=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management June 30, 2004 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSORS: Free White Paper: Increase Systems Management ROI http://ttarget.adbureau.net/adclick/CID=00005aaf0000000000000000
Automate Network Troubleshooting with HP OpenView http://ttarget.adbureau.net/adclick/CID=00005ab30000000000000000 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents 1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Featured Tip: Don't underestimate physical security - Five critical planning steps for wireless LANs: Step 2 - The case for IPv6 2. ESSENTIAL LINKS - Featured Topic: Selecting network services - News: Enterprises prepare for fixed wireless broadband - July's Chapter of the Week focuses on security ___________________________________________________________________ *********************>> Sponsored by Argent <<********************* Free White Paper: Increase Systems Management ROI Can IT support new initiatives, increase productivity and maintain service levels with IT budgets expected to stay at minimum levels? The days of all-encompassing "framework" solutions are past. According to EMA, to effectively reduce cost and maximize ROI in this environment, organizations must implement low-cost systems management solutions that are fully scalable and provide rapid time-to-value. Learn more in this Free EMA White Paper from Argent http://ttarget.adbureau.net/adclick/CID=00005aaf0000000000000000 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP DON'T UNDERESTIMATE PHYSICAL SECURITY Carrie Higbie There are several approaches to securing an enterprise network. Vulnerability management, risk management, survivability and accountability or chain-of-responsibility all play key roles both having two key components -- internal and external risk. Read about some of the more overlooked aspects of physical security: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci990704,00.html?track=NL-314&ad=486085 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FIVE CRITICAL PLANNING STEPS FOR WIRELESS LANS | Michael Finneran Step 2: Moving to 802.11a Join us for the second in our series that identifies five of the major developments in wireless LANs and offers guidelines for product and technology selection. We'll help you avoid potential pitfalls to ensure that your wireless LAN implementation is successful. Part two covers 802.11a and its ability to mitigate problems of interference caused by too many devices using the same radio channels. http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci990219,00.html?track=NL-314&ad=486085 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= THE CASE FOR IPv6 | Silvia Hagen This four-part series provides an overview of the advanced technical features that IPv6 offers. Part one discusses how IPv6 will grow into our networks, what transition mechanisms are available and some misconceptions circulating about IPv6. Part two explains how the IPv6 Task Forces are organized and provides an overview of the market today and how to plan for tomorrow. The third part takes a look at IPv6 around the world and, finally, part four discusses how IPv6 impacts your business and how and when to invest in IPv6. Part 1: Introduction http://www.searchNetworking.com/tip/1,289483,sid7_gci989895,00.html?track=NL-314&ad=486085 Part 2: Technological advantages of IPv6 http://www.searchNetworking.com/tip/1,289483,sid7_gci989898,00.html?track=NL-314&ad=486085 Part 3: IPv6 in the world http://www.searchNetworking.com/tip/1,289483,sid7_gci990082,00.html?track=NL-314&ad=486085 Part 4: Is there a business case? http://www.searchNetworking.com/tip/1,289483,sid7_gci990084,00.html?track=NL-314&ad=486085 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ ***********************>> Sponsored by HP <<*********************** IT system & network managers can now easily diagnose the root cause of network downtime or bottlenecks by quickly identifying where the problem occurs. HP OpenView solutions speed the resolution process & increase productivity of IT staff. Click the link for the Route Analytics white paper from EMA. http://ttarget.adbureau.net/adclick/CID=00005ab30000000000000000 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SELECTING NETWORK SERVICES | Featured Topic Dealing with service providers can be challenging. How do you wade though the myriad of offerings and make sure you get the most bandwidth for your buck? From plain old Internet access to VPNs, VoIP and managed security services, our resources can help. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci989803,00.html?track=NL-314&ad=486085 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ENTERPRISES PREPARE FOR FIXED WIRELESS BROADBAND | News Exclusive Emerging fixed wireless services are getting faster and cheaper, providing some businesses with a new alternative to T1 lines. Experts say once WiMax-based products emerge next year, the market will grow by leaps and bounds. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci990373,00.html?track=NL-314&ad=486085 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NETWORK SECURITY ARCHITECTURES | Chapter of the Week Sneak peek! Each week this month we'll feature a new book excerpt on network security. Our first chapter for July is chapter six from 'Network Security Architectures' written by Sean Convery and published by Cisco Press. This chapter covers physical security issues, Layer 2 security considerations, routing considerations and IP addressing, ICMP, transport protocol, and DoS design considerations. Download it today! http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci990656,00.html?track=NL-314&ad=486085 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314&ad=486085 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Go to unsubscribe: http://SearchTechTarget.com/u?cid=486085&lid=522392&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: TechTarget Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494