Tech’s Most Wanted: A Profile of the Cybersecurity Professional

The scarcity of qualified talent in the IT sector is especially pronounced…

Latest Posts

Assessing Database Health and Performance

Here is an interesting article from my colleague Joe Kim, in which he explores database health and performance. Part of the problem with managing databases is that many people consider…

Out of Office: Identifying & Managing Risk

Risk Management is an important part of IT. Being able to identify risks and remediation options can make a huge difference if or when disaster strikes. If you’ve moved part…

Numeric Optimization in Golang With Nelder-Mead and Gonum

Numeric optimization is a set of techniques for fitting a function to a dataset by iteratively refining estimates. Numeric optimization is one way to do things like curve-fitting and parametric…

Windows Workstation Logs – Integration

In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The…

The Era of Employee Services

The best places to work treat their employees like their best customers, and in return, they’re getting the best work from happy employees. The first step in achieving this internal…

It’s Time to be Honest with Ourselves

By Paul Parker, SolarWinds Federal & National Government Chief Technologist Here’s an interesting article from my colleague Leon Adato, in which he suggests that honesty is best policy. IT professionals…

Practical Security Steps for Every Network Engineer

IT organizations manage security in different ways. Some companies have formalized security teams with board-level interest. In these companies, the security team will have firm policies and procedures that apply…

Knowing Which Services Are Critical to a Business Service

In the age of exploration, cartographers used to navigate around the world and map the coastlines of unexplored continents. The coastline of IT, and moreover the inner landscapes and features,…

Disaster Recovery Testing – Learning to Walk the Walk

With the influx of natural disasters, hacks, and increasingly more common ransomware, being able to recover from a disaster is quickly moving up the priority list for IT departments across…

Disaster Recovery – Time To Create Our Plan!

Thus far, we have gone over how to classify our disasters and how to have some of those difficult conversations with our organization regarding Disaster Recovery (DR). We’ve also briefly…