**** * Mark your calendars! This month's Technology Officers' Association * (TecOA) meeting is in two weeks. Please join us for this month's topic: * **** * TOPIC: What is the best model for your network facilities and * infrastructure? Colocation, in-house, hosted, managed * services, outsoruced, etc... ??? * * NOTE: This free meeting is open to anyone who would like to attend. * Please feel free to pass along this email to others. * * Full meeting details at: http://www.tecoa.org **** TecOA (http://www.tecoa.org) is a free group open to technology leaders (CTO, CIO, VP, etc...) from all industries. The group's goal is to provide a forum for technology leaders to get together and discuss important or interesting issues facing the unique role of a technology executive in business. TecOA meetings are specifically designed to provide professional and personal value to attendees. To assist in this task, each meeting not only has a topic, but also a deliverable. This way, members will actually leave every meeting with both the knowledge and information provided, and also a tangible and useful result. For more information about TecOA, or to subscribe to our email discussion or announcement lists, visit the TecOA web site: http://www.tecoa.org Meetings are free and are always open to anyone who is interested in attending. TecOA meetings are held on the last Wednesday of every month at 4:00 PM. ---- This Month's Meeting Information TecOA - http://www.tecoa.org When: September 24, 2003 - 4:00 PM Where: The Muse Cafe - (Around the corner from ASU) 1032 South Terrace Road >From Rural (Scottsdale Road) and University, go south on Rural 1/2 mile, turn left (east) on Terrace. Topic: What is the best model for your network facilities and infrastructure? Colocation, in-house, hosted, managed services, outsoruced, etc... ??? Deliverable: Items to consider for your business' network architecture when looking at all the various options. -- == Jay Jacobson == Edgeos, Inc. -- http://www.edgeos.com == == Automated Information Security and Vulnerability Assessment