I was having one of “those” days, and someone asked me to describe what a load balancer did. My answer was something like this. “Imagine your most critical application…
Disaster recovery can be a complicated beast to tame. If you’re attempting to recover your IT infrastructure from some kind of disaster, you’re already faced with a number of challenges.…
Malware prevention is a very hot topic due to the recent ransomware attacks that have completely crippled several companies and organizations. For most smaller companies, being able to hire a…
Data management is one of the aspects of information technology that is regularly overlooked, but with the explosion of data in recent years and the growth of data only accelerating,…
After you’ve installed your new storage systems and migrated your data onto them, life slows down a bit. Freshly installed systems shouldn’t throw any hardware errors in the first stages…
Hybrid IT presents SecOps challenges The Department of Defense (DoD) has long been at the tip of the spear when it comes to successfully melding IT security and operations…
“The price of reliability is the pursuit of the utmost simplicity.” C.A.R. Hoare, Turing Award lecture. Software and computers in general are inherently dynamic and not of a state…
“Once upon a time, there was a little network…” No there wasn’t. Your network was never little, or if it was, it didn’t stay that way for long. Corporate…
Visualization of technologies was always in the imagination or drawn out by hand until we were able to incorporate tools like Visio® to help with mapping. At that point, we…
How to use network configuration, change, and compliance management (NCCCM) and other monitoring software in response to an actual security breach. If you have not read part one, I would suggest that…