=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management April 21, 2004 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSORS: FREE WHITE PAPER: Attain secure AND scalable KVM http://searchNetworking.com/r/0,,27809,00.htm?track=NL-314&ad=481012&raritan
Free Trial Offer: Better performance, response time and control with TScale http://searchNetworking.com/r/0,,27808,00.htm?track=NL-314&ad=481012&rtosoftware =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents 1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: What is change management? - 10 data protection recommendations - When do you escalate alerts? 2. ESSENTIAL LINKS - Featured Topic: Secure your Cisco network - Chapter of the Week: DWDM Network Designs - Tools for your staff: Guide to network administration - Article: Are mobile devices opening the network perimeter? ___________________________________________________________________ **********************>> Sponsored by Raritan <<******************* Is your KVM solution scalable AND secure? What's the best approach to remote server management? How do you balance scalability with security issues? Today's leading-edge KVM solutions provide levels of capability and security that were previously unattainable. http://searchNetworking.com/r/0,,27809,00.htm?track=NL-314&ad=481012&raritan ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP WHAT IS CHANGE MANAGEMENT? Don Jones Is change management a process or a tool? Or might it be a bit harder to define? Change management can be many things, as this tip excerpted from The Definitive Guide to Enterprise Network Configuration and Change Management by Don Jones points out, but ultimately it is a process. And this process can usually benefit from some industry best practices. This article explains change management and provides a list of eight best practices to apply to your change management process. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci959935,00.html?track=NL-314&ad=481012 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 10 DATA PROTECTION RECOMMENDATIONS | Laura Sanders Laura Sanders, vice president of storage management products from IBM Tivoli offers these recommendations to boost your data protection schema. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci888470,00.html?track=NL-314&ad=481012 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= WHEN DO YOU ESCALATE ALERTS? | Barrie Sosinsky Anyone who has ever studied or analyzed event logs knows that a single fault can generate many, many events. It's not uncommon for a wrong setting to fill an event log quickly, which by itself can cause problems if there isn't an administrator nearby or on call to attend to the problem at hand. The trouble is that many events don't really require immediate resolution, while others do. Therefore, it is good practice to define and implement a set of policies for alert notification and action, and then escalation when the action doesn't resolve the problem in the intended time. Read the entire tip here: http://www.searchNetworking.com/tip/1,289483,sid7_gci901765,00.html?track=NL-314&ad=481012 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ *******************>> Sponsored by RTO Software <<***************** Free Trial Offer: Better performance, response time and control with TScale Are your terminal servers operating at peak performance? Or do users suffer from system sluggishness and poor response time due to CPU spikes, runaway (rogue) applications and un-optimized applications? Gain control with TScale for better response times and increased capacity! Click here for your free 30-day trial! http://searchNetworking.com/r/0,,27808,00.htm?track=NL-314&ad=481012&rtosoftware ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SECURE YOUR CISCO NETWORK | Featured Topic Don't let the recent rash of Cisco security vulnerabilities leave you in a cold sweat. Stay on top of the latest flaws and their fixes here. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci959866,00.html?track=NL-314&ad=481012 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= DWDM NETWORK DESIGNS AND ENGINEERING SOLUTIONS | Chapter of the Week A network planner needs to optimize the various electrical and optical parameters to ensure smooth operations of a wavelength division multiplexing (WDM) network. Whether the network topology is that of a point-to-point link, a ring, or a mesh, system design inherently can be considered to be of two separate parts: optical system design and electrical or higherlayer system design. To the networking world, the optical layer (WDM layer) appears as a barren physical layer whose function is to transport raw bits at a high bit rate with negligible loss. Most conventional network layer planners do not care about the heuristics of the optical layer. This chapter explores some of the design constraints involved in the WDM network design. Click here to download WDM Network Design, Chapter 4: http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci957739,00.html?track=NL-314&ad=481012 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= GUIDE TO NETWORK ADMINISTRATION | Pass this on to your staff This guide brings your administrators back to basics, providing a good, solid background in the underlying, most important aspects of network administration. To find out what those important aspects are, we polled our readers. They told us that six topics -- network configuration, security, documentation, documentation, e-mail, network monitoring, and backup -- are at the heart of what they do on a daily basis. Our guide outlines those topics and offers our best information in each area. So whether your staff needs a quick refresher or if they're new to network administration, have them browse through our guide: http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci958513,00.html?track=NL-314&ad=481012 We promise it will be time well spent. Once they've built a solid foundation and mastered the basics, they'll be ready to take on whatever comes their way in the wild world of network administration. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ARE MOBILE DEVICES OPENING THE NETWORK PERIMETER? | Article A Burton Group report suggests that enterprise networks -- and the data they safeguard -- may be at risk because of unsecured mobile devices. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci960355,00.html?track=NL-314&ad=481012 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314&ad=481012 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Go to unsubscribe: http://SearchTechTarget.com/u?cid=481012&lid=522392&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: TechTarget Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494