intelligent agents, and IP-based public services, such
as IP network access and IP "Centrex".

Click here:
http://searchNetworking.com/r/0,,16843,00.htm 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NETWORKING INNOVATOR AWARDS | SearchNetworking.com

The Networking Innovator Awards recognize businesses that are blazing
new trails in implementing and managing enterprise networks. Winners
will be users who are deploying cutting-edge technology to deliver
constant and reliable connectivity and data access across all
segments of the enterprise. 

Nominate your team today!
http://searchnetworking.techtarget.com/awards/0,293912,sid7,00.html

Click here to see the profiles of the 2002 award winners:
http://searchnetworking.techtarget.com/awardsPreviousWinners/0,293918,sid7,00.html

===================================================================
To subscribe to "Updates on new site content" go to:
http://searchNetworking.techtarget.com/OptIn/1,290894,sid7,00.html?cid=466923&em=&tid=177&FE=1

Not a SearchNetworking.com member? We'll activate your membership
with your subscription.
===================================================================


___________________________________________________________________
****************  SEARCHNETWORKING.COM CONTACTS   *****************

SUSAN FOGARTY, Site Editor ([EMAIL PROTECTED])
   >> Send your suggestions for tips and articles.
___________________________________________________________________ 

KARA GATTINE, Associate Site Editor ([EMAIL PROTECTED])
   >> Send white papers, tips and best Web link recommendations.
___________________________________________________________________

GABRIELLE DERUSSY ([EMAIL PROTECTED])
   >> Sponsor this or any other TechTarget newsletter.


:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media. http://www.techtarget.com

Copyright 2003 TechTarget. All rights reserved.


If you no longer wish to receive this newsletter simply reply to this
message with "REMOVE" in the subject line.  Or, visit
http://searchNetworking.techtarget.com/register and adjust your
subscriptions accordingly.If you choose to unsubscribe using our
automated processing, you must send the "REMOVE" request from the
email account to which this newsletter was delivered.  Please allow
24 hours for your "REMOVE" request to be processed.

Reply via email to