<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
<title>Realtime Nexus Digital Library</title><!-- working? -->	<atom:link href="http://nexus.realtimepublishers.com/content/?feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://nexus.realtimepublishers.com/content</link>
	<description>Technology Books and Articles for IT Professionals</description>
	<lastBuildDate>Fri, 04 Mar 2011 20:49:42 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0.1</generator>
			<item>
		<title>Chapter 3: What Is Required by PCI Data Security Standards?</title>
		<link>http://nexus.realtimepublishers.com/content/?alert=chapter-3-what-is-required-by-pci-data-security-standards</link>
		<comments>http://nexus.realtimepublishers.com/content/?alert=chapter-3-what-is-required-by-pci-data-security-standards#comments</comments>
		<pubDate>Fri, 13 Jan 2012 16:53:37 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[pci compliance]]></category>
		<category><![CDATA[pci dss]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=alert&#038;p=1589</guid>
		<description><![CDATA[This chapter will describe these requirements in a slightly  different structure, organized more around clusters of requirements that would  be addressed by different groups within an IT department, for example,  developers and systems administrators. These are not hard and fast divisions.  Some of the requirements necessitate collaboration between developers, systems  administrators, application architects, and application managers. Keeping in  mind the need for multiple skill sets, we will discuss the requirements  organized around...]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1589</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chapter 3: Securing Active Directory</title>
		<link>http://nexus.realtimepublishers.com/content/?alert=chapter-3-securing-active-directory</link>
		<comments>http://nexus.realtimepublishers.com/content/?alert=chapter-3-securing-active-directory#comments</comments>
		<pubDate>Mon, 12 Dec 2011 20:24:50 +0000</pubDate>
		<dc:creator>dmarelia</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[Active Directory]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=alert&#038;p=1586</guid>
		<description><![CDATA[This chapter provides a practical guide to protecting your AD-based identity data. It is not part of the life cycle I spoke about in earlier chapters, but it is an important part of ensuring that any identity system you implement that leverages AD is protected such that it is able to do its job of authenticating and authorizing the right people to the right resources. All the great identity provisioning processes in the world won’t help you if your AD is a free-for-all that anyone can fiddle with to their heart’s content. This chapter will dive into the AD security model and provide techniques and best practices for securing the data that resides in AD.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1586</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chapter 2: Overview of SSL Certificates</title>
		<link>http://nexus.realtimepublishers.com/content/?alert=chapter-2-overview-of-ssl-certificates</link>
		<comments>http://nexus.realtimepublishers.com/content/?alert=chapter-2-overview-of-ssl-certificates#comments</comments>
		<pubDate>Mon, 12 Dec 2011 19:13:04 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[pci]]></category>
		<category><![CDATA[ssl]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=alert&#038;p=1583</guid>
		<description><![CDATA[SSL certificates are an important element of the security infrastructure that protects systems and communications. In that role, they also enable customers to trust businesses that customers might otherwise be unfamiliar with. What is it about SSL certificates that enable these properties? To answer this question, we must understand the components of an SSL certificate and how they are used for authentication and encryption. We also need to understand different uses of SSL certificates and how they enable the formation of trust. This chapter is organized into five sections that will address these issues]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1583</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Avoiding Common PCI Data Security Standard Compliance Issues</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=avoiding-common-pci-data-security-standard-compliance-issues</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=avoiding-common-pci-data-security-standard-compliance-issues#comments</comments>
		<pubDate>Mon, 21 Nov 2011 21:01:44 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[pci compliance]]></category>
		<category><![CDATA[pci dss]]></category>
		<category><![CDATA[tools]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1573</guid>
		<description><![CDATA[The Payment Card Industry Data Security Standard (PCI DSS) is an industry regulation designed to mitigate risks to the integrity and confidentiality of payment card data. The PCI DSS includes a number of requirements designed to improve the security of information systems storing and processing payment card data. Businesses that must comply with the PCI DSS are required to have periodic assessments performed by external examiners or, in some cases, through self-assessment.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1573</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chapter 3: Connecting Everyone to the IT Management Loop</title>
		<link>http://nexus.realtimepublishers.com/content/?alert=chapter-3-connecting-everyone-to-the-it-management-loop</link>
		<comments>http://nexus.realtimepublishers.com/content/?alert=chapter-3-connecting-everyone-to-the-it-management-loop#comments</comments>
