Thursday, August 30, 2007

Weekly Update: Are our systems too complicated?

**** NETWORKING-DOERS NEWSLETTER ****

Thursday, August 30, 2007

http://networking.ITtoolbox.com

Your weekly connection to the new and most popular entries from the Networking community.

**** CONTENTS ****

Groups: Different subnets (+9)
White Papers: The Remote Access Imperative in Disaster Recovery (+3)
Blogs: I'm sweet sixteen and ready to party in Turkey (+9)
Wiki: Operating System
Jobs: WebMethods Administrator Needed (+5)
Documents: Evolution of Computer Networks (+1)
Events: Interop New York (+3)


**** SPONSOR MESSAGE: ARXCEO ****

Reach more with an easy do-it-yourself Webinar
Five steps to pass security audits and prevent network attacks targeting branch offices and wireless access points such as the recent TJX breech. That attack used reconnaissance to gain access to a store's wireless router resulting in exposure of over 30 million credit cards. See the Steps.
http://www.ITtoolbox.com/erd/15768

**** SPONSOR MESSAGE: MICROSOFT CORPORATION ****

NCsoft Chooses Windows Over Linux
STATE OF ILLINOIS VOTES FOR WINDOWS SERVER OVER LINUX. State Government Decided Linux Was Too Big a Risk. See For Yourself.
http://www.ITtoolbox.com/erd/15769

**** SPONSOR MESSAGE: COGNOS ****

BI on the Move: Cognos Go! Mobile
Allowing business users anywhere, anytime access to the information they need is helping organizations become more agile and competitive. Learn how to get business intelligence into the hands of your business users, anywhere they go with Cognos Go! Mobile. Learn More.
http://www.ITtoolbox.com/erd/15755

**** DOER GROUPS ****
http://networking.ittoolbox.com/groups

Most Popular Thread

DIFFERENT SUBNETS
By mccarron8452, member since 11/27/2006, Group: networkadmin-l
We are running out of addresses and extending to another building. I was thinking of putting in a wireless bridge and putting the other building on another subnet separated by a router. My problem is how I can see servers on the other subnet.
http://www.ittoolbox.com/da/586268

Recent Threads

FILE SHARE CONNECTION
By gregb, member since 3/10/2004, Group: networkadmin-l
http://www.ittoolbox.com/da/586270

MOVMENT
By Mandark!, member since 11/28/2006, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/586271

DSL CONNECTION SHARING
By Roufkhan, member since 7/4/2007, Group: networkadmin-l
http://www.ittoolbox.com/da/586272

MPLS TRACEROUTE DOEST GIVE LABELS
By islamjul, member since 3/14/2006, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/586273

HELP WITH CISCO 3560G CONFIGURATION
By cswebb, member since 8/28/2007, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/586275

IS THERE ANY DEFAULT USERNAME AND PASSWORD FOR CISCO CALL MANAGER
By palathingal, member since 3/9/2006, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/586277

GRUB
By vemurirajesh10, member since 2/6/2006, Group: networkadmin-l
http://www.ittoolbox.com/da/586278

BANDWIDTH
By engsayed, member since 7/10/2007, Group: networkadmin-l
http://www.ittoolbox.com/da/586279

BLOCK GAMES FROM CISCO ROUTER
By mtarawal..., member since 4/19/2006, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/586280

----------------------------------------------------------------------
WIKI TOP CONTRIBUTOR: DEWRITERMD
Edited: IPv6Contents: "IPv6 stands for Internet Protocol Version 6, which is based on 128 bit IP address and provides a standardized method of transporting information across the Internet..."...Continued at ITtoolbox Wiki.Become a top contributor as you share and learn with the community at ITtoolbox Wiki.

http://www.ittoolbox.com/da/523150
----------------------------------------------------------------------


**** DOER WHITE PAPERS ****
http://networking.ittoolbox.com/documents/white-papers/

Recent White Papers

THE REMOTE ACCESS IMPERATIVE IN DISASTER RECOVERY
By Tim Clark
Learn about best practices for disaster recovery and the key role of SSL VPNs providing remote access during a business disruption, enabling workers to connect easily and securely to authorized corporate network resources from anywhere via the Internet.
http://www.ittoolbox.com/da/564911

GARTNER MAGIC QUADRANT FOR E-MAIL ACTIVE ARCHIVING
By Symantec Corporation
Symantec Enterprise Vault has been positioned as the only Leader in Gartner's Magic Quadrant for E-mail Active-Archiving, 2007. Enterprise Vault enables organizations to reduce storage costs, protect critical records, improve employee productivity and achieve compliance with regulations requiring the retention and supervision...
http://www.ittoolbox.com/da/551863

BI ON THE MOVE: COGNOS GO! MOBILE (Podcast)
By Cognos
Allowing business users anywhere, anytime access to the information they need is helping organizations become more agile and competitive. Learn how to get business intelligence into the hands of your business users, anywhere they go with Cognos Go! Mobile.
http://www.ittoolbox.com/da/531168

