=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
Dec. 17, 2003
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
Download Free APC WHITE PAPER
http://searchNetworking.com/r/0,,22644,00.htm?track=NL-314&apc
___________________________________________________________________
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: Bandwidth management solutions 
   - Working with log files
   - Statistical monitoring vs. real-time performance

2. ESSENTIAL LINKS
   - Festive Season: Speak geek and win a holiday gift
   - Networking Column: Show your IT worth
   - Fast reference to Cisco 
   - Chapter of the Week: 802.11 Security - Attacks and risks
___________________________________________________________________ 
**********************>> Sponsored by APC <<*********************** 

Download Free APC WHITE PAPER: Determining Total Cost of Ownership
for Data Center Infrastructure.  The paper will show an improved
method for measuring the Total Cost of Ownership of data center
infrastructure. The largest cost driver is shown to be unnecessary
unabsorbed costs resulting from the oversizing of the infrastructure.
http://searchNetworking.com/r/0,,22644,00.htm?track=NL-314&apc

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

Bandwidth management solutions 
by Barrie Sosinsky

Bandwidth has become more available from a cost perspective, but
there are still limits. An organization with an adequate amount of
bandwidth can see unexpected drains due to unsanctioned (peer-to-peer
file sharing) and sanctioned (online video meetings) network usage.
In an effort to control access to limited network resources you may
want to consider adopting a bandwidth management or network
provisioning approach. 

Read more about bandwidth management here:
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci941411,00.html?track=NL-314
  
 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
WORKING WITH LOG FILES | by Barrie Sosinsky
 
System logging is a very important management function. The
information in log files provides statistics for checking security
and network access, insight into system performance and failures, and
a measure of your system's behavior and baseline. All Unix
implementations provide logging functions, and some logs need to be
explicitly turned on to work. As a general rule you should enable
detailed logging and if possible use a central loghost. That is,
while still running local logs it is important to have all messages
mirrored to a central location. You should keep not only system logs,
but if you are running important network applications, logs for those
applications as well.
 
Read the entire tip here:
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci918712,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
STATISTICAL MONITORING VS. REAL-TIME PERFORMANCE | Loki Jorgensen
 
When it comes to network management, we all know by now that we need
to have information about what the network is doing.  There are
network management products that give you visibility into the
network. Some give you real-time info: What the network's doing right
now. Some take another approach: Statistical info that tells you what
the network has done in the past. Which approach is right for you? In
this tip, Dr. Loki Jorgensen, site expert for SearchNetworking.com,
says you really need both. 
 
Read the entire tip here, to find out why:
http://www.searchNetworking.com/tip/1,289483,sid7_gci925773,00.html?track=NL-314 

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FESTIVE SEASON: SPEAK GEEK AND WIN A GIFT | SearchNetworking.com

'Tis the season! We've made a list and checked it twice. Now we're
gonna find out who's naughty, who's nice... and who's a really
holiday-oriented geek! Okay, maybe it doesn't rhyme, but we never
claimed to be poets. Here's a tasty sampler of IT terms with
tantalizing clues. This week, we have a special gift for a lucky
reader -- a copy of Cisco's IP Routing simulator (special thanks to
Cisco Systems).  The first 100 readers to e-mail us will have their
name entered in our random drawing. (Contest winner will be announced
on Tuesday, Dec. 23, 2003)

Are you a holiday-oriented geek? Let's find out:
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci941246,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NETWORKING COLUMN BY CARRIE HIGBIE | SearchNetworking.com

SHOW YOUR IT WORTH
It's easy to determine how much IT costs a company or an individual
business unit. All you have to do is add up all of the IT costs
including salaries, training, equipment, leases, and other
expenditures. But a much harder equation to determine is what IT is
worth. The perfect IT department would be invisible, intangible, and
taken for granted. The real value of IT is in assuring that a company
has full accessibility to their data and applications without delays
and downtime. 

This column shows you how you can determine "real" IT value and
worth:
http://www.searchNetworking.com/tip/1,289483,sid7_gci941332,00.html?track=NL-314 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FAST REFERENCE TO CISCO RESOURCES | SearchNetworking.com

With this Fast Reference to Cisco, you can quickly find links to the
most sought-after content from the Cisco.com Web site. This reference
is indexed by technology and each section contains information
relevant to that particular technology area. We've also included
information on Cisco certifications, Cisco product security
advisories and notices, and end of product life notifications.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci940222,00.html?track=NL-314
  

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 
CHAPTER OF THE WEEK | SearchNetworking.com

802.11 SECURITY: ATTACKS AND RISKS
802.11 networks have unique vulnerabilities that make them an ideal
avenue of attack. They cannot be physically secured the same way a
wired network can be, and an attack can take place anywhere: from the
next office, the parking lot of your building, across the street in
the park, or a bluff many miles away. Understanding the details of
various attacks against your wireless infrastructure is critical to
determining how to defend yourself. 

This chapter download will help you identify the risks involved so
that you can make informed decisions and have a better chance at
protecting yourself, your assets, and your users.  (This excerpt is
reprinted with permission from O'Reilly & Associates, Inc. copyright
2003. All rights reserved.)

Download the chapter:
http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314



___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media.  http://www.techtarget.com?track=NL-314

Copyright 2003 TechTarget. All rights reserved.
____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Reply to this e-mail with REMOVE in the Subject line
 - OR -
Go to unsubscribe:
http://SearchTechTarget.com/u?cid=473901&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


Reply via email to