		<pubDate>Wed, 16 Nov 2011 23:48:14 +0000</pubDate>
		<dc:creator>djones</dc:creator>
				<category><![CDATA[IT Management]]></category>
		<category><![CDATA[IT Monitoring]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=alert&#038;p=1571</guid>
		<description><![CDATA[IT management has for too long involved discrete, disconnected processes that often leave key participants wondering what's going on. Bringing everyone—users, managers, IT professionals, and more—into the loop can create significant benefits as well as reduce the tendency to fall back into discipline-based silos. This is where the integration between monitoring and service desk truly happens, and these concepts deliver the most critical, central themes discussed throughout this book. It's all about communication—ways to better achieve communication as well as create opportunities for continuous improvement.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1571</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chapter 2: Managing the Identity Lifecycle</title>
		<link>http://nexus.realtimepublishers.com/content/?alert=chapter-2-managing-the-identity-lifecycle</link>
		<comments>http://nexus.realtimepublishers.com/content/?alert=chapter-2-managing-the-identity-lifecycle#comments</comments>
		<pubDate>Wed, 16 Nov 2011 21:39:54 +0000</pubDate>
		<dc:creator>dmarelia</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[Active Directory]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=alert&#038;p=1568</guid>
		<description><![CDATA[Managing identity is ultimately about managing access to your corporate resources. Users authenticate to resources with their identity, then use the properties of that identity (for example, group membership) to get authorized to resources. In a typical midsize-to-large organization, you might find the following sources of identity...]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1568</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server – Part 7</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-7</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-7#comments</comments>
		<pubDate>Tue, 01 Nov 2011 23:43:12 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[sharepoint]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[ssl]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1506</guid>
		<description><![CDATA[Databases are repositories for a wide variety of enterprise information. Much of that information is confidential and in some cases subject to regulations governing how securely it should be stored and transmitted. SQL Server is Microsoft's relational database, and like many other enterprise applications from that vendor, it supports the use of SSL certificates to improve the security of communications between the database server and client devices. Again, we assume you have purchased or generated an SSL certificate for use with your SQL Server database.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1506</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server – Part 6</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-6</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-6#comments</comments>
		<pubDate>Tue, 01 Nov 2011 23:41:15 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[sharepoint]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[ssl]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1504</guid>
		<description><![CDATA[SharePoint Server2010 has a multi-step installation process supported by the installation wizard. Once SharePoint is installed, though, additional steps are required to install an SSL certificate.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1504</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server – Part 5</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-5</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-5#comments</comments>
		<pubDate>Tue, 01 Nov 2011 23:40:04 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[sharepoint]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[ssl]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1502</guid>
		<description><![CDATA[SharePoint server is a collaboration portal. Documents, calendars, images, and other potentially confidential and private documents are stored and exchanged in this application. Secure communications are important here just as they are in Microsoft Exchange.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1502</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server – Part 4</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-4</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-4#comments</comments>
		<pubDate>Tue, 01 Nov 2011 23:37:06 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[sharepoint]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[ssl]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1500</guid>
		<description><![CDATA[Enterprise Microsoft Exchange deployments can require a somewhat complex architecture. The reason is that Microsoft Exchange has been designed to maintain adequate performance levels while scaling to a large user base. The common way to deal with the need for scalability (as well as reliability) is to distribute the workload over multiple servers.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1500</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server – Part 3</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-3</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-3#comments</comments>
