Tuesday, May 08, 2007

Weekly Update: WAN, Risk management, Kernel and more...

**** NETWORKING-DECISION-MAKERS NEWSLETTER ****

Tuesday, May 08, 2007

http://networking.ITtoolbox.com

Your weekly connection to the new and most popular entries from the Networking community.

**** CONTENTS ****

Blogs: Yeah DELL, and news about my daughter (+5)
White Papers: Gartner Report: Magic Quadrant for WAN... (+4)
Groups: Connecting external monitor to notebook (+5)
Wiki: Document your Network (+9)
Jobs: Information Technology Staff Needed (+5)
Events: Best Practices for Microsoft PKI Webinar (+3)


**** SPONSOR MESSAGE: MICROSOFT ****

Compare Windows Server to Linux
Compare Windows and Linux on key platform considerations such as reliability, security, and total cost of ownership. Click here.
http://www.ITtoolbox.com/erd/15118

**** SPONSOR MESSAGE: JUNIPER NETWORKS ****

Comprehensive Network Protection
Juniper Networks threat management solutions protect the entire network against internal and external threats -- scaling from large distributed enterprises to small and medium businesses. Click here to download your free "Universal Threat Management" white paper.
http://www.ITtoolbox.com/erd/15116

**** SPONSOR MESSAGE: MICRO FOCUS ****

Demands of Service Oriented Architecture
Extend COBOL applications & support the flexibility demands of SOA. Read how COBOL transactions are transformed into business services & deployed in an SOA environment. Read More.
http://www.ITtoolbox.com/erd/15115

**** DECISION MAKER BLOGS ****
http://blogs.ittoolbox.com/

Most Popular New Blog Entry

YEAH DELL, AND NEWS ABOUT MY DAUGHTER
By cbertram68
Well I was going to write about the news of Dell installing Ubuntu on their desktops, but my friend Locutus stole my thunder. The good news on that is that if he has his way we will all be assimilated into the Linux world. My...
http://www.ittoolbox.com/da/528321

Recent Blog Entries

ON DEMAND VERSUS VIRTUALIZATION
By Xephon
You might very well think this is a strange title for a blog - after all, they seem like two completely different things. It's like saying apples versus mountain bikes! However, think about it a little deeper. Both of them are trends in computing and...
http://www.ittoolbox.com/da/528195

SECURITYMONKEY INTERVIEWED!
By Security Monkey
Chris over at numly.com has been trying to line me up for a podcast interview for a while. I finally gave in! Chris got a bit of a surprise when he dialed my number and had to go through my security system, but he...
http://www.ittoolbox.com/da/528282

16 TB PER FILESYSTEM... SIGH
By fluffhead
I never thought that 16 Terabytes (TB) would be too small. I am running up against the 16 TB raw addressable space limit on our NetApp NAS filers right now. Apparently Data OnTap and the R200 / FAS9x0 hardware, have this hardcoded limit, probably some 32...
http://www.ittoolbox.com/da/528241

HAPPENINGS
By Dru
While I fell off the face of the Internet this week, lots of stuff happened, including: DNSStuff's Resource Center launched. It includes a series of DNS basics articles I wrote for the launch as well as articles from the DNS-god himself, Cricket Liu....
http://www.ittoolbox.com/da/527619

LINUXWORLD TORONTO
By Dru
For those of you wondering if I fell off the face of the earth, I didn't. The past week has been the worst Internet access I've experienced since my 14,400 kbps modem over derelict country phone lines in the mid 1990s. It...
http://www.ittoolbox.com/da/527620

----------------------------------------------------------------------
EMERGENCY BACKUP & REBUILD TOOLS THAT MATTER
Listen as Dan Morrill, an 18-year veteran in the information security field, provides an overview of why we back up and what tools are available for emergency repairs to systems that are and are not connected to the corporate network.Download this free blogcast today!
http://www.ittoolbox.com/da/477373
----------------------------------------------------------------------


