Monitoring and Observability

Latest Posts in

How to Eliminate Silos Using DevOps

For too long, development and operations teams have operated in a vacuum, independent of one another. These silos limit communication between teams, often at the expense of the company.

The Human Side of IT

The technology industry is about technology. Technology is the fastest changing industry there is, but the often-overlooked part of this industry is the humans that work with the technology. Humans…

The Echo Chamber: Visibility and Mapping Webinar

(“The Echo Chamber” is a semi-regular series where I reflect back on a talk, video, or essay I’ve published. More than just a re-hashing of the same topic, I’ll add…

How Well Do You Know Your IT Environment?

Do you know what’s in your data center? How about your wide area network (WAN)? If you had to draw a map or produce a list of all the things…

Related Attributes: NetFlow and Interface Traffic Statistics

For many engineers, operators, and information security professionals, traffic flow information is a key element to performing both daily and long-term strategic tasks. This data usually takes the form of NetFlow version…

THWACKcamp 2018 Registration Now Open

When the IT Show Comes to Town In the past, I’ve compared the logistics of tech conferences, tradeshows, and user groups to moon landings, touring companies, and polar expedition planning.…

Defining Your IT Journey

The IT journey is really nothing more than your career plan or goals that you have for your career. It’s the story of you. I call it the IT Journey because it’s…

Cybersecurity Fundamentals – Attack Surfaces and Vulnerabilities

In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…

Culture of Data Protection: Development Counts, Too.

In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challenging. In fact, most…

Security Pain Points: Upper Management and Budget

Security should be a top priority for IT professionals within all areas of skills. One of the top pain points is how to convey the story of security to upper…