		<pubDate>Tue, 01 Nov 2011 23:35:29 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[sharepoint]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[ssl]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1498</guid>
		<description><![CDATA[Microsoft Exchange Server is a widely used email server and a logical candidate for supporting encrypted communications. In this section, we will discuss the need for SSL in Exchange Server, how to install an SSL certificate in Exchange Server, and how to verify an SSL certificate in Exchange Server. Let's start with the motivation for using SSL certificates in email servers.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1498</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server – Part 2</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-2</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=installing-ssl-certificates-in-exchange-server-sharepoint-and-sql-server-%e2%80%93-part-2#comments</comments>
		<pubDate>Tue, 01 Nov 2011 23:31:16 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[sharepoint]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[ssl]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1496</guid>
		<description><![CDATA[Once the Certificate Store has been set up on a server, we need to acquire an SSL certificate for the application we are working with. We can use a certificate from a trusted third-party provider or we can generate a self-signed certificate. As noted earlier, the former is appropriate for production servers that will be used by the public or business partners outside of the organization; the latter is appropriate for testing and development.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1496</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server &#8211; Part 1</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=part-1</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=part-1#comments</comments>
		<pubDate>Tue, 01 Nov 2011 23:19:12 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[sharepoint]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[ssl]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1494</guid>
		<description><![CDATA[SSL certificates are often associated with Web servers such as Microsoft IIS, but they are actually used in a variety of Microsoft applications, including Microsoft Exchange email server, Microsoft SharePoint collaboration server, and the Microsoft SQL Server database. The process of installing an SSL certificate has both common and application-specific steps across these applications. This final chapter discusses how to install a SSL certificate in Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. We begin with a quick overview of the common parts of the installation process, then discuss each application in more detail.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1494</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chapter 1: Overview of Payment Card Industry Data Security Standards</title>
		<link>http://nexus.realtimepublishers.com/content/?alert=chapter-1-overview-of-payment-card-industry-data-security-standards</link>
		<comments>http://nexus.realtimepublishers.com/content/?alert=chapter-1-overview-of-payment-card-industry-data-security-standards#comments</comments>
		<pubDate>Thu, 20 Oct 2011 22:33:26 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[pci compliance]]></category>
		<category><![CDATA[pci dss]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[ssl certificates]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=alert&#038;p=1514</guid>
		<description><![CDATA[The Shortcut Guide to PCI Compliance and How SSL Certificates Fit provides an overview of PCI DSS and SSL certificates, outlines what is required by PCI DSS, and provides a PCI compliance checklist. We start in this chapter by discussing three fundamental questions:]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1514</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Series: Streamlining Configuration Management</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=new-series-streamlining-configuration-management</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=new-series-streamlining-configuration-management#comments</comments>
		<pubDate>Wed, 05 Oct 2011 19:57:55 +0000</pubDate>
		<dc:creator>dsullivan</dc:creator>
				<category><![CDATA[IT Monitoring]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[configuration management]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1491</guid>
		<description><![CDATA[Today, we are announcing the release of a new essentials series entitled The Essentials Series: Streamlining Configuration Management, authored by Dan Sullivan. From the author: &#34;The volume of work involved in configuration management can overwhelm network managers. Fortunately, configuration management lends itself to automation with tools for asset discovery, scripting and reporting that yield benefits [...]]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1491</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Complete Book: Implementation Strategies for Fulfilling and Maintaining IT Compliance</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=complete-book-implementation-strategies-for-fulfilling-and-maintaining-it-compliance</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=complete-book-implementation-strategies-for-fulfilling-and-maintaining-it-compliance#comments</comments>
		<pubDate>Mon, 26 Sep 2011 20:46:51 +0000</pubDate>
		<dc:creator>kbeaver</dc:creator>
				<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[it compliance]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1488</guid>
