Wednesday, August 31, 2005

Our top network management advice of '05

TECHTARGET: Network and Systems Management
August 31, 2005
___________________________________

ISSUE SPONSORED BY: VoIP Security Resource Guide

......................................................................
IN THIS ISSUE

-- Top 5 network management tips of '05
-- Networking giant sets site on security intelligence
-- IPv6: Should you stay or should you go?
-- Chapter download: Zen and the art of network support
-- Eradicating spyware

::::::::::::::::::::::::::::: SPONSOR :::::::::::::::::::::::::::::::

VoIP Security Resource Guide

This guide is a compilation of resources that review the importance
of VoIP security, protocols and standards, LAN security,
vulnerabilities, troubleshooting, threats and more.
Access this guide now.
http://searchenterprisevoice.techtarget.com/tip/1,289483,sid66_gci1098642,00.html?track=NL-314&ad=525572&Offer=EVsa725

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

NETWORK AND SYSTEMS MANAGEMENT TIPS
......................................................................

TOP 5 NETWORK MANAGEMENT TIPS OF '05 | SearchNetworking.com
So far this year we've published hundreds of tips to make your job
easier and your network run better. Here are the five you viewed the
most.

Tip #1: What ping doesn't tell you by Loki Jorgenson
Ping is the simplest example of a wide range of behavioral analyses
that can tell you what your network is doing. Learn how to gain
additional insight into your network.
http://searchnetworking.techtarget.com/infoCenter/tip/0,294276,sid7_gci1099738_tax300806_iid2651,00.html?track=NL-314&ad=525572

Tip #2: The nasty truth about spyware by Michael Gregg
http://searchnetworking.techtarget.com/infoCenter/tip/0,294Spyware?track=NL-314&ad=525572
can pose a huge risk to your corporate network. Here are some quick
fixes you can perform to reduce the probability of infection.
276,sid7_gci1070232_tax300949_iid2651,00.html

Tip #3: IPv6 addresses by David Jacobs
The rapid proliferation of Internet connected devices such as cell
phones and PDAs has accelerated the need for the transition to IPv6.
Don't be caught lagging; check out this primer on IPv6 addresses.
http://searchnetworking.techtarget.com/infoCenter/tip/0,294276,sid7_gci1080728_tax300805_iid2651,00.html?track=NL-314&ad=525572

Tip #4: Numbers lie: Your NIC could be killing your network
performance by Loki Jorgenson
This tip delves into the highly variable performance of NICs.
http://searchnetworking.techtarget.com/infoCenter/tip/0,294276,sid7_gci1086788_tax300806_iid2651,00.html?track=NL-314&ad=525572

Tip #5: Invisible traffic that steals bandwidth by Loki Jorgenson
Discover the sources of traffic-like behavior and take the mystery
out of "phantom traffic."
http://searchnetworking.techtarget.com/infoCenter/tip/0,294276,sid7_gci1101934_tax300806_iid2651,00.html?track=NL-314&ad=525572

ESSENTIAL LINKS
......................................................................

NETWORKING GIANT SETS SITE ON SECURITY INTELLIGENCE
In search of security information that minimizes network disruptions
and optimizes product threat mitigation? Cisco may have a site for
sore eyes.
http://searchnetworking.techtarget.com/infoCenter/originalContent/0,294292,sid7_gci1120803_iid2651,00.html?track=NL-314&ad=525572

IPV6: SHOULD YOU STAY OR SHOULD YOU GO?
IPv6, the latest level of the Internet Protocol, promises a number of
improvements over IPv4. Our resources explore the ins and outs of
IPv6, including its potential benefits and drawbacks.
http://searchnetworking.techtarget.com/infoCenter/tip/0,294276,sid7_gci1102312_tax300805_iid2651,00.html?track=NL-314&ad=525572

CHAPTER DOWNLOAD: ZEN AND THE ART OF NETWORK SUPPORT
With this chapter from the book "Mike Meyers' Network+ Guide to
Managing & Troubleshooting Networks" you'll learn how to describe
troubleshooting tools, explain the troubleshooting process and
analyze troubleshooting scenarios. (Reproduced with permission of
McGraw-Hill Professional, Two Penn Plaza, New York, NY 10121. ISBN
0072255609, Copyright 2005, The McGraw-Hill Companies.)
http://searchnetworking.techtarget.com/infoCenter/tip/0,294276,sid7_gci1076994_tax300805_iid2651,00.html?track=NL-314&ad=525572

ERADICATING SPYWARE
Spyware is evil and it's everywhere. This feature will help you
protect your network against spyware and will assist you in
eradicating it if you become infected.
http://searchnetworking.techtarget.com/infoCenter/tip/0,294276,sid7_gci1120261_tax300949_iid2651,00.html?track=NL-314&ad=525572


::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONTACT US:

Sales
For sales inquiries, please contact us at:
mailto:bmcgovern@techtarget.com

Editorial
For feedback about any of our articles or to send us your article
ideas, please contact us at:
mailto:sfogarty@techtarget.com

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

ABOUT THIS E-NEWSLETTER

This e-newsletter is published by TechTarget, the most targeted
IT media and events company. TechTarget offers magazines, Web sites,
e-newsletters, Webcasts and conferences for enterprise IT
professionals.
Copyright 2005 TechTarget. All rights reserved.

_____________________________________________________________________

To unsubscribe from "Systems Management News":

Go to unsubscribe: http://SearchTechTarget.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=525572&track=NL-314

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494