Thus far, we have gone over how to classify our disasters and how to have some of those difficult conversations with our organization regarding Disaster Recovery (DR). We’ve also briefly…
If you have done any work in enterprise networks, you are likely familiar with the idea of a chassis switch. They have been the de facto standard for campus and…
It’s always good to have a periodic reminder to consider what we’re monitoring and why. Here’s an applicable article from my colleague Joe Kim, in which he offers some tips…
So far in this series, we’ve covered setting expectations as well as migrating to Office 365. Now that your organization is up and running on the new platform, how do…
(This is the fourth and final part of a series. You can find Part One here, Part Two here and Part Three here.) It behooves me to remind you that…
Recently, two people I respect very much tweeted about travel, and how to remain positive and grateful while you do it. You can read those tweets (here) and (here). When…
Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in…
By Paul Parker, SolarWinds Federal & National Government Chief Technologist I like the idea of taking a holistic view of the user experience. Here’s an interesting article from my colleague…
No, it’s not the latest culinary invention from a famous Italian chef: spaghetti cabling (a nice wording for cabling inferno) is a sour dish we’d rather not eat. Beyond this…
Most network engineers enter the profession because we enjoy fixing things. We like to understand how technology works. We thrive when digging into a subject matter with focus and intensity. …