**** DECISION MAKER WHITE PAPERS ****
http://networking.ittoolbox.com/documents/white-papers/

Recent White Papers

GARTNER REPORT: MAGIC QUADRANT FOR WAN OPTIMIZATION CONTROLLERS
By Riverbed
After a rigorous analysis of the WAN Optimization controller space, Gartner Research has released its comprehensive report on the Magic Quadrant for WAN Optimization Controllers, 2006. The market for WAN optimization controllers remains dynamic, with vendors offering different feature sets. Organizations should identify their specific...
http://www.ittoolbox.com/da/528226

FIVE STEPS TO IT RISK MANAGEMENT BEST PRACTICES
By Greg Hughes
In the July issue of Risk Management Magazine, Greg Hughes, Executive Vice President of Worldwide Services and Support, writes about managing and balancing information risk and reward.
http://www.ittoolbox.com/da/469373

NEUTRAL WIRE FACTS AND MYTHOLOGY
By APC
This Technical Note discusses many common misunderstandings about the function of the neutral wire and its relation to power problems. The subjects of dedicated lines, phase reversal, isolation transformers, and grounding are addressed. Various myths are described and criticized.
http://www.ittoolbox.com/da/503413

THE PRACTICAL SIDE OF SERVER VIRTUALIZATION
By Jonathan Eunice, Illuminata, Inc.
Virtualization is not hot because the technology per se is particularly new or revolutionary, but because now that it has matured, the outcomes it enables are so desirable and so central to what IT shops need. Lower costs, increased flexibility, and reduced risk-who can...
http://www.ittoolbox.com/da/475625

NINE STEPS TO EFFECTIVE NETWORKED UNIFIED STORAGE CONSOLIDATION
By Marc Staimer, Dragon Slayer Consulting
Network storage consolidation makes it significantly easier for today's storage administrators to manage the ever-swelling amounts of storage while simplifying the data protection. To help simplify the process of networked unified storage consolidation, Marc Staimer of Dragon Slayer Consulting lays out a nine...
http://www.ittoolbox.com/da/503642

To Signup for Networking White-Paper Alerts

http://www.ittoolbox.com/da/344422

**** DECISION MAKER GROUPS ****
http://networking.ittoolbox.com/groups

Most Popular Thread

CONNECTING EXTERNAL MONITOR TO NOTEBOOK
By reply2abhi, member since 3/8/2005, Group: networkadmin-l
I have a fijitsu Laptop with a 15.4" widescreen and I am trying to connect an external HP 19" TFT monitor to it, the external HP TFT monitor is going to be used while in the office and the notebook screen otherwise...
http://www.ittoolbox.com/da/528322

Recent Threads

CISCO ASA PRIVILEGES
By mtarawal..., member since 4/19/2006, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/528325

ROUTER IOS - 2600
By Lycos85, member since 9/19/2006, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/528327

AGILE ENTERPRISE SOA
By GrahamBerri, member since 12/21/2006, Group: enterprise-architecture-sp
http://www.ittoolbox.com/da/528330

ALTERNATIVE FOR ISDN BACKUP
By Mike, member since 11/30/2006, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/527639

HSRP
By still.myself, member since 5/5/2006, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/527640

**** DECISION MAKER WIKI ****
http://wiki.ittoolbox.com

Most Popular New Wiki Contribution

DOCUMENT YOUR NETWORK
By 196.201.1.162
This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation is a BIG job with BIG rewards. Network administrators who utilize network documentation as a "living document"or "living process" reap the greatest...
http://www.ittoolbox.com/da/429412

Recent Wiki Contributions

OPERATING SYSTEM
By 76.186.0.149
The operating system (OS) is the program that acts as the manager of a computers functionality. These tasks include starting the computer, running application programs, as well as receiving input from the keyboard and mouse, sending information to the screen, keeping track of files and...
http://www.ittoolbox.com/da/428969

