Systems

Latest Posts in Systems

5 More Ways I Can Steal Your Data: Hire People Who Lack Empathy

In this last post of my 5 More Ways I Can Steal Your Data series, I focus on my belief that all data security comes down to empathy. Yes, that…

Why do I Have to Think About Business Continuity?

You’ve probably heard about the importance of business continuity and disaster recovery. Today, more businesses have business continuity plans than ever before. With so many businesses looking to secure their…

The Business Challenges We See Today

Over the next few weeks, I will be releasing a series of articles covering the value of data analytics and insight, focusing on five of the key business drivers that…

5 More Ways I Can Steal Your Data: Ask the Security Guard to Help Me Carry it Out

In my recent post  5 More Ways I Can Steal Your Data – Work for You & Stop Working for You I started telling the story of a security guard…

My Life as IT Code: Part 5 – Walking the Wall

In this, my fifth and final post about life hacks, I’ll talk about the communication process, clarifications across all key personnel, and a big approach in how some of these…

The Unifying Force of Data

Someday, we may look back on IT as a subset of social science as much as a technological discipline. Because it sits at the intersection of business and technology, visibility…

My Life as IT Code: Part Four – Exercise and Sandbox

In previous posts in this “My Life” blog series, I’ve written quite a bit about the project management/on-task aspects of how I keep my focus and direction top of mind…

Understanding Your SQL Server Monitoring: Part 3 – Memory (RAM)

In this series, I’ve tried to help you see the importance of SQL Server® monitoring, and also understand what that monitoring is telling you. So far, we’ve looked at how…

Active Directory Monitoring

Active Directory, commonly known as AD, can be considered the heart of the IT infrastructure. It holds user account information, computers and servers, provides authentication and certificates. It even has…

Troubleshooting Exchange Issues

Now that you’ve configured monitoring and alerting for your applications, what are you going to do with the knowledge you’ve gained? Using some of the data that you receive from…