“Hello! My Name is Phoummala and I have re-occurring imposter syndrome. I struggle with this frequently and it’s a battle that I know I am not alone in.” What is…
Data, data, data. You want all of the data, right? Of course you do. Collecting telemetry and logging data is easy. We all do it and we all use it…
Systems monitoring has become a very important piece of the infrastructure puzzle. There might not be a more important part of your overall design than having a good systems monitoring…
In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…
For too long, development and operations teams have operated in a vacuum, independent of one another. These silos limit communication between teams, often at the expense of the company.
The technology industry is about technology. Technology is the fastest changing industry there is, but the often-overlooked part of this industry is the humans that work with the technology. Humans…
(“The Echo Chamber” is a semi-regular series where I reflect back on a talk, video, or essay I’ve published. More than just a re-hashing of the same topic, I’ll add…
Do you know what’s in your data center? How about your wide area network (WAN)? If you had to draw a map or produce a list of all the things…
For many engineers, operators, and information security professionals, traffic flow information is a key element to performing both daily and long-term strategic tasks. This data usually takes the form of NetFlow version…
When the IT Show Comes to Town In the past, I’ve compared the logistics of tech conferences, tradeshows, and user groups to moon landings, touring companies, and polar expedition planning.…