Ransomware: Hard to Stop for Enterprises, Highly Profitable for CriminalsExtraHop Networks
Ransomware attacks doubled in 2015 and the trend is sure to continue. To meet this growing threat, enterprises must gain real-time visibility into anomalous behaviour. This session explains how organisations can detect and mitigate ransomware attacks using wire data.
Democratising Security: Update Your Policies or Update Your CVExtraHop Networks
Security is everyone's responsibility. That’s the lesson learned as enterprises seek to improve their detection and response for cyber incidents. This session introduces a new model where InfoSec sets the policies and delegates monitoring to application teams.
How to Simplify PCI DSS Compliance with AlienVault USMAlienVault
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Join us for this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture.
We'll cover:
Common PCI DSS compliance challenges
Questions to ask as you plan and prepare
Core capabilities needed to demonstrate compliance
How AlienVault Unified Security Management simplifies compliance and threat detection
Core capabilities needed to demonstrate compliance
How to simplify compliance with a unified approach to security
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
In this presentation from his webinar, Rob Black, CISSP, Founder and Managing Principal of Fractional CISO, explores IoT architectures, the different types of credentials in an IoT system, the common challenges with IoT credential management, and what you can do to mitigate the risks of credential-based attacks.
You can also watch the full webinar on-demand here: https://www.beyondtrust.com/resources/webinar/5-crazy-mistakes-administrators-make-iot-system-credentials/
Ransomware: Hard to Stop for Enterprises, Highly Profitable for CriminalsExtraHop Networks
Ransomware attacks doubled in 2015 and the trend is sure to continue. To meet this growing threat, enterprises must gain real-time visibility into anomalous behaviour. This session explains how organisations can detect and mitigate ransomware attacks using wire data.
Democratising Security: Update Your Policies or Update Your CVExtraHop Networks
Security is everyone's responsibility. That’s the lesson learned as enterprises seek to improve their detection and response for cyber incidents. This session introduces a new model where InfoSec sets the policies and delegates monitoring to application teams.
How to Simplify PCI DSS Compliance with AlienVault USMAlienVault
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Join us for this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture.
We'll cover:
Common PCI DSS compliance challenges
Questions to ask as you plan and prepare
Core capabilities needed to demonstrate compliance
How AlienVault Unified Security Management simplifies compliance and threat detection
Core capabilities needed to demonstrate compliance
How to simplify compliance with a unified approach to security
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
In this presentation from his webinar, Rob Black, CISSP, Founder and Managing Principal of Fractional CISO, explores IoT architectures, the different types of credentials in an IoT system, the common challenges with IoT credential management, and what you can do to mitigate the risks of credential-based attacks.
You can also watch the full webinar on-demand here: https://www.beyondtrust.com/resources/webinar/5-crazy-mistakes-administrators-make-iot-system-credentials/
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...BeyondTrust
In this Slideshare from the webinar of CQURE Academy Security Expert, Krystian Zieja, you will gain insights into:
- How sudo really works and what information we need to know before using it
- Working with sudo logging and using sudo in combination with a central logging server as a security control
- Session recording and replaying to analyze user behavior
- The enterprise-wide sudoers file management
-How to preventing common pitfalls of sudo configuration
- LDAP Integration
- Best practices for sudo usage
You can watch the full, on-demand webinar here: https://www.beyondtrust.com/resources/webinar/sudo-mode-part-2-privilege-mistakes-dismantle-entire-enterprise/
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
Rising network complexity and increased demands on business agility are rapidly hindering the traditional approach to managing security policies. The Security policy management maturity model can help you better understand your current network environment and provide you with a roadmap for improving both your security AND agility. Learn:
- The four stages of the maturity model
- How to compare your environment to the different stages
- Tips for orchestrating security policy management
- Real-life examples of benefits achieved by "moving up the curve"
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
In this presentation from her webinar, renowned cybersecurity expert Paula Januszkiewicz delves into what a truly holistic vulnerability management program should look like. When all parts are correctly established and working together, organizations can dramatically dial down their risk exposure. This presentation covers:
- The key phases and activities of the vulnerability management lifecycle
- The tools you need for an effective vulnerability management program
- How to prioritize your VM needs
- How an effective VM program can help you measurably reduce risk and meet compliance objectives
You can watch the full webinar here: https://www.beyondtrust.com/resources/webinar/tips-remediate-vulnerability-management-program
The complexity of implementing and maintaining IBM Guardium or a native audit solution within an enterprise environment can quickly run into trouble. Escalating costs, manularity, and gaps in coverage put your company at risk of a failed audit or data breach. This presentation will share the experiences of Imperva customers who have moved from native audit or Guardium to Imperva SecureSphere for database audit and protection (DAP).
