Monitoring and Observability

Latest Posts in

2 Key Assets in the Government’s Cybersecurity Battle (Part II)

Read part one here. Technology: Providing the Necessary Visibility Cybersecurity personnel can’t succeed without the proper tools, but many of them don’t have the technology necessary to protect their agencies.…

Know Your IT Department Frenemies (aka Why Can’t We Be Friends?)

If you’re in tune with the various tech communities, you’ve probably noticed a big push for professional development in the technical ranks. I love the recognition that IT pros need…

Data Tampering: The Quiet Threat

For decades, data tampering has been limited to relatively simple attacks, like data corruption (which is immediately noticeable) or “cooking the books” to hide embezzlement or other financial failings. Of late, however,…

Is Hyperconverged Infrastructure Beneficial for the SMB?

So much in IT today is focused on the enterprise. At times, smaller organizations get left out of big enterprise data center conversations. Enterprise tools are far too expensive and…

Why Choose HCI Over Other Virtualization Approaches?

This is the second of a series of five posts on the market space for hyperconverged infrastructure (HCI). To be clear, as the previous blog post outlined, there are many…

2 Key Assets in the Government’s Cybersecurity Battle (Part I)

The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal Cybersecurity Risk Determination Report and…

Maintaining a Secure Environment: Understanding Its Components

In the previous blog, we discussed how defining use cases mapped to important security and business- related objectives are the first step in building and maintaining a secure environment. We’ve…

How to Protect Yourself When Your Software Vendor Has Been Acquired

While we all know mergers and acquisitions are common in competitive markets, end users often don’t get insight into the reasoning behind the purchase or takeover. While these decisions sometimes…

The Most Important Skill You’re Not Hiring For

Anyone who’s hired for a technical team can understand this scenario. You’re hiring for “X” positions, so of course you receive “X” times infinity applications. Just because you’re looking for…

Virtualization – How We Got Here and Does It Have a Future?

In over 20 years I’ve spent in the IT industry, I’ve seen many changes, but nothing has had a bigger impact as virtualization. I remember sitting in a classroom back…