GUIDE TO COMMONLY OVERLOOKED SECURITY VULNERABILITIES
By HP
The first step in securing your imaging and printing environment is to identify areas of concern. This brief guide includes checklists for identify potential weaknesses in your network, the device and the environment. Read this guide to learn more about finding the hidden cracks.
http://www.ittoolbox.com/da/575263

To Signup for Networking White-Paper Alerts

http://www.ittoolbox.com/da/347720

**** DOER BLOGS ****
http://blogs.ittoolbox.com/

Most Popular New Blog Entry

I'M SWEET SIXTEEN AND READY TO PARTY IN TURKEY
By Locutus
Not me personally :) I am more than twice that age. My sixteen year old is the Linux Kernel that Linus Torvalds presented on the 25th of August 1991. To celebrate this auspicious event the Chamber of Electrical Engineer's and the Turkish Linux Users Club...
http://www.ittoolbox.com/da/586245

Recent Blog Entries

AVOIDING MONSTER.COM-SIZED BREACHES
By Mark Tordoff
Last Thursday, Monster.com announced it had suffered a data breach impacting the information stored in its resume database. According to a report published on ZDnet, the breach affected the records of 1.3 million job seekers. While some headlines focused on the 5 days...
http://www.ittoolbox.com/da/586281

PLAN YOUR WORK, AND WORK YOUR PLAN
By thatITguy
Growing up my father always used the following phrase, "Plan your work, and work your plan. He was a firm believer that if you had a plan to follow you would always wind up on top. Well, I'm going to give it a try...
http://www.ittoolbox.com/da/586282

DELETING COPYRIGHT CLAUSES
By Dru
A recent commit on the Linux Kernel mailing list and its ensuing threads on Undeadly and Slashdot highlights the importance of due diligence in maintaining code pedigree. And while this issue plays out in the open in open source projects, don't think this is...
http://www.ittoolbox.com/da/586246

WHAT IS THIS DEPMOD PROGRAM THINGY?
By Locutus
In our exploration of the Linux file system we come across an interestingly named file called "depmod". Normally it resides in your sbin folder. Thinking about this file you wonder if it is a link to Depeche Mode. No it is not a shortcut to...
http://www.ittoolbox.com/da/586248

DRAGONFLY UPDATE
By Dru
I mentioned in a blog post over the weekend that I was having problems installing DragonFly BSD 1.10.x on my test systems. Wouldn't you know it, now I can't reproduce the error on the same hardware...
http://www.ittoolbox.com/da/586249

ARE OUR SYSTEMS TOO COMPLICATED?
By Locutus
If you read around the news I am sure you will start seeing more and more stories of computer failure this and computer failure that. I am positive that they can't all be "ID TEN T" and "PEBKAC" errors or the human race would...
http://www.ittoolbox.com/da/586252

SERVERCHECK TAKE 3
By thatITguy
Well, I still haven't gotten my little ServerCheck batch file converted over to windows script, but I did add a new feature, it know has the ability to send an email to alert you, or whoever you want it to alert when a server...
http://www.ittoolbox.com/da/586283

REX AND THE CASE OF THE QUICK FIX AND THE LONG STAY
By KI4REX
The blaring ring of the berthing compartment's IVCS (Internal Voice Communication System) jarred Rex awake. He decided to play the I am blissfully asleep and do not hear anything card, in the hopes that, 1 someone else will answer it, and 2 that the...
http://www.ittoolbox.com/da/586254

A CALL TO CONSOLIDATE FEDERAL DATA SECURITY LAWS
By Mark Tordoff
As Congress heads back to session, among the legislation they'll be considering are two new bills related to data security: the Federal Agency Data Breach Protection Act introduced by Rep. Tom Davis (R-Va.), ranking member on the House Oversight and Government Reform Committee...
http://www.ittoolbox.com/da/586284

**** DOER WIKI ****
http://wiki.ittoolbox.com

Recent Wiki Contributions

OPERATING SYSTEM
By blueknight
The operating system (OS) is the program that acts as the manager of a computers functionality. These tasks include starting the computer, running application programs, as well as receiving input from and sending information to the various peripheral devices (screens, printers etc.), keeping track of...
http://www.ittoolbox.com/da/586285

----------------------------------------------------------------------
WIKI TOP CONTRIBUTOR: BLUEKNIGHT
Edited: System AdministrationContents: "System administration involves managing the servers within a data center..."...Continued at ITtoolbox Wiki.Become a top contributor as you share and learn with the community at ITtoolbox Wiki.
http://www.ittoolbox.com/da/584506
----------------------------------------------------------------------


**** JOB POSTINGS ****
http://jobcenter.ittoolbox.com/

Most Popular New Job Posting

WEBMETHODS ADMINISTRATOR NEEDED
Company: Fidelity Investments
Location: Covington, Kentucky
Fidelity Investments is seeking a WebMethods Administrator who has at least 3 years of experience with proven WebMethods Administration skills in a UNIX environment. Description...
http://www.ittoolbox.com/da/583538

