SolarWinds has entered into a definitive agreement to be acquired by Turn/River…
In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential.…
It was LinkedIn that reminded me how long it’s been. A sudden flood of “Congratulations on your work anniversary” messages (thank you, by the way, to everyone all the well-wishers)…
Have you ever read about TV ratings? Almost every person that watches TV has heard of the ratings produced by the Nielsen Media Research group. These statistics shape how we watch TV…
Key performance indicators (KPI) are values that every business can measure and track – values that show the effectiveness of your performance as an organization toward your business objectives.
In part one of this series, we discussed the different types of databases available on the market today. In part two, we discussed how to choose the right database for…
In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture. In this post, I’ll be going over the data protection…
What do The Guru, The Expert, The Maven, The Trailblazer, The Leading Light, The Practice Leader, The Heavyweight, The Opinion Shaper, and The Influencer all have in common? These are…
The advantages of capacity management are plentiful. Simply put, IT capacity management is an ideal arrived at through the construction of a set of processes and monitoring efforts.
The focus of data protection has changed. Backups and data recovery used to exist primarily to protect against human error or natural disaster. The focus was on recovering from an…
As anyone that has run a network of any size has surely experienced, with one alert, there is typically (but not always) a deeper issue that may or may not…