Viewers will leave with an understanding of:
- Security and compliance factors that organizations should consider
- The methods of deployment within an enterprise environment
- The monetary and human costs associated with each DAP architecture
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platformlawriejanes
Preserv8 provides a cloud based email management platform that archives, filters, brands and provide business continuity. For more information http://www.ctseuropa.es
Improve Security Visibility with AlienVault USM Correlation DirectivesAlienVault
At the heart of SIEM is ability to correlate events from one or many sources into actionable alarms based on your security policies. AlienVault USM provides over 2100 correlation directives developed by the AlienVault Labs team, plus the ability to create your own custom rules.
Join us for this customer training session covering how to:
Ensure you are using the latest and greatest built-in correlation directives from AlienVault Labs
Write your own correlation directives based on events from one or more sources
Turn correlation information into actionable alarms
Use correlations to enforce your security policies
SIEM 101: Get a Clue About IT Security Analysis AlienVault
How real-time network sleuthing can help you lock down IT.
Everyone in IT knows that security is a big deal, but did you know that SIEM (security information and event management) can help protect your network from data breaches, even when traditional defenses fail?
If SIEM a mystery to you, lets grab Colonel Mustard, the candlestick and head to the library because this mystery is about to be solved. We'll be giving out more than just clues in this webinar: you'll discover explanations of security concepts, tools, tips and tricks as we unravel the mystery of how to better protect your network. Bring your magnifying glass, because you’ll also learn about event correlation, EPS, normalization and other things that will surely impress your friends.
Sign up now to learn from our chief gumshoe and noted SIEM Enthusiast Joe Schreiber. He’ll explain the reasons that SIEM exists, how it works, and most importantly - what you can do with it.
IT WAS MR. BODDY ALL ALONG!!!
Solera Networks delivers full network packet record and stream-to-disk technology to enhance security, improve network forensics, enforce compliance, and insure overall network availability. Think of it as TiVo for your network. In today's 10Gb environment, polling or sampling strategies are simply too incomplete for network management. Solera Networks' patented technology captures 100% of your network packet traffic. Unlike other solutions, our solutions can continuously stream-to-disk at unprecedented speeds (up to 6.4 Gbps), making comprehensive network recording and playback a reality. With Solera Networks' open platform you can choose which network tool to use. The Solera Networks appliance supports literally 100's of commercial, custom, and open-source applications via our virtual interface technology and live regeneration capabilities. For more information, visit http://www.soleranetworks.com.
Digital Forensics and Incident Response (DFIR) Training Session - JanuaryInfocyte
Join Infocyte co-founder and Chief Product Officer, Chris Gerritz, for a two-hour digital forensics and incident response (DFIR) training session.
During this month's session, Chris will lead training focused on artifact triage during IR investigations—reviewing shimcache, amcache, and process event logs.
Though this DFIR training session and examples are aligned with Infocyte's agentless detection and response platform, the topics, techniques, and principles covered can be carried over for use within your endpoint security solution—given it has similar capabilities as Infocyte.
To learn more about Infocyte, request a cybersecurity compromise assessment, or learn about our managed security services (supported by a global network of partners) like incident response and managed detection and response (MDR) services, please visit our website.
