• New Job

    At management school I was given the following advice "When you arrive at a new job you get fired for what you do, not what you don't".

  • IPv6 – are you ready? Pt 2

    Last post, I discussed the imminent demise of spare IPv4 addresses, wherein the last addresses are likely to be allocated to end user organisations around November 2011. After this point, no more IPv4 addresses will be available – and this means that the way people will be connected to the Internet will have to change.

  • IPv6 – are you ready? Pt 1

    The Internet as you’ve come to know it is about to change. It’s not a bad change, and it won’t be a dramatic change, but it’s a change that if you work in this industry, you’ll need to know about – preferably now. Yesterday, actually.

  • Navigating IPv6

    On the 12th of January the Internet Society announced that several major internet content providers would be switching IPv6 on for the world on June 8th as “World IPv6 Day”.

  • How to manage network performance

    Before Ethernet, IP and converged services buying telecommunications services was an extremely complex business of choosing the right communications technology from a bewildering array of offerings including ISDN, X21, leased lines and Frame Relay.

  • How to get a campus/estate-wide fibre network at a fraction of the cost

    Passive Optical Networks, or PON, are essentially point-to-multipoint fibre networks using a combination of time division multiplexing (TDM) and wave division multiplexing (WDM) to allow multiple client” switches to talk to a “parent” switch along the same single core of fibre, with passive optical prisms (splitters) being used to direct the light down multiple paths.

  • Identity Theft: More than your credit card

    Identity theft is a crime whereby a malicious person gathers enough information to successfully impersonate another in order to gain some benefit. While most people may immediately think of identity theft as stolen credit card numbers or online banking details, identity theft encompasses a lot more than just this and has become integrated into a highly structured, organised crime.

  • Redundancy versus Capacity

    A truly reliable network has to be able to handle the volume of traffic and failure of equipment. The unfortunate truth is that you can have redundancy or load balanced capacity but rarely both at once.

SAGE-AU
SAGE-AU is a guest blogger.

SAGE-AU is a not-for-profit professional organisation that promotes the development of the system administration profession.
Blogs
Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia