ITKE Community Blog

Jan 22 2009   3:53PM GMT

IT Knowledge Exchange Community Update for 01/22/08

JennyMack Jenny Mackintosh Profile: JennyMack

Here is what’s happening in our community lately:

  • Ask a question, win a t-shirt
  • Featured IT blogger
  • Featured questions
  • Featured blog posts
  • Messages from the TechTarget network

Ask a Question, Win a T-Shirt

We’re rewarding great questions on IT Knowledge Exchange by giving away ten t-shirts to good questions asked in the community through February 9th. View the blog post today for more information and start firing up those questions.

Featured IT Blogger of the Week

This week’s featured blogger is Phil Koster, on “Joe, the Consultant.” Phil is a systems engineer who blogs about the benefits and caveats of enterprise virtualization. He was kind enough to feature us on his blog last month, and we’re glad to reciprocate! You can visit his blog here:

Featured Questions

Over the past week, we’ve seen some great questions come through IT Knowledge Exchange, but some questions are still waiting for an answer. Click on one of our selected questions below, and spread the knowledge!

>> Installing a cluster environment in Exchange 2003

>> VMware ESX vs. Hyper-V

>> Hyperion Planning: Problem with Web form for data entry: dynamic entry

>> How do you manage the power capacity of your server room? What tools or tricks do you use? Do you provision more power than you need for those “just in case” scenarios?

>> Exchange 2003 recipient limits in group policy

>> Recommendation for handling wall phone plates in UTP cable installations

>> Connecting to servers on private network after VPN connection completed

>> Enabling QoS on my Cisco 3620 router for my VoIP traffic

>> Skype on company equipment and networks

>> Synchronizing between Distributor and Subscriber in SQL Server merge replication

Featured Blog Posts

Browse the sampling of selected blog posts below or go here to view all.

>> Cisco might be entering the server market (Musings of an IT Consultant)

>> What about spending money when you have no money? (IT Career JumpStart)

>> Security News – Videos from Hack in the Box 2008 Malaysia available for download (IT Trenches)

>> Windows 7 after my first week (SQL Server with Mr. Denny)

>> Cisco’s latest wireless innovation – New 802.11n Access Point (Network Technologies and Trends)

Start your own IT blog and earn some extra cash.

Messages from the TechTarget network

>> Security in 2009: Learn how to do more with less

Security never sleeps. Compliance requirements don’t deflate in a
recession. Now more than ever, IT teams must tighten privacy
policies, make smart purchasing decisions and learn how to do more
with less. Attend “How to Use SIEM to Cut Costs and Save Money” on
January 29th at 2:00 pm EST. Mark your calendar and register online
through our secure website today!

>> Six Steps to Reduce Risk and Improve Control Over Real-Time Communications

Instant messaging (IM) and other real-time communications are widely
used throughout most enterprises today, but their use remains largely
unmanaged. That puts organizations at risk for loss of intellectual
property and crucial data, rising costs around e-discovery, fines for
noncompliance, legal exposure from inappropriate use, and network
vulnerabilities resulting from unauthorized access. To mitigate
real-time communications risks and maintain accountability,
organizations must secure buy-in from top management, establish
strong policies for message archiving and appropriate use, and adopt
good tools to enforce those policies. This paper identifies key
concerns and identifies six steps to improve control over
organizational use of real-time communications.

As always, we want your feedback.
Send it to me at


Community Manager

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: