Tech’s Most Wanted: A Profile of the Cybersecurity Professional

The scarcity of qualified talent in the IT sector is especially pronounced…

Latest Posts

Modern ITSM Practices: ITIL for Today

You can, and should, apply fundamentals of ITIL to new challenges in service. The ITIL framework will survive because it’s designed to align with the business goals of the employees…

Announcement: p99 Percentile Metrics

I’m pleased to announce that SolarWinds® Database Performance Monitor (DPM) offers 99th percentile metrics to help understand latency outliers in a query workload. These metrics provide visibility beyond the average…

A Case Against Chassis Switching

If you have done any work in enterprise networks, you are likely familiar with the idea of a chassis switch. They have been the de facto standard for campus and…

Network Monitoring Overload and How to Survive

It’s always good to have a periodic reminder to consider what we’re monitoring and why. Here’s an applicable article from my colleague Joe Kim, in which he offers some tips…

Out Of Office: Health Check

So far in this series, we’ve covered setting expectations as well as migrating to Office 365. Now that your organization is up and running on the new platform, how do…

How To Buy Software 2018

Buying software solutions for your company is a skill just like any other business practice. To be effective at purchasing it is necessary to have a clear understanding of what…

Everything I Needed To Know About IT I Learned From Logan (Part Four)

(This is the fourth and final part of a series. You can find Part One here, Part Two here and Part Three here.) It behooves me to remind you that…

Traveling With Joy

Recently, two people I respect very much tweeted about travel, and how to remain positive and grateful while you do it. You can read those tweets (here) and (here). When…

Modern ITSM Practices: Automation

A service desk automation is a customizable rule that will automatically make routine decisions based on data input, speeding up service processes and empowering the organization through thousands of little…

Microsoft Workstation Logs – Configuration

Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in…