ITKE Community Blog

Jan 27 2009   4:09PM GMT

IT Knowledge Exchange Community Update for 01/27/09

JennyMack Jenny Mackintosh Profile: JennyMack

Here is what’s happening in our community lately:

  • Ask a question, win a t-shirt
  • Featured member of the week
  • Featured questions
  • Featured blog posts
  • New community blogs
  • Messages from the TechTarget network

Ask a Question, Win a T-Shirt

This week, community members Kutu, MurrayInfoSys, Teandy and Ctssenthil are each receiving a t-shirt as thanks for participating on IT Knowledge Exchange. Keep participating and you could receive your very own IT Knowledge Exchange t-shirt. We will be rewarding members weekly.

Also, be sure to check out our latest “Best Questions” t-shirt giveaway, running through February 9th.

Featured ITKE Member of the week

This week’s IT Knowledge Exchange featured member is Mrdenny, formally known as Denny Cherry. Denny is a Senior Database Administrator, a Microsoft MVP, and is our top Knowledge Point earner on the site to date, with over 35,000 Knowledge Points! If you have a question about SQL Server, rest assured that you will likely be hearing from Denny. You can also gain further insight from his blog, SQL Server with Mr. Denny.

You can visit his profile here to read more about him.

Congratulations, Mrdenny, on being our member of the week! We’re glad to have you in the community.

Featured Questions

Over the past week, we’ve seen some great questions come through IT Knowledge Exchange, but some questions are still waiting for an answer. Click on one of our selected questions below, and spread the knowledge!

>> QA tool for JavaScript heavy load application

>> How to back up all the shared folders from NAS storage to tape drive

>> Linked server question

>> Browser stability issues in Ubuntu 8.04

>> Exchange 2007 SP1 is running on VMware ESX 3.5 – memory leak

>> Compuware Abend-Aid advice

>> Backup Exec 11d on Windows Server 2003 SBS is hanging

>> Maximizing traffic by scheduling FTP and HTTP traffic

>> Saving global address list in a PST

>> Cluster in Exchange Server 2003

Featured Blog Posts

Browse the sampling of selected blog posts below or go here to view all.

>> Who deserves VMware’s new award – the vExpert? (David’s Cisco Networking Blog)

>> Do you manage a firewall and want to find the source of malicious network activity? Check out the Internet Malicious Activity Map (IT Trenches)

>> Avaya muddies the UC waters (Unified Communications: Click to Talk)

>> Ouch! RIM’s CEOs are hit with a major fine (The Musings of an IT Consultant)

>> Back to Basics: What are indexes and what are they used for? (SQL Server with Mr. Denny)

Start your own IT blog and earn some extra cash.

New Community Blogs

IT Governance, Risk and Compliance | Robert E. Davis

This blog provides content regarding IT Governance, Risk, and Compliance topics. Occasionally, readers will receive suggestions enabling organizational enhancements to IT managerial principles and practices consistent with generally accepted international standards.

http://itknowledgeexchange.techtarget.com/it-governance/

Messages from the TechTarget network

>>  Software requirements info center

Requirements gathering is an essential part of software development but the process can be difficult and costly. This in-depth library of resources will help you to better understand and improve the requirements gathering process.

>> Free desktop virtualization seminar, featuring Brian Madden

Virtualization technologies have the potential to help IT professionals bring new order to the long-standing chaos of enterprise desktop management. But what does desktop virtualization really mean? At this free one-day seminar coming to six cities throughout the year starting in March, independent industry analyst and blogger Brian Madden defines terms, separates vendor hype from reality, and describes real-word scenarios that desktop virtualization can and can’t address. Seating is limited, register today!

>> Podcast: How to compare data deduplication products

Knowing how to evaluate and compare data deduplication vendor products will save you time, money, and sanity when making your next purchase. Download this podcast to discover key tips on how to evaluate and measure deduplication service providers.

As always, we want your feedback.
Send it to me at jenny@itknowledgeexchange.com

Thanks,

Community Manager

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: