Monitoring and Observability

Latest Posts in

IT Pros and Pirates

Ah yes, it’s IT Pro Day again – very soon! Each year, on the third Tuesday of September, we celebrate the unsung heroes of IT. Well, someone did sing, but…

Delivering a Great User Experience Must Be a Top Priority

While much has been done about the need to modernize federal IT networks, little has been written about the importance of optimizing the user experience for government employees. Yet modernization…

IT Pro Day 2019—It Figures.

Recently, I was building out a demonstration and realized I didn’t have the setup I needed. After a little digging, I realized I wanted to show how to track changes…

How to Choose a Hyperconverged Infrastructure Solution

Running a traditional data center infrastructure for years can put your company in a rut, especially when it’s time to pick a new solution. When electing to trade out your…

Varying Approaches to Hyperconverged Infrastructure, or Why This Over That?

In this third post on the subject, I’ll discuss hyperconverged architectural approaches. I want to share some of my experiences in how and why my customers have taken different choices,…

Cloud Smart’s Success Relies on Smart Network Monitoring

The Office of Management and Budget’s Cloud Smart proposal signals both the end of an era and the beginning of new opportunities. The focus has shifted from ramping up cloud…

VMware Certifications

Obtaining a VMware certification requires effort, dedication, and a willingness to learn independently with a commitment to the subject matter. To fulfill the requirements made by VMware, you must attend…

6 Risk Management Best Practices You Can Implement Today

Understanding risk management (and why it’s important) as I highlighted in my last post, Why Risk Management Is Critical to Your IT Infrastructure, is essential as you begin to plan…

What’s Up With Virtualization? Virtualization Basics 101

In part one of this series, I tried to apply context to the virtualization market—its history, how it’s changed the way we deploy infrastructure, and how it’s developed into the de…

2 Key Assets in the Government’s Cybersecurity Battle (Part II)

Read part one here. Technology: Providing the Necessary Visibility Cybersecurity personnel can’t succeed without the proper tools, but many of them don’t have the technology necessary to protect their agencies.…