		<description><![CDATA[Realtime Publishers is proud to announce the complete book entitled <em>Implementation Strategies for Fulfilling and Maintaining IT Compliance</em> by Kevin Beaver is now available for download!  This book is a practical guide to real-world issues related to IT compliance. It's great for anyone faced with implementing the standards mandated by regulations such as HIPAA, HITECH Act, GLBA, SOX, and PCI DSS. CIOs, compliance officers, IT directors and network administrators can all benefit from the anecdotal stories, down-to-earth strategies and sage advice for creating gaining and maintaining control of IT compliance so that it can enable rather than hinder the business moving forward.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1488</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chapter 2: Eliminating the Silos in IT Management</title>
		<link>http://nexus.realtimepublishers.com/content/?alert=chapter-2-eliminating-the-silos-in-it-management</link>
		<comments>http://nexus.realtimepublishers.com/content/?alert=chapter-2-eliminating-the-silos-in-it-management#comments</comments>
		<pubDate>Mon, 19 Sep 2011 21:39:23 +0000</pubDate>
		<dc:creator>djones</dc:creator>
				<category><![CDATA[IT Management]]></category>
		<category><![CDATA[IT Monitoring]]></category>
		<category><![CDATA[IT silos]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=alert&#038;p=1486</guid>
		<description><![CDATA[In the previous chapter, I proposed that one of the biggest problems in modern IT is the fact that we manage our environment in technology-specific silos: database administrators are in charge of databases, Windows admins are in charge of their machines, VMware admins run the virtualization infrastructure, and so forth. I'm not actually proposing that we change that exact practice-having domain-specific experts on the team is definitely a benefit. However, having these domain-specific experts each using their own unique, domain-specific tool definitely creates problems. In this chapter, we'll explore some of those problems, and see what we can do to solve them and create a more efficient, unified IT environment.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1486</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chapter 1: Active Directory &#8211; An Important Part of Identity and Access Control</title>
		<link>http://nexus.realtimepublishers.com/content/?alert=chapter-1-active-directory-an-important-part-of-identity-and-access-control</link>
		<comments>http://nexus.realtimepublishers.com/content/?alert=chapter-1-active-directory-an-important-part-of-identity-and-access-control#comments</comments>
		<pubDate>Thu, 15 Sep 2011 22:04:14 +0000</pubDate>
		<dc:creator>dmarelia</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Security and Compliance]]></category>
		<category><![CDATA[Windows Administration]]></category>
		<category><![CDATA[Active Directory]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=alert&#038;p=1479</guid>
		<description><![CDATA[Microsoft&#8217;s Active Directory (AD) product had humble beginnings. When it first came on the scene in 2000, Novell Netware was the dominant directory service on the market, and was certainly the most popular directory service to leverage the industry-standard Lightweight Directory Access Protocol (LDAP). Fortunately for AD, after a number of missteps on Novell&#8217;s part, [...]]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1479</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chapter 1: Managing Your IT Environment: Four Things You&#8217;re Doing Wrong</title>
		<link>http://nexus.realtimepublishers.com/content/?alert=chapter-1-managing-your-it-environment-four-things-youre-doing-wrong</link>
		<comments>http://nexus.realtimepublishers.com/content/?alert=chapter-1-managing-your-it-environment-four-things-youre-doing-wrong#comments</comments>
		<pubDate>Tue, 06 Sep 2011 21:08:17 +0000</pubDate>
		<dc:creator>djones</dc:creator>
				<category><![CDATA[IT Management]]></category>
		<category><![CDATA[IT Monitoring]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=alert&#038;p=1475</guid>
		<description><![CDATA[Some of the philosophies that underpin many organizations' IT management practices are really becoming a detriment to the organizations that IT is meant to support. The discussion in this chapter will revolve around several core themes, which will continue to drive the subsequent chapters in this book. The goal will be to help change your thinking about how IT management-particularly monitoring-should work, what value it should provide to your organization, and how you should go about building a better-managed IT environment.]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1475</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Series: Protecting Client Data in the Cloud: A Channel Perspective</title>
		<link>http://nexus.realtimepublishers.com/content/?tip=1470</link>
		<comments>http://nexus.realtimepublishers.com/content/?tip=1470#comments</comments>
		<pubDate>Mon, 29 Aug 2011 16:49:37 +0000</pubDate>
		<dc:creator>etittel</dc:creator>
				<category><![CDATA[IT Management]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[managed service provider]]></category>

		<guid isPermaLink="false">http://nexus.realtimepublishers.com/content/?post_type=tip&#038;p=1470</guid>
		<description><![CDATA[Today, we are announcing the release of a new essentials series entitled <em>The Essentials Series: Protecting Client Data in the Cloud: A Channel Perspective</em>, authored by Ed Tittel.  ]]></description>
		<wfw:commentRss>http://nexus.realtimepublishers.com/content/?feed=rss2&amp;p=1470</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