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...BeyondTrust
In this Slideshare from the webinar of CQURE Academy Security Expert, Krystian Zieja, you will gain insights into:
- How sudo really works and what information we need to know before using it
- Working with sudo logging and using sudo in combination with a central logging server as a security control
- Session recording and replaying to analyze user behavior
- The enterprise-wide sudoers file management
-How to preventing common pitfalls of sudo configuration
- LDAP Integration
- Best practices for sudo usage
You can watch the full, on-demand webinar here: https://www.beyondtrust.com/resources/webinar/sudo-mode-part-2-privilege-mistakes-dismantle-entire-enterprise/
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
Rising network complexity and increased demands on business agility are rapidly hindering the traditional approach to managing security policies. The Security policy management maturity model can help you better understand your current network environment and provide you with a roadmap for improving both your security AND agility. Learn:
- The four stages of the maturity model
- How to compare your environment to the different stages
- Tips for orchestrating security policy management
- Real-life examples of benefits achieved by "moving up the curve"
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
In this presentation from her webinar, renowned cybersecurity expert Paula Januszkiewicz delves into what a truly holistic vulnerability management program should look like. When all parts are correctly established and working together, organizations can dramatically dial down their risk exposure. This presentation covers:
- The key phases and activities of the vulnerability management lifecycle
- The tools you need for an effective vulnerability management program
- How to prioritize your VM needs
- How an effective VM program can help you measurably reduce risk and meet compliance objectives
You can watch the full webinar here: https://www.beyondtrust.com/resources/webinar/tips-remediate-vulnerability-management-program
The complexity of implementing and maintaining IBM Guardium or a native audit solution within an enterprise environment can quickly run into trouble. Escalating costs, manularity, and gaps in coverage put your company at risk of a failed audit or data breach. This presentation will share the experiences of Imperva customers who have moved from native audit or Guardium to Imperva SecureSphere for database audit and protection (DAP).
Viewers will leave with an understanding of:
- Security and compliance factors that organizations should consider
- The methods of deployment within an enterprise environment
- The monetary and human costs associated with each DAP architecture
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platformlawriejanes
Preserv8 provides a cloud based email management platform that archives, filters, brands and provide business continuity. For more information http://www.ctseuropa.es
Improve Security Visibility with AlienVault USM Correlation DirectivesAlienVault
At the heart of SIEM is ability to correlate events from one or many sources into actionable alarms based on your security policies. AlienVault USM provides over 2100 correlation directives developed by the AlienVault Labs team, plus the ability to create your own custom rules.
Join us for this customer training session covering how to:
Ensure you are using the latest and greatest built-in correlation directives from AlienVault Labs
Write your own correlation directives based on events from one or more sources
Turn correlation information into actionable alarms
Use correlations to enforce your security policies
SIEM 101: Get a Clue About IT Security Analysis AlienVault
How real-time network sleuthing can help you lock down IT.
Everyone in IT knows that security is a big deal, but did you know that SIEM (security information and event management) can help protect your network from data breaches, even when traditional defenses fail?
If SIEM a mystery to you, lets grab Colonel Mustard, the candlestick and head to the library because this mystery is about to be solved. We'll be giving out more than just clues in this webinar: you'll discover explanations of security concepts, tools, tips and tricks as we unravel the mystery of how to better protect your network. Bring your magnifying glass, because you’ll also learn about event correlation, EPS, normalization and other things that will surely impress your friends.
Sign up now to learn from our chief gumshoe and noted SIEM Enthusiast Joe Schreiber. He’ll explain the reasons that SIEM exists, how it works, and most importantly - what you can do with it.
IT WAS MR. BODDY ALL ALONG!!!
Solera Networks delivers full network packet record and stream-to-disk technology to enhance security, improve network forensics, enforce compliance, and insure overall network availability. Think of it as TiVo for your network. In today's 10Gb environment, polling or sampling strategies are simply too incomplete for network management. Solera Networks' patented technology captures 100% of your network packet traffic. Unlike other solutions, our solutions can continuously stream-to-disk at unprecedented speeds (up to 6.4 Gbps), making comprehensive network recording and playback a reality. With Solera Networks' open platform you can choose which network tool to use. The Solera Networks appliance supports literally 100's of commercial, custom, and open-source applications via our virtual interface technology and live regeneration capabilities. For more information, visit http://www.soleranetworks.com.