Recent Job Postings

IT SECURITY ARCHITECTURE MANAGER NEEDED
Company: TJX Companies
Location: Framingham, MA
TJX Companies is seeking an IT Security Architecture Manager who has at least 6 years experience in Information Technology and certification related to the security profession (CISSP, CISA...
http://www.ittoolbox.com/da/586286

ERP PRINCIPLE SECURITY ARCHITECT NEEDED
Company: Accenture
Location: Overland Park, KS
Accenture is seeking an ERP Principle Security Architect who has at least five years of security architecture experience within an SAP environment - Five years of SAP development experience...
http://www.ittoolbox.com/da/583539

COMPUTER OPERATOR NEEDED
Company: Global Technical Talent
Location: Piscataway, NJ
Global Technical Talent is currently recruiting for a contract opportunity in Piscataway, NJ for a Computer Operator. Run and monitor job streams, trouble shoot routine Windows and UNIX...
http://www.ittoolbox.com/da/583537

SR. SYSTEM ADMINISTRATOR NEEDED
Company: Bristlecone
Location: Milpitas, CA
Bristlecone is seeking a Sr. System Administrator who has at least 8 years overall IT experience, preferably in a software or consulting environment. Job Detail:Provide 24 x...
http://www.ittoolbox.com/da/580879

CYBER INFRASTRUCTURE - SENIOR PROJECT MANAGER NEEDED
Company: Northwestern University
Location: Evanston, IL
Northwestern University is seeking a Cyber Infrastructure-Senior Project Manager who has at least 4-year degree in Computer Science, Engineering, Math, Science or related technical discipline along...
http://www.ittoolbox.com/da/578228


Related Jobs (North American candidates only)
Networking // Security // CISCO // Consultants needed all over US
http://www.ittoolbox.com/ext/41593
CCIE - Cisco Networking (CCIE/LAN/WAN) Expert
http://www.ittoolbox.com/ext/41592


**** DOER PEER PUBLISHING ****
http://networking.ittoolbox.com/documents/peer-publishing/

Recent Peer Publishing

EVOLUTION OF COMPUTER NETWORKS
By Jayanthy Natrajan
This paper provides background on the evolution of computer networks, as well as a forecast of what the author believes the future will hold for the global Internet infrastructure.
http://www.ittoolbox.com/da/586287

SOA IN TELECOMMUNICATION SYSTEMS
By Jayanthy Natrajan
The telecommunications industry is entering a new era of opportunity, driven by advancements outside its own realm. One of the most significant is the general adoption of Service Oriented Architectures (SOAs) and the Web services that enable them. The power of these advancements lies in...
http://www.ittoolbox.com/da/586289

**** NEW EVENTS & WEBCASTS ****
http://networking.ittoolbox.com/events

INTEROP NEW YORK
10/22/2007 by CMP Media
Date: October 22-26, 2007 Location: New York, NY Venue: Javits Center, NY See all of the latest technologies in action at Interop New York, October 22-26, 2007. Visit 200+ exhibitors, attend 100+ sessions, and check out live demos of practical business solutions.
http://www.ittoolbox.com/da/586290

**** UPCOMING EVENTS & WEBCASTS ****
http://networking.ittoolbox.com/events

THE SECURITY STANDARD
9/10/2007 by IDG
Date: September 10-11, 2007 Location: Chicage, IL Venue: The Fairmont Hotel Security today isn't just a matter of new technology and new threats. Security is about doing business in new ways that reflect the emerging dangers in our world, the evolving concerns of...
http://www.ittoolbox.com/da/564858

THE 3RD ANNUAL LEAN SIX SIGMA SUMMIT
9/18/2007 by IQPC
Date: September 18-21, 2007 Location: Las Vegas, NV Venue: The Venetian Lean Six Sigma is delivering millions of dollars worth of financial benefit to over 80% of the USA's top-100 companies - how does the dollar margin on your Lean Six Sigma Improvement...
http://www.ittoolbox.com/da/567261

MOBILE BUSINESS EXPO
10/22/2007 by CMP
Date: October 22-25, 2007 Location: New York, NY Venue: Javits Convention Center With case studies, demonstrations, keynotes, workshops and conference tracks covering the latest mobile technologies, and issues such as security and infrastructure decisions, Mobile Business Expo helps you build and manage a mobile...
http://www.ittoolbox.com/da/583461

_____________________________________________________________________
*Manage ITtoolbox Subscriptions: http://www.ittoolbox.com/da/101377
*Leave Newsletter: mailto:Leave-Networking-Doers@Updates.ITtoolbox.com
*View All Newsletters: http://www.ittoolbox.com/da/215184
*Advertising Information: http://www.ittoolbox.com/da/101378
*Suggest Content: mailto:Content@ITtoolbox.com
*Recommend this Newsletter: http://www.ittoolbox.com/da/82380
*Additional Questions: mailto:ITtoolboxNewsletters@ITtoolbox.com
Copyright (c) 1998-2007 Information Technology Toolbox, Inc. All rights reserved.

No comments: