=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
May 26, 2004
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
Argent - Free Systems Management ROI White Paper
http://ttarget.adbureau.net/adclick/CID=000050c20000000000000000 
  
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Featured Tip: Perimeter networks
   - Monitoring IP telephony infrastructures
   - Snapfiles

2. ESSENTIAL LINKS
   - Featured Topic: Network monitoring
   - HP's quest for proactive management 
   - Symbol CIO: Wireless isn't just a network tool
   - Chapter of the Week: 802.11 Wireless LAN fundamentals
___________________________________________________________________ 
******************>> Sponsored by Argent Software <<***************

Free White Paper: Increase Systems Management ROI

Can IT support new initiatives, increase productivity and maintain
service levels with IT budgets expected to stay at minimum levels?
The days of all-encompassing "framework" solutions are past.
According to EMA, to effectively reduce cost and maximize ROI in this
environment, organizations must implement low-cost systems management
solutions that are fully scalable and provide rapid time-to-value.
Learn more in this Free EMA White Paper from Argent:
http://ttarget.adbureau.net/adclick/CID=000050c20000000000000000 

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

PERIMETER NETWORKS
Barrie Sosinsky

A perimeter network is the network closest to a router that is not
under your control. Usually a perimeter network is the final step a
packet takes traversing one of your networks on its way to the
Internet; and conversely the first network encountered by incoming
traffic from the Internet. Most administrators create perimeter
networks in order to place their firewall in between them and the
outside world so that they can filter packet traffic. Most perimeter
networks are part of the DMZ (Demilitarized Zone) if they exist at
all. However, perimeter networks have some additional utilities that
you might want to consider when deciding where to place systems and
services.
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci966711,00.html?track=NL-314&ad=483595

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
MONITORING IP TELEPHONY INFRASTRUCTURES | Christine Washburn

The promise of IP telephony (IPT) has suddenly morphed from a
"what-if" to a "when." Organizations, including the small and midtier
markets (SMB), are looking to IPT as a means of simplifying
management while enhancing mobile connectivity. But if you're
seriously considering integrating voice and data, how do you prepare
for the transition? How do you successfully manage and measure the
migration and ongoing success of your deployment? What are the
"gotchas?" This article helps you address the management and security
requirements that enable you to exceed the Day 2 expectations of
users and senior management.
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci965060,00.html?track=NL-314&ad=483595
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 
SNAPFILES | Barrie Sosinsky

One very nice repository for freeware and shareware Web utilities is
the Web site now called Snapfiles.com, found at:
http://www.snapfiles.com (recently known as WebAttack.com). This Web
site is a repository for a variety of what they term "Internet Tools"
including pop-up blockers, spyware catchers, and the like; but it is
also useful to network system managers because it offers you some of
the better shareware tools for network diagnostics and management.

Check out a sampling of some of these tools here:
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci944302,00.html?track=NL-314&ad=483595
 

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NETWORK MONITORING| Featured Topic

Keeping a close eye on your network performance and throughput is
critical. But as network grows and becomes more complicated,
monitoring it becomes all the more complex. Here's some help.
http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci965341,00.html?track=NL-314&ad=483595

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
HP'S QUEST FOR PROACTIVE MANAGEMENT | News Exclusive

An industry analyst says that HP's new Adaptive Management strategy
seeks to make IT infrastructure monitoring more proactive, but the
technology can be challenging to learn and take years to implement.
http://searchnetworking.techtarget.com/qna/0,289202,sid7_gci966583,00.html?track=NL-314&ad=483595
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SYMBOL CIO: WIRELESS ISN'T JUST A NETWORK TOOL | News Exclusive

Symbol Technologies' CIO explains why a successful mobile technology
strategy should focus on enabling mobile applications, not simply
extending the network.
http://searchnetworking.techtarget.com/qna/0,289202,sid7_gci966568,00.html?track=NL-314&ad=483595
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
802.11 WIRELESS LAN FUNDAMENTALS | Chapter of the Week

Mobility is the quality of being capable of movement or moving
readily from place to place. 802.11 WLAN devices provide this kind of
untethered freedom. But there's more to mobility than the lack of a
network cable. Understanding how mobility is implemented in 802.11
arms you with the knowledge you need to support or facilitate mobile
applications. This chapter specifically covers the characteristics of
roaming, Layer 2 roaming, Layer 3 roaming and an introduction to
mobile IP.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci962097,00.html?track=NL-314&ad=483595
 

___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314&ad=483595

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by TechTarget, the most targeted IT
media and events company. TechTarget offers magazines, Web sites,
e-newsletters, Webcasts and conferences for enterprise IT
professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Go to unsubscribe: http://SearchTechTarget.com/u?cid=483595&lid=522392&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to