Digital Forensics and Incident Response (DFIR) Training Session - JanuaryInfocyte
Join Infocyte co-founder and Chief Product Officer, Chris Gerritz, for a two-hour digital forensics and incident response (DFIR) training session.
During this month's session, Chris will lead training focused on artifact triage during IR investigations—reviewing shimcache, amcache, and process event logs.
Though this DFIR training session and examples are aligned with Infocyte's agentless detection and response platform, the topics, techniques, and principles covered can be carried over for use within your endpoint security solution—given it has similar capabilities as Infocyte.
To learn more about Infocyte, request a cybersecurity compromise assessment, or learn about our managed security services (supported by a global network of partners) like incident response and managed detection and response (MDR) services, please visit our website.
Rise of the machines -- Owasp israel -- June 2014 meetupShlomo Yona
Rise of the machines -- Owasp israel -- June 2014 meetup
Shlomo Yona presents why it is a good idea to use Machine Learning in Security and explains some Machine Learning jargon and demonstraits with two fingerprinting examples: a wifi device (PHY) and a browser (L7)
Cloud computing can be safe, uncomplicated and move the organization forward IF YOU DO YOUR DUE DILIGENCE!!
It's your data and your neck so don't be afraid to ask the right questions and get them in writing
On the Application of AI for Failure Management: Problems, Solutions and Algo...Jorge Cardoso
Artificial Intelligence for IT Operations (AIOps) is a class of software which targets the automation of operational tasks through machine learning technologies. ML algorithms are typically used to support tasks such as anomaly detection, root-causes analysis, failure prevention, failure prediction, and system remediation. AIOps is gaining an increasing interest from the industry due to the exponential growth of IT operations and the complexity of new technology. Modern applications are assembled from hundreds of dependent microservices distributed across many cloud platforms, leading to extremely complex software systems. Studies show that cloud environments are now too complex to be managed solely by humans. This talk discusses various AIOps problems we have addressed over the years and gives a sketch of the solutions and algorithms we have implemented. Interesting problems include hypervisor anomaly detection, root-cause analysis of software service failures using application logs, multi-modal anomaly detection, root-cause analysis using distributed traces, and verification of virtual private cloud networks.
A distributed system in its most simplest definition is a group of computers working together as to
appear as a single computer to the end-user. These machines have a shared state, operate
concurrently and can fail independently without affecting the whole system’s uptime.
This is in line with ever-growing technological expansion of the world, distributed systems are
becoming more and more widespread. Take a look at the increasing number of available
computer technologies/innovation around, this is sporadically increasing, and this result in
intense computational requirement.
Yeah, Moore’s law proposed more computing power by fitting more transistors (which
approximately doubles every two years) into a simple chip using cost-efficient approach - cool,
but over the past 5 years, there has been little deviation from this - ability to scale horizontally
and not just vertically alone.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Digital Tools and AI for Teaching Learning and Research
Meeting 2 introdcution network administrator
1. 1 tohttps://github.com/syaifulahdan/
Computer Network Administration
Introduction
Network Administration
What is Network Administration
The core management areas
Fault management
Master boot Record
Configuration and Name Management
OSI - Account Management
OSI - Performance Management
OSI - Security Management
Structure of Systems and Network Management Organisation
Corporate Networked Environments
Network Administrators Tasks
Tasks of a Network Administrator
How to be a Sys/Net Admin
5. 5 to
Fault management
The facilities that enable the
detection,
isolation, and
correction
of abnormal operation of the OSI
environment.
6. 6 to
Configuration and Name Management
The services and facilities that
• control
• identify
• collect and provide data
to clients and managed objects,
so assisting in continuous operation of
interconnection services.
7. 7 to
OSI - Account Management
The facilities that enable
charges to be established for the use
of managed objects and
costs to be identified for the use of
those managed objects.
8. 8 to
OSI - Performance Management
The Facilities needed to evaluate
Behaviour of managed objects
Effectiveness of communication activities
9. 9 to
OSI - Security Management
Address those aspects of OSI security
essential to:
operate OSI network management
correctly and
to protect managed objects
12. 12 to
Corporate Networked Environments
Have team(s) of specialists in various areas
Well defined tasks
job descriptions
In small networks usually one person
multi-skilled and multi-tasked
In reality – often somewhere in between….
14. 14 to
Tasks of a
Network Administrator
Security Management
Performance Management
Planning for Growth
Fault Management and Recovery
Account/User Management
Networked Application Support
17. 17 to
Planning for Growth
A Network (or any organisation) is not
static
Growth means increased load on a
network. This must be planned for….
Systems eventually need replacement.
This must be planned for – in
advance…
18. 18 to
Fault Management and Recovery
Monitoring
Reporting status
Testing
Fixes and Patches
Updates
Repairs
Change Management
19. 19 to
Account / User Management
Communication Facilities
Connection - Rental - Charges
Hardware Usage
Lease - Rent - Hire
Consumables Usage
Power, Paper, Media (Diskettes, CDs…)
Software Usage
Licensing,
Tolls,
Application usage
20. 20 to
Account / User Management
Accounts are Managed for:
Intrusion detection / prevention
Charging for Services
Legal protection of the Organisation
21. 21 to
Networked Application Support
Client / Server systems support
Internet support
Server support
Applications and Hardware
Helpdesk
Trouble report / Bug fixes
Printing
eMail
22. 22 to
How to be a Sys/Net Admin
(yet another Job Description…)
Learn Operating System basics eg Unix
Learn shell utilities and script programming
Learn how to Install and Configure OS
Learn DNS and Bind
Learn TCP/IP networking
Learn NFS and NIS (or equivalent…)
Learn about system tuning and accounting
Learn Compile and Link (eg C and make)
23. 23 to
SAGE SysAdmin
Job Descriptions
http://www.sage-au.org.au/
http://sageweb.sage.org/jobs/thefield/j
obs-descriptions.html
24. 24 to
Goals of System/Network Administration
Put together a network of computers
Get them running
Keep them running (despite Users….)
Provide a Service to Users
Requires skills of
Mechanic
Sociologist
Researcher
25. Challenges of
System/Network Administration
Systems or Network Administration is
more than just installing computers or
networks.
It is about planning and designing an
efficient community of computers that
allow users to get their jobs done.
26. 26 to
Challenges of Administration
Design Logical, Efficient networks
Easily deploy & update many machines
Decide what services are needed
know the business tasks & customers
Plan and implement adequate security
Provide comfortable User environment
Be able to fix errors and problems
Keep track of & be able to use knowledge
28. 28 to
PRACTICE
Convention or The Best Solution
PRACTICE = “How things are done here”
Have you ever wondered…
Why are things done in certain ways?
Which way is best? Usually it’s because:
Someone did it once, and everyone copied without really
thinking about it
People have thought much about it and this really is the best
way…
An arbitrary choice was made, and it is now a matter of
convention
29. 29 to
Comparison of System/Network
Management Styles
Fire-Fighting
Managing by responding to situations when they happen
(Reactive)
Preventative management
Monitor network and make repairs and changes before
problems appear (Proactive)
These are two opposite extremes.
Most real managers combine both.
30. 30 to
Fire-Fighting
Investigate the Fault or Problem
Isolate the problem and identify/define it
Use tests and tools to diagnose the problem
Solve the problem and document the solution
Prioritize multiple problems
35. 35 to
Sources of Information for
System/Network Administrators
Manuals and Online Documentation
World Wide Web
RFCs, FYIs, IENs
News groups, Discussion lists, WebLogs
Meetings and Seminars
SAGE/Usenix, Novell Brainshare, Microsoft
TechNet/TechEd
How-To books