Concerned about the security of your Linux environment or looking for ways to beef up your existing security? Two Linux security pros share tips to help you get up to speed on the latest Linux security advancements.
Articles by Jacqueline Emigh
New features and administrative capabilities abound in Office System 2003, but businesses will also need to migrate to Windows Server 2003 in order to enjoy all of the benefits.
Enterprises and network administrators are starting to face an increasing number of new remote access and management scenarios beyond the ever-present need to secure corporate laptops at public hotspots.
It can be tough telling the forest from the trees when migrating to Windows Active Directory, which is why it's critical for administrators to dovetail the deployment of AD forests and domains with the business needs of their organizations.
With the rapid adoption of Linux clusters for use in high performance computing, high availability, and Web farm applications, can mainstream deployment be far away? Get up to speed with clustering on Linux before it arrives on a network near you.
At many companies wireless LANs have grown organically and don't blend in with the wired network infrastructure, leaving network managers with a number of decisions. Those choices run the gamut from establishing wireless policies to settling on a WLAN architecture.
Mac OS X offers a wide range of choices for network management and system administration. You can continue to point and click, of course, but to get the most mileage out of Apple's OS, it's best to know as much about Unix as you can. Learn how and when to use Unix-based commands like 'sudo' and 'su' in this Managing Mac Networks article.
To ensure more administrative control over instant messaging, organizations are starting to deploy enterprise instant messaging systems, which add critical features like policy-based rules, logging, archiving, and encryption. As Jacqueline Emigh reports, IM vendors still need to achieve interoperability, though, to better enable secure and managed messaging between users and their outside customers and partners.
The 'integration' buzzword can mean a lot of things. Vendors are integrating more capabilities into management tools of various sorts. Other products are trying to bridge the gap between technology and business processes. For customers, the best approach is to do some planning before taking the plunge, particularly when extensive systems changes may be involved.
Streaming media deployments are hardly for the faint of heart. Like it or not, though, video Webcasts are trickling their way toward your organization. Jacqueline Emigh reports on the streaming media scene and offers tips to help ensure all your bases are covered and that your network is ready when a streaming media project rears its head.
Content management is getting easier with the advent of new commercial CM packages, vendor alliances, and some industry standards. Jacqueline Emigh surveys the current content management scene and reveals several key considerations to take into account when choosing a CM solution.
Microsoft delivers Windows Server 2003 with more features and functionality, but is it worth the cost of upgrading? Jacqueline Emigh reports.
Open-source support initially made the headlines at BrainShare, Novell's annual conference, but the real news is that Novell spelled out its long-term plans for Zenworks, GroupWise, eDirectory, and other flagship networking products -- and these plans are ambitious, to say the least.
IBM Tivoli will debut an assortment of products, including a new autonomic engine, at IBM developerWorks Live! later this week in an attempt to boost the company's stature in the areas of crossplatform management, security, and autonomic computing vs. industry rivals, particularly HP's OpenView.
With equipment prices falling and the number of hot spots rising, wireless LANs will become more predominant in 2003 than ever before. For network managers, though, vendor interoperability is expected to remain a critical issue across areas ranging from encryption to configuration management tools. Jacqueline Emigh reports.
Despite numerous flops along the way, Microsoft has a track record of astounding the IT world by surmounting mighty high hurdles. Could crossplatform application management be next in line? Jacqueline Emigh reports.
Several years from now, SMS and MOM will both be history. As Microsoft adopts a new 'self-healing' architecture, administration and monitoring tools will instead gradually be integrated into the OS, application servers, and applications. Don't hold your breath waiting for the changeover, though, reports Jacqueline Emigh.
A couple of years from now, will you still be relying on the same anti-spam strategy you're using today? Jacqueline Emigh takes a look at the anti-spam scene as it stands today and reveals where it appears to be headed in the near future.
The onslaught of spam is spawning a growing spate of solutions, but which approach to fighting spam is best for your organization? Join Jacqueline Emigh as she reveals the pros and cons of the various host-based services, hardware appliances, and software gateways currently available for combating spam.
The onslaught of spam is spawning a growing spate of solutions. Join Jacqueline Emigh as she delves into the issue of how spam proliferates so quickly, and why it's driving administrators to deploy anti-spam products in droves.
About three weeks from now, Matrix NetSystems and a still unnamed partner will launch a global Internet 'early warning system' aimed at alerting customers to cyberattacks in plenty of time to fend off damage. Meanwhile, Jacqueline Emigh reports the new Internet management service provider has just inked a deal with netVmg, developer of a solution for routing traffic across ISP links according to specified enterprise policies.
While most enterprises have yet to put policies in place for message archiving, a growing number of administrators are starting to address the issue and many analysts are now advocating the inclusion of archiving in corporate e-mail policies. Jacqueline Emigh surveys the archiving and records management (ARM) scene and covers several tools that automatically enforce e-mail archiving policies.
Most companies have learned the wisdom of backing up their e-mail, sometimes the hard way. Now, faced with growing regulatory pressures, especially with the passage of the Sarbanes-Oxley Act, and shrinking message stores, some administrators are moving on to 'arming' their messaging systems with software in the emerging category of ARM (archiving and records management).
Jacqueline Emigh undresses the sexy part of the computer security world in tackling the somewhat ambiguous term 'Digital Forensics.'
IBM is planning a new release of Lotus Domino/Notes for 2004 that will act as a migration path to the NextGen architecture based on WebSphere and DB2. Meanwhile, the first two products in the NextGen family -- a lightweight e-mail system and a learning management offering -- are slated for release this year.