****
* Mark your calendars! This month's Technology Officers' Association
* (TecOA) meeting is in one week. Please join us for this month's topic:
*
****
* TOPIC: What is the best model for your network facilities and
* infrastructure? Colocation, in-house, hosted, managed
* services, outsoruced, etc... ???
*
* NOTE: This free meeting is open to anyone who would like to attend.
* Please feel free to pass along this email to others.
*
* Full meeting details at: http://www.tecoa.org
****
TecOA (
http://www.tecoa.org) is a free group open to technology leaders
(CTO, CIO, VP, etc...) from all industries. The group's goal is to provide
a forum for technology leaders to get together and discuss important or
interesting issues facing the unique role of a technology executive in
business.
TecOA meetings are specifically designed to provide professional and
personal value to attendees. To assist in this task, each meeting not only
has a topic, but also a deliverable. This way, members will actually leave
every meeting with both the knowledge and information provided, and also a
tangible and useful result.
For more information about TecOA, or to subscribe to our email discussion
or announcement lists, visit the TecOA web site:
http://www.tecoa.org
Meetings are free and are always open to anyone who is interested in
attending. TecOA meetings are held on the last Wednesday of every
month at 4:00 PM.
----
This Month's Meeting Information
TecOA -
http://www.tecoa.org
When:
September 24, 2003 - 4:00 PM
Where:
The Muse Cafe - (Around the corner from ASU)
1032 South Terrace Road
>From Rural (Scottsdale Road) and University, go south on Rural 1/2 mile,
turn left (east) on Terrace.
Topic:
What is the best model for your network facilities and infrastructure?
Colocation, in-house, hosted, managed services, outsoruced, etc... ???
Deliverable:
Items to consider for your business' network architecture when looking
at all the various options.
--
== Jay Jacobson
== Edgeos, Inc. --
http://www.edgeos.com
==
== Automated Information Security and Vulnerability Assessment