CLUSTERING SERVERS
By 76.186.0.149
Clustering refers to the use of multiple computers and devices such as typically PCs or UNIX workstations, multiple storage devices, and redundant interconnections, to configure and create as a single unified available system. Primarily, Cluster computing is used for load balancing as well as for...
http://www.ittoolbox.com/da/526199

COMMON OPEN POLICY SERVICE PROTOCOL
By 76.186.0.149
Common Open Policy Service Protocol or COPS is a proposed standard communication protocol that accounts for the policy control decision in the network communication. COPS is designed for use along with the Resource Reservation Protocol (RSVP) which allocates the traffic priorities in advance for temporary...
http://www.ittoolbox.com/da/527647

RESOURCE RESERVATION PROTOCOL
By 76.186.0.149
Resource Reservation Protocol or RSVP is a set of communication protocols that enables channels or paths on the Internet to be reserved for the multicast (one source to many receivers) transmission of video and other internet messaging services requiring high-bandwidth. Besides multicast, RSVP also...
http://www.ittoolbox.com/da/527648

APPLICATION SERVICE PROVIDER
By ksi8063
An ASP deploys, hosts and manages access to a packaged application to multiple parties from a centrally managed facility. The applications are delivered over networks on a subscription basis. This delivery model speeds implementation, minimizes the expenses and risks incurred across the application life cycle...
http://www.ittoolbox.com/da/527649

INTERNET SPECIFIC NETWORK COMMANDS
By aksbh
Host command performs a lookup of an internet address using DNS (Domain Name System). It can be used with ip_address or hostname (domain name). Usage:- host ip_address or host domain_name If DNS is not configured properly, "/etc/resolv.conf" is required to be edited. Dig...
http://www.ittoolbox.com/da/526195

KERMIT
By aksbh
Kermit is a file transfer protocol with implementations for various types of machines, including the IBM PC. Kermit can be used for transfer of files between the UNIX cluster and a computer system that doesnt support ftp. The user can logon to his account and...
http://www.ittoolbox.com/da/526196

KERNEL
By dlavigne6
The Kernel is the central controller of an operating system. It is the part of an operating system that loads first. The kernel remains in main memory while the system is running. Because it stays in memory, it is important for the kernel to be...
http://www.ittoolbox.com/da/433075

ASTERISK PBX
By cmurphy262
Asterisk open source PBX runs on Linux on standard PC hardware with suitable PCI interface cards, it works as a PBX with extra telephony features like voice mail and conferencing, working with analog phones and standards-based IP phones for VoIP telephony. And its certainly...
http://www.ittoolbox.com/da/482927

----------------------------------------------------------------------
BLOG: TUNING IN KI4REX
Read about all aspects of networking and help desk support, read the community's reactions, and post your own comments.Read more at ITtoolbox Blogs.
http://www.ittoolbox.com/da/525802
----------------------------------------------------------------------


**** JOB POSTINGS ****
http://jobcenter.ittoolbox.com/

Recent Job Postings

INFORMATION TECHNOLOGY STAFF NEEDED
Company: Blackwater USA/Partner
Location: Nationwide
Blackwater USA/Partner is seeking Information Technology Staff. We are seeking experienced Information Technology Professionals for immediate employment in support of our client. We are seeking talented technical...
http://www.ittoolbox.com/da/523322

CRM ARCHITECT NEEDED
Company: Mission Federal Credit Union
Location: San Diego, CA
Mission Federal Credit Union is seeking a CRM Architect Needed who has 3-5 years experience with enterprise application deployment of CRM applications, preferably in retail banking or...
http://www.ittoolbox.com/da/523323

UNIX SYSTEMS ENGINEER NEEDED
Company: Quicken Loans
Location: Livonia, MI
Quicken Loans is seeking a Unix Systems Engineer who has at least 2 years of UNIX (AIX, SUN Solaris, HP9000 HP-UX) and Linux enterprise server administration experience....
http://www.ittoolbox.com/da/523324

