=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
Dec. 10, 2003
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
SearchNetworking.com Career Center 
http://searchNetworking.com/r/0,,18808,00.htm?track=NL-314
___________________________________________________________________
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: Log monitoring with swatch 
   - Don't patch that cable 
   - Institute packet shaping

2. ESSENTIAL LINKS
   - Poll: Do the terms "master" & "slave" on equipment offend you?
   - Networking Column: Security - Managing the unmanageable
   - Chapter of the Week: Network Device Security
   - Maximize uptime, protect your ROI and learn what downtime costs
___________________________________________________________________ 
*******>> Sponsored by SearchNetworking.com Career Center <<******* 

Searching for career resources? Visit the recently launched
SearchNetworking.com Career Center powered by Dice and find training,
certification and resume resources along with over 27,000 IT job
openings to search through. Get e-mails when a listing matches your
search criteria, have your profile automatically sent to Dice.com
member companies, access a host of career resources and tips and much
more.
http://searchNetworking.com/r/0,,18808,00.htm?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

LOG MONITORING WITH SWATCH 
Barrie Sosinsky
 
The first step in managing a network is to know exactly what the
network is doing. This usually involves the arduous task of combing
through extremely long system log files. That's where log-monitoring
tools like swatch can help.
 
Read the entire tip here: 
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci940289,00.html?track=NL-314
  
 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
DON'T PATCH THAT CABLE 
by Barrie Sosinsky
 
Network management is more than just observing the network with one
of the many network management products and then reacting when
something goes wrong. There are also proactive things you can do to
make your network run better, with less downtime. This tip discusses
one of those things. It sounds simple, but when faced with a long
troubleshooting session, often the simple things you can do are
preferable.
 
Read more:
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci916477,00.html?track=NL-314
 

You might also want to see this relevant webcast: Maximize uptime -
protect your ROI and learn what downtime costs. It's available below.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
INSTITUTE PACKET SHAPING | Barrie Sosinsky
 
Packet shaping network traffic involves setting policies for network
usage that prioritize one type of communication over another. For
example, you can assign your messaging traffic a higher priority than
your data backup traffic, and thus it will appear that your messaging
system has a higher bandwidth available to it. Packet shaping
products can be either software products or software combined with a
router or switch that monitors and classifies your network traffic.
 
Read more about packet shaping here: 
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci899465,00.html?track=NL-314
 

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
QUICK POLL | SearchNetworking.com Reader Survey

Los Angeles County recently asked technology vendors to eliminate the
terms "master" and "slave" from equipment where one device or
procedure controls another, because they may be considered offensive.
Do you think the terms are offensive?

Vote here: http://searchnetworking.techtarget.com/news?track=NL-314

This topic has hit a nerve with our members. Read the latest from
your peers on this topic in our sound off discussions:
http://discussions.techtarget.com/webx?230@@.1dcfeec1!action=postNew&setContentUrl=1 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NETWORKING COLUMN BY CARRIE HIGBIE | SearchNetworking.com

SECURITY - MANAGING THE UNMANAGEABLE
Picture yourself in a sea of consultants and technical end-users with
all of the responsibility for securing their machines, networks and
servers. Imagine files (and viruses) being brought in from customer
sites, and just think of what may be leaving your business in the way
of intellectual property and customer lists. Does the above image
have you running for the nearest beach that serves drinks with little
umbrellas?

This column by site expert Carrie Higbie provides you with an
entertaining look at network security and security policies.
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci939532,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
CHAPTER OF THE WEEK | SearchNetworking.com

NETWORK SECURITY: THE COMPLETE REFERENCE 
Chapter 10 - Network Device Security

This chapter focuses on using routers and switches to increase the
security of the network as well as providing appropriate
configuration steps for protecting the devices themselves against
attacks. Cisco routers are the dominant platform in use today, so
where examples are provided, the Cisco platform will be discussed.
This does not mean that Cisco is the only platform available -
routers and switches from leading companies, such as Juniper
Networks, Foundry Networks, and Extreme Networks, perform similar if
not identical functions. (This excerpt is reprinted with permission
by The McGraw-Hill Companies, copyright 2003. All rights reserved.) 

Download the chapter:
http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
WEBCAST PLAYBACK | SearchNetworking.com

TITLE:   Maximize uptime - protect your ROI and learn what downtime 
         costs
WHEN:    AVAILABLE 24/7
SPEAKER: Carrie Higbie, Network Applications Market Manager, The 
         Siemon Company 

With only 5% of a typical IT budget invested in infrastructure, it
can be easy for most networking professionals to skimp on
infrastructure maintenance and upgrades, but this can be a costly
mistake. According to Gartner, 71% of network downtown can be
attributed to infrastructure failure, which can lead to weakened
productivity and hundreds of thousands of dollars in lost revenue.
Join us for this exclusive webcast and listen to SearchNetworking.com
expert, Carrie Higbie, explain the essential steps you must take
today, to protect your networking investments in the future. 

This presentation includes actual audit data and cost saving measures
to assure protection of your entire IT investments. Tune in now and
learn how to perform an essential infrastructure checkup:
http://searchNetworking.com/r/0,,22042,00.htm?track=NL-314 


___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media.  http://www.techtarget.com?track=NL-314

Copyright 2003 TechTarget. All rights reserved.
____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Reply to this e-mail with REMOVE in the Subject line
 - OR -
Go to unsubscribe:
http://SearchTechTarget.com/u?cid=473403&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


Reply via email to