- Using 802.3af (Power Over Ethernet) as a Sysadmin Tool
- Apr 2, 2004
- By using Power over Ethernet (802.3af) to provide power for devices such as WiFi Access Points, VoIP desktop phones, and webcams, companies can save on A/C wiring costs and UPS provisioning. Daniel P. Dern tells you how you can gain additional sysadmin capabilities, including remote off/on/reboot and power provisioning management.
|
- Planning, Implementing, and Maintaining a Network Infrastructure for MCSE Exam 70-293
- Feb 20, 2004
- Jason Zandri describes the key techniques you'll need to master for MCSE Exam 70-293.
|
- Network Management and MPLS
- Nov 13, 2003
- Stephen Morris shows you some basics of MPLS network management, including the major functional areas of FCAPS: fault, configuration, accounting, performance, and security.
|
- Managing Disk Partitions Over the Network with Ghost Corporate Edition
- Oct 31, 2003
- System administrators often need to deploy images to multiple machines, or they want to make and send images (including system images) to machines over a network. Daniel Dern explains the process using Symantec Ghost Corporate Edition as a solution.
|
- Relocation Challenges of the IT Department, Part 7: Installing an Audiovisual System
- Oct 31, 2003
- Presentations for clients and staff should have a professional look and sound. In Part 7 of his series on IT relocation strategies, Greg Kirkland describes his company's experience when selecting and installing a new audiovisual system to gain those professional results.
|
- Managing Large Networks: Problems and Solutions
- Oct 17, 2003
- This chapter focuses on major issues of managing large networks, including bringing the managed data to the code, scalability, the shortage of development skills for creating management systems, and the shortage of operational skills for running networks.
|
- Samba Team Co-Founder John Terpstra Talks About Samba 3
- Oct 17, 2003
- Samba co-founder John Terpstra talks about Samba 3: what it is, why it is needed, and how it's better than Windows 2000.
|
- Diary of a Network Administrator: Planning for Success
- Feb 28, 2003
- In this diary entry, Joseph Phillips details his planning process for his client's network, servers, and rats.
|
- Diary of a Network Administrator: Mean People Suck
- Nov 15, 2002
- In this diary entry, Joseph Phillips lists characteristics of good (and bad) network administrators.
|
- The Delta Method: Identifying Network Change
- Nov 15, 2002
- This lesson discusses some sources of network change and how to identify them. It also discusses how to objectively weigh the benefits versus the risks of making changes to your networked systems.
|
- Diary of a Network Administrator: Project Management
- Oct 18, 2002
- Far too often, projects spin out of control due to a lack of vision, planning, and technical leadership. In this network administrator diary entry, Joseph Phillips discusses the importance of project management.
|
- Diary of a Network Administrator: The Project Launch
- Sep 20, 2002
- In this series, Joseph Phillips opens his diary for look into the life of network administrator. In this article covering the project launch, he shares his nightmare experience while creating a network plan for a new client.
|
- Make the Right Call: Cisco's AVVID
- Jun 21, 2002
- Robert Richardson discusses the pros and cons of Cisco's AVVID — what the industry's been talking about all along for pure IP convergence: smart IP phones plugged into an Ethernet network full of conventional switches and routers. Plenty of issues need to be ironed out, though.
|
- "Open Sesame" or Not? Use the Right Access Controls
- Apr 12, 2002
- "Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
|
- Data Communications: Use the Right Medium for your Message
- Apr 12, 2002
- Learn when to use twisted pair cable, satellites, or fiber-optics to get your message across. From economic considerations to bandwidth limitations, here's a guide to your options.
|
- The Wireless Network Evolution
- Apr 12, 2002
- Wireless networks include local, metropolitan, wide, and global areas. This excerpt explains the evolution of such networks, their basic principles of operation, and their architectures.
|
- Learn Host-Based Intrusion Detection
- Apr 5, 2002
- Follow the step-by-step examples to learn how to use five major host-based intrusion detection tools: TCP Wrappers, xinetd, Tripwire, Swatch, and PortSentry.
|
- Night of the Living Wi-Fi's (A Security Parable for Our Times)
- Apr 5, 2002
- Ed Skoudis' true-to-life scenario sends chills up the spine of any business with employees using unsecured wireless access.
|
- See What Your Attacker Sees with Scanning Tools
- Apr 5, 2002
- Defend against attacks by examining your systems from the viewpoint of the attacker. You can use the same tools to protect your systems that attackers use to break in to your systems. Learn how here.
|
- IP Routing: From Basic Principles to Link State Protocols
- Mar 29, 2002
- Control network traffic by learning the routing protocols and mechanisms that build and maintain route information.
|