=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
June 2, 2004
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSORS:
Free White Paper: Application & Network Performance 
http://ttarget.adbureau.net/adclick/CID=000052140000000000000000

Automate Network Troubleshooting with HP OpenView
http://ttarget.adbureau.net/adclick/CID=000052150000000000000000 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Featured Tip: Naming conventions
   - Forensic analysis, the CSI of security
   - Cool Internet utilities

2. ESSENTIAL LINKS
   - Crash Course: SSL VPNs
   - Call quality issues hamper VoWi-Fi
   - Sprint: Success hinges on converged network
   - Chapter of the Week: Troubleshooting Virtual Private Networks
___________________________________________________________________ 
******************>> Sponsored by Shunra Software <<***************

Free White Paper: Application & Network Performance 
 
Will your applications work for remote end-users? Learn how to detect
and avoid network-related problems in distributed applications, using
a virtual environment, before deployment. Download your copy of "The
Network Matrix" White Paper here:
http://ttarget.adbureau.net/adclick/CID=000052140000000000000000
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

NAMING CONVENTIONS
Barrie Sosinsky
 
One of the fun parts of having a network is being able to name all of
the computers and devices that populate your surroundings. Although
it's fun, it is also one of those issues that can be vexing and a
source of contention. Your goal in naming your systems is to have a
user be able to differentiate one type of device from another, and
also to be able to locate that device. Before the extensive use of
directory services, it was important that the name convey a sense not
only of what the device was, but where it was and, perhaps, who
administered that device. So you might see names like W2KEECHI32
indicating that this was a Windows 2000 Enterprise server number 32
in the Chicago office. But you can get more creative than that, as
long as you follow some basic rules.
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci968019,00.html?track=NL-314&ad=484042

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FORENSIC ANALYSIS, THE CSI OF SECURITY | Bryan Sartin
 
Thousands of IT administrators struggle day in and day out to ensure
the safety and security of customer data, confidential employee
information and irreplaceable company assets. It's a significant job
even in the smallest companies with threats changing constantly and
systems continuing to become more complex. Truth is, even with
considerable advanced planning and extensive preparation, a security
breach may still occur. And the concept of damage control is no
longer enough. In addition to rapidly rectifying a problem,
administrators need to know how and why something happened and take
corrective action so that it doesn't happen again. 
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci967570,00.html?track=NL-314&ad=484042

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 
COOL INTERNET UTILITIES | Tom Lancaster

Often times, what appears to be internal network congestion is really
just an overall Internet issue. When this happens, there are a few
sites that you can consult to investigate the problem. In this tip, I
want to let you know about a couple of my favorite troubleshooting
sites.  I think these are occasionally very useful for network
administrators.
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci966407,00.html?track=NL-314&ad=484042
 

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
********************>> Sponsored by HP OpenView <<*****************

Automate Network Troubleshooting with HP OpenView

IT system & network managers can now easily diagnose the root cause
of network downtime or bottlenecks by quickly identifying where the
problem occurs. HP OpenView solutions speed the resolution process &
increase productivity of IT staff. Click the link for the Route
Analytics white paper from EMA. 
 http://ttarget.adbureau.net/adclick/CID=000052150000000000000000   
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
CRASH COURSE: SSL VPNs | Featured Topic

A growing number of companies see SSL VPNs as a simpler, cheaper way
to give mobile workers remote access to corporate data. Find out if
one is right for your network.
http://searchnetworking.techtarget.com/featuredTopics/0,290043,sid7,00.html?track=NL-314&ad=484042

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
CALL QUALITY ISSUES HAMPER VOWI-FI | | News Exclusive

A Burton Group analyst says without the proper quality of service
measures, voice over Wi-Fi traffic is forced to fight for bandwidth,
resulting in poor call quality.
http://searchnetworking.techtarget.com/qna/0,289202,sid7_gci967694,00.html?track=NL-314&ad=484042

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SPRINT: SUCCESS HINGES ON CONVERGED NETWORK | News Exclusive

A top Sprint executive says the company is combining its various
networks in order to offer users a consistent experience, regardless
of where they are or how they connect.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci967331,00.html?track=NL-314&ad=484042

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TROUBLESHOOTING VIRTUAL PRIVATE NETWORKS| Chapter of the Week

MPLS VPNs are relatively complex, but by adopting an end-to-end,
step-by-step approach, troubleshooting can be relatively fast and
efficient. This chapter focuses on the process of troubleshooting
MPLS VPNs and breaks troubleshooting down into two basic elements:
troubleshooting route advertisement between the customer sites, and
troubleshooting the LSP across the provider backbone.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci967526,00.html?track=NL-314&ad=484042

___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314&ad=484042

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by TechTarget, the most targeted IT
media and events company. TechTarget offers magazines, Web sites,
e-newsletters, Webcasts and conferences for enterprise IT
professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Go to unsubscribe: http://SearchTechTarget.com/u?cid=484042&lid=522392&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to