This document is intended to help students determine whether or not they are ready to take our CCNA Boot
Camp.Whether they are ready to start the CCNA curriculum or need a basic network fundamentals foundation
first, this white paper can help them determine which path is right and how to begin each. Since students
have varying degrees of knowledge, this paper is only intended as a “knowledge check” as to what additional
training may be needed in order to attend our ICND1, ICND2, or CCNA Boot Camp.
Understanding the current state of your storage infrastructure—what capacity you have,
where it is located, who is using it, who is paying for it, how efficiently it is being used, and
how well it is meeting SLAs—is fundamental to intelligently planning, provisioning, and
managing storage. Buying and deploying storage as it is often done on a per-project basis—
based on loose estimates of immediate and future required capacity, application
requirements, and response times—typically results in over-purchasing of hardware and
poor allocation of resources.
It is assumed that different readers will have different levels of experience with Access Control
Lists (ACLs). Some will have no experience. Others will have dabbled with ACLs in lab envi-
ronments. Still others will have extensive real-world experience with the implementation of
ACLs. The goal of this white paper is to be interesting to readers with any level of ACL experi-
ence. The ACL novice should gain an appreciation and understanding of what goes into the
definition of an ACL. And hopefully the ACL expert can also gain an insight or two from the
Today, wireless networking is a reality from which IT managers cannot escape. Regardless of the size of an
organization, where it is located, or what vertical market it serves, network users want it. No longer is
wireless networking a fringe technology – it’s mainstream and it continues to expand at stellar growth rates
within the enterprise marketplace.
This white paper provides an outline of how to judge the quality of decisions by analyzing how effectively the
risks associated with various options have been analyzed.We begin with a definition for quality control in
decision making. This definition is then related to the four steps of the decision making process and finally to
the three types of error (risk) that occur in each of the four steps.
Choosing an IP routing protocol is an important step. The right protocol can make your routing
operate efficiently, and the wrong one can make your life difficult. Each protocol has its own
pros and cons, and works better in some situations than others. In this paper, we explore the
strengths and weakness of RIP, EIGRP, OSPF, and IS-IS, and discuss when it is appropriate to
use each. We will evaluate each protocol in terms of five criteria:
• Convergence speed
• Ease of use
• Network topology required
• Vendor support
• IPv6 support...
Performance Appraisals. Two words that can make the hair stand on end for both employees
Poorly done, performance appraisals can leave you with underperformers who lack the direc-
tion to change their behavior, good performers who feel unrecognized for their work, and,
worse yet, problem employees who should be dismissed, but a lack of appropriate documenta-
tion prevents this.
In a 2004 survey of 200 IT professionals from 14
countries in the Americas, Asia/Pacific and Europe, the
IT Governance Institute (ITGI) found that in 80% of
organizations, IT management is solely responsible for
defining and addressing IT risk impact. This widespread
lack of involvement by business unit managers demon-
strates a consistent—and alarming—gap in mapping
technology risk to the business. Additionally, this gap als
shows that most organizations have inadequate IT risk
assessment processes across their enterprises.
A meeting will not be successful unless someone has put some effort into its planning. Most
meetings are undermanaged. If any other business activity were as poorly managed as the
average meeting, those responsible would have their careers seriously abbreviated.
The effectiveness, productivity, and ultimate success of a meeting is directly related to the
amount of planning. Someone must take management responsibility seriously.
This paper introduces the four stages of meeting management: planning, preparation, process
management, and follow-up.
In the maze of wireless networking developments, the one factor often overlooked is the promised throughput
capabilities versus the actual bandwidth that is available. Picking up an 802.11g wireless access point and
wireless adaptor, you probably expect that you will be getting a bandwidth availability of 54mb-per-second
(mbps). Oops. Don’t get too upset when you find out that the actual bandwidth you get is substantially lower.
In this paper you will learn why the bandwidth you expect disappears into thin air....
When looking for ways to build of your web site, even minor steps can make a huge difference. The most helpful
information and best content will have little impact without simple protocols that make your Web site easier to
use and more visually appealing. This paper focuses on 10 tips you can employ to ensure your web site is effec-
tive from the day it goes live.
In an economic climate of slow and cautious growth, IT is
under intense pressure to manage costs and ensure that
spending is well aligned with business drivers. Essentially,
IT is being asked to run itself as a business — allocating
resources where they will generate the most value while
minimizing resources from nonproductive areas.
Management is delegation. Either learn to delegate or you will be buried in work that others
could, and should, be doing.
‘Managing’ is the alternative to doing something yourself. Management responsibility is the del-
egation of tasks to others, and the control of outcomes. If you could get everything done your-
self, there would be no need for staff. If you cannot do everything yourself, there needs to be
delegation. If there needs to be delegation, then someone must manage the assignments....