INFORMATION SECURITY MANAGER / DIRECTOR NEEDED
Company: Mentor Graphics
Location: Wilsonville, OR
Mentor Graphics is seeking an Information Security Manager / Director who has at least 7 years of related experience and who is skilled in digital certificate technology including SSL...
http://www.ittoolbox.com/da/523321

CRM ADMINISTRATOR NEEDED
Company: Corporate Executive Board
Location: Washington DC
Corporate Executive Board is seeking a CRM Administrator who has at least 2 years experience defining and implementing role based access controls in CRM system. Corporate Executive Board...
http://www.ittoolbox.com/da/519243

HRIS BUSINESS ANALYST I NEEDED
Company: Loma Linda University
Location: Loma Linda, CA
Loma Linda University is seeking an HRIS Business Analyst I who has at least five years' prior work experience and who is skilled in Windows 95/98, Windows...
http://www.ittoolbox.com/da/509780


Related Jobs (North American candidates only)
Service Desk Technician for the World's Greatest Advertising Agency (Dice)
http://www.ittoolbox.com/ext/10860
Software Engineer (Dice)
http://www.ittoolbox.com/ext/10861
LAN Administrator - Insurance (Dice)
http://www.ittoolbox.com/ext/10862
Technical Support (RemoteWare-SMS, Hardware, Software) (Dice)
http://www.ittoolbox.com/ext/10863


**** NEW EVENTS & WEBCASTS ****
http://networking.ittoolbox.com/events

BEST PRACTICES FOR MICROSOFT PKI WEBINAR
5/10/2007 11:00:00 AM by nCipher
Please join us for a free Webinar, Thursday, May 10, 2007 11:00 AM EDT. Brian Komar of IdentIT will provide a unique overview of the MS PKI and nCipher's integrated solutions, plus tips & tricks to assist you in streamlining this process.
http://www.ittoolbox.com/da/527650

**** UPCOMING EVENTS & WEBCASTS ****
http://networking.ittoolbox.com/events

VENDOR RELATIONSHIP MANAGEMENT - VENDOR OR PARTNER?
5/9/2007 11:30:00 AM by Startsmart Consulting
Our thought leaders will show you how world class companies are using their vendor relationships to create IT Value, using an easy to use framework.
http://www.ittoolbox.com/da/513263

COMMUNICATIONS DEVELOPER CONFERENCE
5/15/2007 by TMC
Date: May 15-17, 2007 Location: Santa Clara, CA Venue: Hyatt Regency Who Will Build Tomorrow's Communications Applications? As communications evolves, one thing is for certain. The need for applications has never been greater. There is a race on to build tomorrow's unified...
http://www.ittoolbox.com/da/503682

RFID SOLUTIONS EXPO & CONFERENCE
5/16/2007 by Reed Exhibitions
Date: May 16-18, 2007 Location: Tokyo, Japan Venue: Tokyo Big Sight RIDEX 2007 will be the second Radio Frequency Identification focused industry exhibition and will gather all lines of RFID solutions, RFID tags, reader/writers, printers, middlewares and integration service. This is where exhibitors...
http://www.ittoolbox.com/da/525913

_____________________________________________________________________
*Manage ITtoolbox Subscriptions: http://www.ittoolbox.com/da/78372
*Leave Newsletter: mailto:Leave-Networking-Decision-Makers@Updates.ITtoolbox.com
*View All Newsletters: http://www.ittoolbox.com/da/218494
*Advertising Information: http://www.ittoolbox.com/da/78374
*Suggest Content: mailto:Content@ITtoolbox.com
*Recommend this Newsletter: http://www.ittoolbox.com/da/80469
*Additional Questions: mailto:ITtoolboxNewsletters@ITtoolbox.com
Copyright (c) 1998-2007 Information Technology Toolbox, Inc. All rights reserved.

No comments:

Post a Comment