author:

Networks

Don’t Shut Your Pi-Hole, Monitor It! (The Sequel)


Back in October, 2019, I shared my love of both Raspberry Pi (https://www.raspberrypi.org/) devices and the Pi-Hole (https://pi-hole.net/) software; and showed how—with a little know-how about Application Programming Interfaces (APIs) and scripting (in this case, I used it as an excuse to make my …



author:


ITSM

6 Types of IT Assets Your CMDB Should Track


IT asset management (ITAM) and configuration management database (CMDB) are critical components of a service desk, playing a key role in how inventory within an organization is tracked and managed. Asset management tracks and reports the value and ownership of all assets throughout their …



author:


Security

Three Ways the Department of Defense Can Plug Security Holes


An early 2019 report from the Defense Department Officer of Inspector General revealed how difficult it’s been for federal agencies to stem the tide of cybersecurity threats. Although the DoD has made significant progress toward bolstering its security posture, 266 cybersecurity vulnerabilities still existed. …


author:


Database

Why Machine Learning Matters


While there are many silly depictions of machine learning and artificial intelligence throughout Hollywood, its reality delivers significant benefits. Administrators today oversee so many tasks, like system monitoring, performance optimizing, networking configuration, and more. Many of these tasks can be monotonous and tedious. Also, …


author:


Networks Systems

Old Tech, New Name?


The marketing machines of today often paint new technologies to suggest they’re the best thing since sliced bread. Sometimes though, the new products are just a rehash of an existing technology. In this blog post, I’ll look at some of these. As some of …