Building a monitoring and alerting system should always be driven by your business needs. This is an ongoing debate between the IT organization–which tends to focus on granular measures–and the…
At some point, your first storage system will be “full.” I’m writing it as “full” because the system might not actually be 100% occupied with data at that exact point…
Enterprise networks and IT environments can be a very unique type of organization to work with. No matter what division is involved, change management can be a stressful thing for…
When designing the underlying storage infrastructure for a set of applications, several metrics are important. First, there’s capacity. How much storage do you need? This is a metric that’s well…
Here is an interesting article from my colleague Joe Kim, in which he discusses the impact of artificial intelligence on cybersecurity. Agencies are turning to artificial intelligence (AI) and…
The person I mentioned in my last two blog posts was back, and I didn’t even bother asking them why. Honestly, I wasn’t sure whether they were here for the technical…
Who’s passed more than a weekend going almost blind because something in your didn’t work as it should, and it produced, hopefully, thousands of lines of error messages, almost all…
The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from…
When it comes to technology, device management resources have come a long way, just as much as the technology in our actual devices has. As a network or systems admin,…
Striking a balance between good visibility into infrastructure events and too much noise is difficult. I’ve worked in plenty of enterprise environments where multiple tools are deployed (often covering the…