Thursday, July 21, 2005

E-mail hell


NETWORK WORLD NEWSLETTER: MIKE KARP ON STORAGE IN THE ENTERPRISE
07/21/05
Today's focus: E-mail hell

Dear networking.world@gmail.com,

In this issue:

* When your users hoard their e-mails
* Links related to Storage in the Enterprise
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Avocent
Network World Executive Guide: Security Evolves. Automation,
specialized 'ops centers' and more.

For network security professionals, keeping a safe distance
ahead of the worst the bad guys have to offer is a never-ending
race. This guide is designed to help with a collection of news,
analysis and product test reviews for practical how-to advice on
subjects ranging from patch management and spyware to promises
and risks of automated security services.
http://www.fattail.com/redir/redirect.asp?CID=108577
_______________________________________________________________
THE NEW DATA CENTER: SPOTLIGHT ON STORAGE

Network World's latest report takes a look at storage trends
such as virtualization, encryption and archiving. Here you will
also find seven tips for managing storage in the new data
center, how storage encryption can help ease the threat of
identity theft, why one exec believes its all about the
information and more. Click here:
http://www.fattail.com/redir/redirect.asp?CID=108426
_______________________________________________________________

Today's focus: E-mail hell

By Mike Karp

Monday morning, and it's time for round 200 in what seems to be a
never-ending battle with my e-mail administrator. Typically, it
goes something like this:

E-mail from my company e-mail admin:
"Dear Mr. Karp: You currently have 151M bytes of e-mail. This
means you have exceeded your e-mail quota of 150M bytes. Please
delete unneeded files to come into conformance with your ...."

E-mail from Mike:
"Dear E-mail Admin. Thank you for your recent note regarding the
quality of my e-mail. E-mail is a hugely important contribution
to the flow of corporate business these days, and it is good of
you to take the time to mention that I have exceeded your
expectations in this important category of corporate endeavor. I
take great pride in my writing, and it is certainly flattering
to find someone of your estimable character taking the time to
comment on my work. May you be showered with appropriate
blessings during the work-week. Kind regards, Mike"

E-mail from the admin:
"Dear Mr. Karp: You currently have 152M bytes of e-mail. This
means you have exceeded your e-mail quota of 150M bytes. Please
delete unneeded files to come into conformance with your ...."

E-mail from Mike:
"Dear E-mail Admin. Thank you for your most current missive.
Once again, your succinct prose provides both technical guidance
and the type of philosophical insight that most of us have to
pay big bucks to hear from a consultant. And all this without
having to meet you at a mountain-top ashram! I am, however,
concerned that I may be using up too much space on the system,
and have a particular worry that your latest message has put me
over the top. As a good corporate citizen, I'll try to delete
some files as soon as time allows, but right now, I have work to
do. May the beneficence of the Great System Admin shine down
upon you. Regards, Mike"

E-mail from the admin:
"Dear Mr. Karp: You currently have 153M bytes of e-mail. This
means you have exceeded your e-mail quota of 150M bytes. Please
delete unneeded files to come into conformance with your ...."

E-mail from Mike:
"Dear E-mail Admin, While I particularly enjoy your engaging
wordplay, I do wonder if both of our times might be better spent
in doing useful corporate work - me in providing consulting
insight to our clients and you perhaps by inventorying all the
1s and 0s in the corporate database or by mopping up around the
Exchange server to clean up after some of those nasty memory
leaks. Alternatively, you might look into better methods of
e-mail management that a number of vendors are now making
available to the public, including us! Yours with diminishing
respect, Mike."

E-mail from the admin:
"Dear Mr. Karp: You currently have 154M bytes of e-mail. This
means you have exceeded your e-mail quota of 150M bytes. Your
account has been suspended pending deletion of excess data
files. Please contact us by e-mail when you have deleted the
requisite number of files. Have a nice day."

Email from Mike: "&^$^%$%!!!"

We've become an e-mail-centric society. More accurately, we have
become an e-mail attachment-centric society. Fortunately,
several vendors really do offer some nifty tools to help us with
some of the problems. Next week we'll start looking at some of
these solutions.
_______________________________________________________________
To contact: Mike Karp

Mike Karp is senior analyst with Enterprise Management
Associates, focusing on storage, storage management and the
methodology that brings these issues into the marketplace. He
has spent more than 20 years in storage, systems management and
telecommunications. Mike can be reached via e-mail
<mailto:mkarp@enterprisemanagement.com>.
_______________________________________________________________
This newsletter is sponsored by Avocent
Network World Executive Guide: Security Evolves. Automation,
specialized 'ops centers' and more.

For network security professionals, keeping a safe distance
ahead of the worst the bad guys have to offer is a never-ending
race. This guide is designed to help with a collection of news,
analysis and product test reviews for practical how-to advice on
subjects ranging from patch management and spyware to promises
and risks of automated security services.
http://www.fattail.com/redir/redirect.asp?CID=108576
_______________________________________________________________
ARCHIVE LINKS

Archive of the Storage newsletter:
http://www.networkworld.com/newsletters/stor/index.html

Breaking storage news and analysis:
http://www.networkworld.com/topics/storage.html
_______________________________________________________________
Best practices for implementing a virtualization platform

Join IDC analyst, Dan Kusnetzky for a look at the benefits of
virtualization and how IT departments can use software to
consolidate servers, optimize software development, and enable
affordable business continuity.
http://www.fattail.com/redir/redirect.asp?CID=108494
_______________________________________________________________
FEATURED READER RESOURCE
THE NEW DATA CENTER: SPOTLIGHT ON STORAGE

This Network World report takes a look at storage trends such as
virtualization, encryption and archiving. Here you will also
find seven tips for managing storage in the new data center, how
storage encryption can help ease the threat of identity theft,
why one exec believes its all about the information and more.
Click here:
<http://www.networkworld.com/supp/2005/ndc4/>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here :
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments:

Post a Comment