Expert reference series
-
The open source security position challenges the failing status quo. Increasing security issues underline the fact that the proprietary "hide-the-code" approach is not working.
14p phongthinh 06-08-2009 135 17 Download
-
Choosing an IP routing protocol is an important step. The right protocol can make your routing operate efficiently, and the wrong one can make your life difficult. Each protocol has its own pros and cons, and works better in some situations than others. In this paper, we explore the strengths and weakness of RIP, EIGRP, OSPF, and IS-IS, and discuss when it is appropriate to use each. We will evaluate each protocol in terms of five criteria: • Convergence speed • Ease of use • Network topology required • Vendor support • IPv6 support...
21p phongthinh 06-08-2009 197 45 Download
-
In recent years, Linux has been validated as an enterprise-worthy operating system, capable of managing the robust components of major production environments. IT professionals acknowledging the cost savings, scalability, and stability of Linux are deploying open source technologies at every opportunity. Most IT professionals are familiar with the Red Hat Linux retail product line and have been using Linux systems in business environments for some time.
31p minhtuan 06-08-2009 107 12 Download
-
This whitepaper describes the features and benefits of the Red Hat Enterprise Linux product family. It briefly outlines factors that need to be considered when planning a migration from a consumer Red Hat Linux release, such as 8.0 or 7.1, to an Red Hat Enterprise Linux family product. It also discusses some of the issues associated with migrating applications from proprietary Unix, Microsoft Windows, and other Red Hat operating system environments.
15p minhtuan 06-08-2009 82 7 Download
-
This paper describes how database benchmarks demonstrate the performance of Red Hat Enterprise Linux AS and Oracle9i Database running on HP ProLiant hardware. Combined with the compelling Total Cost of Ownership model presented by this software and hardware combination, the paper shows why solutions such as this are rapidly replacing proprietary RISC/Unix and Microsoft Windows solutions.
20p minhtuan 06-08-2009 116 16 Download
-
When looking for ways to build of your web site, even minor steps can make a huge difference. The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealing. This paper focuses on 10 tips you can employ to ensure your web site is effec- tive from the day it goes live.
8p duypha 06-08-2009 106 11 Download
-
In the maze of wireless networking developments, the one factor often overlooked is the promised throughput capabilities versus the actual bandwidth that is available. Picking up an 802.11g wireless access point and wireless adaptor, you probably expect that you will be getting a bandwidth availability of 54mb-per-second (mbps). Oops. Don’t get too upset when you find out that the actual bandwidth you get is substantially lower. In this paper you will learn why the bandwidth you expect disappears into thin air....
8p duypha 06-08-2009 91 16 Download
-
Today, wireless networking is a reality from which IT managers cannot escape. Regardless of the size of an organization, where it is located, or what vertical market it serves, network users want it. No longer is wireless networking a fringe technology – it’s mainstream and it continues to expand at stellar growth rates within the enterprise marketplace.
10p duypha 06-08-2009 108 6 Download
-
Performance Appraisals. Two words that can make the hair stand on end for both employees and managers. Poorly done, performance appraisals can leave you with underperformers who lack the direc- tion to change their behavior, good performers who feel unrecognized for their work, and, worse yet, problem employees who should be dismissed, but a lack of appropriate documenta- tion prevents this.
9p minhtuan 06-08-2009 186 36 Download
-
It is assumed that different readers will have different levels of experience with Access Control Lists (ACLs). Some will have no experience. Others will have dabbled with ACLs in lab envi- ronments. Still others will have extensive real-world experience with the implementation of ACLs. The goal of this white paper is to be interesting to readers with any level of ACL experi- ence. The ACL novice should gain an appreciation and understanding of what goes into the definition of an ACL. And hopefully the ACL expert can also gain an insight or two from the material....
15p minhtuan 06-08-2009 172 36 Download
-
A meeting will not be successful unless someone has put some effort into its planning. Most meetings are undermanaged. If any other business activity were as poorly managed as the average meeting, those responsible would have their careers seriously abbreviated. The effectiveness, productivity, and ultimate success of a meeting is directly related to the amount of planning. Someone must take management responsibility seriously. This paper introduces the four stages of meeting management: planning, preparation, process management, and follow-up.
17p minhtuan 06-08-2009 134 15 Download
-
In an economic climate of slow and cautious growth, IT is under intense pressure to manage costs and ensure that spending is well aligned with business drivers. Essentially, IT is being asked to run itself as a business — allocating resources where they will generate the most value while minimizing resources from nonproductive areas.
15p phongthinh 06-08-2009 102 11 Download
-
In a 2004 survey of 200 IT professionals from 14 countries in the Americas, Asia/Pacific and Europe, the IT Governance Institute (ITGI) found that in 80% of organizations, IT management is solely responsible for defining and addressing IT risk impact. This widespread lack of involvement by business unit managers demon- strates a consistent—and alarming—gap in mapping technology risk to the business. Additionally, this gap als shows that most organizations have inadequate IT risk assessment processes across their enterprises.
9p duypha 06-08-2009 147 25 Download
-
Understanding the current state of your storage infrastructure—what capacity you have, where it is located, who is using it, who is paying for it, how efficiently it is being used, and how well it is meeting SLAs—is fundamental to intelligently planning, provisioning, and managing storage. Buying and deploying storage as it is often done on a per-project basis— based on loose estimates of immediate and future required capacity, application requirements, and response times—typically results in over-purchasing of hardware and poor allocation of resources.
1p minhtuan 06-08-2009 159 53 Download
-
This document is intended to help students determine whether or not they are ready to take our CCNA Boot Camp.Whether they are ready to start the CCNA curriculum or need a basic network fundamentals foundation first, this white paper can help them determine which path is right and how to begin each. Since students have varying degrees of knowledge, this paper is only intended as a “knowledge check” as to what additional training may be needed in order to attend our ICND1, ICND2, or CCNA Boot Camp.
13p duypha 06-08-2009 130 25 Download
-
Management is delegation. Either learn to delegate or you will be buried in work that others could, and should, be doing. ‘Managing’ is the alternative to doing something yourself. Management responsibility is the del- egation of tasks to others, and the control of outcomes. If you could get everything done your- self, there would be no need for staff. If you cannot do everything yourself, there needs to be delegation. If there needs to be delegation, then someone must manage the assignments....
10p phongthinh 06-08-2009 97 8 Download