=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management Dec. 17, 2003 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: Download Free APC WHITE PAPER http://searchNetworking.com/r/0,,22644,00.htm?track=NL-314&apc ___________________________________________________________________ IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: Bandwidth management solutions - Working with log files - Statistical monitoring vs. real-time performance 2. ESSENTIAL LINKS - Festive Season: Speak geek and win a holiday gift - Networking Column: Show your IT worth - Fast reference to Cisco - Chapter of the Week: 802.11 Security - Attacks and risks ___________________________________________________________________ **********************>> Sponsored by APC <<*********************** Download Free APC WHITE PAPER: Determining Total Cost of Ownership for Data Center Infrastructure. The paper will show an improved method for measuring the Total Cost of Ownership of data center infrastructure. The largest cost driver is shown to be unnecessary unabsorbed costs resulting from the oversizing of the infrastructure. http://searchNetworking.com/r/0,,22644,00.htm?track=NL-314&apc =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP Bandwidth management solutions by Barrie Sosinsky Bandwidth has become more available from a cost perspective, but there are still limits. An organization with an adequate amount of bandwidth can see unexpected drains due to unsanctioned (peer-to-peer file sharing) and sanctioned (online video meetings) network usage. In an effort to control access to limited network resources you may want to consider adopting a bandwidth management or network provisioning approach. Read more about bandwidth management here: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci941411,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= WORKING WITH LOG FILES | by Barrie Sosinsky System logging is a very important management function. The information in log files provides statistics for checking security and network access, insight into system performance and failures, and a measure of your system's behavior and baseline. All Unix implementations provide logging functions, and some logs need to be explicitly turned on to work. As a general rule you should enable detailed logging and if possible use a central loghost. That is, while still running local logs it is important to have all messages mirrored to a central location. You should keep not only system logs, but if you are running important network applications, logs for those applications as well. Read the entire tip here: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci918712,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= STATISTICAL MONITORING VS. REAL-TIME PERFORMANCE | Loki Jorgensen When it comes to network management, we all know by now that we need to have information about what the network is doing. There are network management products that give you visibility into the network. Some give you real-time info: What the network's doing right now. Some take another approach: Statistical info that tells you what the network has done in the past. Which approach is right for you? In this tip, Dr. Loki Jorgensen, site expert for SearchNetworking.com, says you really need both. Read the entire tip here, to find out why: http://www.searchNetworking.com/tip/1,289483,sid7_gci925773,00.html?track=NL-314 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FESTIVE SEASON: SPEAK GEEK AND WIN A GIFT | SearchNetworking.com 'Tis the season! We've made a list and checked it twice. Now we're gonna find out who's naughty, who's nice... and who's a really holiday-oriented geek! Okay, maybe it doesn't rhyme, but we never claimed to be poets. Here's a tasty sampler of IT terms with tantalizing clues. This week, we have a special gift for a lucky reader -- a copy of Cisco's IP Routing simulator (special thanks to Cisco Systems). The first 100 readers to e-mail us will have their name entered in our random drawing. (Contest winner will be announced on Tuesday, Dec. 23, 2003) Are you a holiday-oriented geek? Let's find out: http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci941246,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NETWORKING COLUMN BY CARRIE HIGBIE | SearchNetworking.com SHOW YOUR IT WORTH It's easy to determine how much IT costs a company or an individual business unit. All you have to do is add up all of the IT costs including salaries, training, equipment, leases, and other expenditures. But a much harder equation to determine is what IT is worth. The perfect IT department would be invisible, intangible, and taken for granted. The real value of IT is in assuring that a company has full accessibility to their data and applications without delays and downtime. This column shows you how you can determine "real" IT value and worth: http://www.searchNetworking.com/tip/1,289483,sid7_gci941332,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FAST REFERENCE TO CISCO RESOURCES | SearchNetworking.com With this Fast Reference to Cisco, you can quickly find links to the most sought-after content from the Cisco.com Web site. This reference is indexed by technology and each section contains information relevant to that particular technology area. We've also included information on Cisco certifications, Cisco product security advisories and notices, and end of product life notifications. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci940222,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= CHAPTER OF THE WEEK | SearchNetworking.com 802.11 SECURITY: ATTACKS AND RISKS 802.11 networks have unique vulnerabilities that make them an ideal avenue of attack. They cannot be physically secured the same way a wired network can be, and an attack can take place anywhere: from the next office, the parking lot of your building, across the street in the park, or a bluff many miles away. Understanding the details of various attacks against your wireless infrastructure is critical to determining how to defend yourself. This chapter download will help you identify the risks involved so that you can make informed decisions and have a better chance at protecting yourself, your assets, and your users. (This excerpt is reprinted with permission from O'Reilly & Associates, Inc. copyright 2003. All rights reserved.) Download the chapter: http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com?track=NL-314 Copyright 2003 TechTarget. All rights reserved. ____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Reply to this e-mail with REMOVE in the Subject line - OR - Go to unsubscribe: http://SearchTechTarget.com/u?cid=473901&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.