=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
April 21, 2004
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSORS:
FREE WHITE PAPER: Attain secure AND scalable KVM
http://searchNetworking.com/r/0,,27809,00.htm?track=NL-314&ad=481012&raritan

Free Trial Offer: Better performance, response time and control with
TScale
http://searchNetworking.com/r/0,,27808,00.htm?track=NL-314&ad=481012&rtosoftware

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: What is change management?
   - 10 data protection recommendations
   - When do you escalate alerts?

2. ESSENTIAL LINKS
   - Featured Topic: Secure your Cisco network
   - Chapter of the Week: DWDM Network Designs 
   - Tools for your staff: Guide to network administration
   - Article: Are mobile devices opening the network perimeter?
___________________________________________________________________ 
**********************>> Sponsored by Raritan <<*******************

Is your KVM solution scalable AND secure? 

What's the best approach to remote server management?  How do you
balance scalability with security issues?  Today's leading-edge KVM
solutions provide levels of capability and security that were
previously unattainable.
http://searchNetworking.com/r/0,,27809,00.htm?track=NL-314&ad=481012&raritan

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

WHAT IS CHANGE MANAGEMENT?
Don Jones
 
Is change management a process or a tool? Or might it be a bit harder
to define? Change management can be many things, as this tip
excerpted from The Definitive Guide to Enterprise Network
Configuration and Change Management by Don Jones points out, but
ultimately it is a process. And this process can usually benefit from
some industry best practices. This article explains change management
and provides a list of eight best practices to apply to your change
management process. 
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci959935,00.html?track=NL-314&ad=481012
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
10 DATA PROTECTION RECOMMENDATIONS | Laura Sanders

Laura Sanders, vice president of storage management products from IBM
Tivoli offers these recommendations to boost your data protection
schema.
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci888470,00.html?track=NL-314&ad=481012
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
WHEN DO YOU ESCALATE ALERTS? | Barrie Sosinsky
 
Anyone who has ever studied or analyzed event logs knows that a
single fault can generate many, many events. It's not uncommon for a
wrong setting to fill an event log quickly, which by itself can cause
problems if there isn't an administrator nearby or on call to attend
to the problem at hand. The trouble is that many events don't really
require immediate resolution, while others do. Therefore, it is good
practice to define and implement a set of policies for alert
notification and action, and then escalation when the action doesn't
resolve the problem in the intended time.
 
Read the entire tip here:
http://www.searchNetworking.com/tip/1,289483,sid7_gci901765,00.html?track=NL-314&ad=481012

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
*******************>> Sponsored by RTO Software <<*****************

Free Trial Offer: Better performance, response time and control with
TScale

Are your terminal servers operating at peak performance? Or do users
suffer from system sluggishness and poor response time due to CPU
spikes, runaway (rogue) applications and un-optimized applications?
Gain control with TScale for better response times and increased
capacity! Click here for your free 30-day trial!
http://searchNetworking.com/r/0,,27808,00.htm?track=NL-314&ad=481012&rtosoftware

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SECURE YOUR CISCO NETWORK | Featured Topic

Don't let the recent rash of Cisco security vulnerabilities leave you
in a cold sweat. Stay on top of the latest flaws and their fixes
here.
http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci959866,00.html?track=NL-314&ad=481012

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
DWDM NETWORK DESIGNS AND ENGINEERING SOLUTIONS | Chapter of the Week

A network planner needs to optimize the various electrical and
optical parameters to ensure smooth operations of a wavelength
division multiplexing (WDM) network. Whether the network topology is
that of a point-to-point link, a ring, or a mesh, system design
inherently can be considered to be of two separate parts: optical
system design and electrical or higherlayer system design. To the
networking world, the optical layer (WDM layer) appears as a barren
physical layer whose function is to transport raw bits at a high bit
rate with negligible loss. Most conventional network layer planners
do not care about the heuristics of the optical layer. This chapter
explores some of the design constraints involved in the WDM network
design.

Click here to download WDM Network Design, Chapter 4:
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci957739,00.html?track=NL-314&ad=481012
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
GUIDE TO NETWORK ADMINISTRATION | Pass this on to your staff

This guide brings your administrators back to basics, providing a
good, solid background in the underlying, most important aspects of
network administration. To find out what those important aspects are,
we polled our readers. They told us that six topics -- network
configuration, security, documentation, documentation, e-mail,
network monitoring, and backup -- are at the heart of what they do on
a daily basis. Our guide outlines those topics and offers our best
information in each area.

So whether your staff needs a quick refresher or if they're new to
network administration, have them browse through our guide:
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci958513,00.html?track=NL-314&ad=481012
 

We promise it will be time well spent. Once they've built a solid
foundation and mastered the basics, they'll be ready to take on
whatever comes their way in the wild world of network administration.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
ARE MOBILE DEVICES OPENING THE NETWORK PERIMETER? | Article

A Burton Group report suggests that enterprise networks -- and the
data they safeguard -- may be at risk because of unsecured mobile
devices.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci960355,00.html?track=NL-314&ad=481012

___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314&ad=481012

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by TechTarget, the most targeted IT
media and events company. TechTarget offers magazines, Web sites,
e-newsletters, Webcasts and conferences for enterprise IT
professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Go to unsubscribe: http://SearchTechTarget.com/u?cid=481012&lid=522392&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to