Monitoring and Observability

Latest Posts in

What is Your IT Legacy?

Where are you in your career arc right now? Trusting simple statistics, I can say that the majority of you are either just starting out, or somewhere in the middle.…

You Are Here – A Reference Model for IT Infrastructure Security

We made it! This is the final post in this six-part series mapping the cybersecurity landscape through a new reference model for IT infrastructure security. Thank you for coming along…

To Infinity and Beyond!

I’ve covered a lot in this series of posts around artificial intelligence (machine learning); from the beginning (Not Another AI Post…) to why I love it (My Affection for AI)…

The Cost of (Not) Monitoring

What does a wireless thermometer have in common with ping? Both can keep a business from losing cash. One of the ways businesses stay in business is by keeping a…

Do Network Engineers Dream of Software Defined Sheep?

I really want Software Defined Networking (SDN), or something like it, to be the go-to approach for networking, but are we too tied to our idea of what SDN is…

Automating the Automators

I’ve heard repeatedly from people in this industry that what we need is a single interface to our infrastructure. For status monitoring, perhaps that’s best represented by the ubiquitous “Single…

You Are Here – Visibility & Control

Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this…

One Framework to Rule Them All

The Dream of the Data Center For me, it started with OpenStack. I was at a conference a number of years ago listening to Shannon McFarland talking about using OpenStack…

Words Matter

One of my biggest pet peeves with AI is the word itself. Words matter, especially in IT. Whether you’re trying to nail down a scope of work for a project,…

Application Performance Monitoring: APM In An Agile World

Hopefully, you have been following along with this series and finding some useful bits of information. We have covered traditional APM implementations in part one, part two, and part three. In this post,…