Jul-04

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
 

 

Feature
Looking to the Future: Standardized Certifications
Patrick von Schlag
Different theories have abounded for years about why certifications are important. They provide a measure of a candidate’s knowledge and skills in a particular technology or toolset. They provide benchmarks for hiring qualified workers. They provide a means of investing in your career and a vehicle for potential increases in compensation or job promotion.

 

 

Tools
Tools Feature Linux Tools for Your Desktop
Ed Tittel
Though Microsoft Windows still leads all other desktops by a comfortable margin, the market share for Linux continues to go no place but up. In the wake of recent decisions by system vendors as different as Dell and IBM to offer desktop-ready PCs with Linux installed and widespread adoptions of Linux on the desktop and elsewhere, it should come as no surprise that Linux is finding a home in more PCs than ever before.

Security Tools: Intruder Alert!
Douglas Schweitzer
The old saw “an ounce of prevention is worth a pound of cure” can certainly be applied to all aspects of computer security. To protect our computer networks from the endless stream of attacks by hackers and malicious code, we employ preventive measures that may include sound security policies, well-designed system architecture, properly configured firewalls and strong authentication programs. While these tools are helpful, they may not be enough for today’s breed of sophisticated attacks.

Network Tools: Recovering Servers
Douglas Mechaber
“There are two kinds of network administrators in this world: Those who back up properly, and those who will.” These words from my former mentor still ring true—most sites I have audited have not had a quick recovery method in place.

Tech Tools: Work Together With Groupware
Emily Hollis
For companies with many locations or many employees, getting work teams together to work on projects, regardless of location, is imperative to ensuring business success. Technology can help, and with groupware tools designed to help workers collaborate, teams can work more efficiently and more effectively, anywhere, anytime, by connecting through a network.

Techniques
Implement a Secondary Internet Connection in a Small Business Server Environment
David Gerhart
Small businesses are forced for many reasons, often economic, to assume a variety of risks. Being one of the major cost centers, IT is a department commonly required to bear a considerable portion of the peril. Looking back to 1995, small companies, if they used e-mail much at all, weren’t terribly worried if their systems intermittently malfunctioned. In 2004 the situation is perceived inversely: The network is business-critical. Things have changed, and the SMB community is beginning to adapt.

Security – Sarbanes-Oxley Act: The Impact on IT Security
Uday O. Ali Pabrai
You may have heard or read discussions about the Sarbanes-Oxley Act of 2002. The Sarbanes-Oxley Act of 2002, officially the U.S. Public Company Accounting Reform and Investor Protection Act of 2002, also referred to as SOA or SOX, is having an impact on organizations’ IT, especially security systems, practices and controls. SOX governs how public companies handle financial reporting. In the long term, SOX will affect virtually every aspect of information security. Security practitioners will be well served by gaining knowledge about this legislation and its impact on security requirements for the enterprise infrastructure.

Wireless World: 5 Things IT Pros Need to Know
Devin Akin and Kevin Sandlin
It’s impossible to cover everything IT pros need to know about wireless LANs in a short space. What we have done is narrow this vast chasm of expertise down to five things that will enable an IT pro to implement, manage and troubleshoot an enterprise wireless LAN without getting completely lost.

 

 

Departments

Guest Editorial: Get Ahead With Wireless LAN Security Certification
Steve Linthicum
I love to write grant proposals. In September my college received a wireless mobile lab from Hewlett-Packard containing 35 wireless laptops. One of the benefits associated with obtaining the grant was an all-expense-paid trip to San Diego to meet with other grant recipients. The meeting included a “field trip” via a bus ride from our downtown hotel to San Diego City College. The distance was no more than a mile. As I sat on the bus, I decided to monitor wireless LANs utilizing a great free tool called NetStumbler (www.netstumbler.com). During the ride, I was able to identify around 50 wireless networks.

Inside Certification: IBM Professional Certification: A Solutions-Oriented Approach
Becky Gonzalez
When you’re the world’s largest information technology company, with 80 years of leadership in helping businesses innovate, you know as much about the IT journey as the destination. In the past it was about mainframe capacity. Later it was about PCs, speed and connectivity. Today, it’s all about end-to-end solutions and e-business on demand—and IBM is leading the charge.

Specialty Certification: CDIA+: The Blueprint for Success
Ayana Nickerson
CompTIA CDIA+ is a niche certification—but what an interesting and in-demand niche it is. Those holding a CDIA+ certification possess critical knowledge of technologies used to plan, design and specify a document imaging/management system. The acronym CDIA stands for Certified Document Imaging Architech.

 

Tech Careers: Make the Most of Team Gatherings
Katherine Spencer Lee
Most of us have experienced the dreaded “meeting with no clear purpose” or its close sibling, the “meeting that never ends.” These get-togethers begin with the best of intentions, but some

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>