Speaking of THWACKcamp…

For those who don’t know, THWACKcamp is our free annual community event.…

THWACKcamp Registration

Latest Posts

How to Hyper-converge Effectively

Hyper-converged offerings are gaining popularity, and more vendors are entering the arena. Everything is software-defined; therefore, the technology cannot be separated like in a converged offering. This can bring a…

The Benefits of Integrating Monitoring with ITSM Solutions

When you evaluate a monitoring solution for your environment, consider the solution’s ability to integrate with other applications and services. Most notably, a monitoring solution should be able to integrate…

A Trendline Is a Model

This post is part of an ongoing series on the best practices for effective and insightful database monitoring. Much of what’s covered in these posts is unintuitive, yet vital to understand. Previous…

The Value of Log Structured Merge Trees

Indexes are usually built by way of a data structure; typically, that structure takes the form of a “tree.” Most commonly, the structure of choice is a B-Tree, which is…

KMS Server Activation

In a previous article, I wrote about the virtualization administrator’s interest in choosing between the two operating system activation methods Microsoft® offers: Multiple Activation Keys (MAK) and Key Management Service…

Intent-based Networking – A Must for SDN

SDN is about making networking more flexible and agile through programming network elements. Such programming needs to be done in a standard way. Hence, standardizing the southbound protocol that directly…

Capacity Planning with the Universal Scalability Law

“How much load can this system sustain?” is a common question in capacity planning. The practical purpose is usually something like the following: How soon will the system begin to…

When Should You NOT Virtualize That System?

Virtualization is an amazing and valuable tool for so many reasons. I’ve been a proponent of the concept since GSX server, and early Workstation products. In the early days, I…

Introducing Query Anomaly Detection

Anomaly detection sure is a hot topic. We’ve written about it ourselves a number of times, and Preetam Jinka and I just co authored a book for O’Reilly called Anomaly…

The Five Commandments of Tomorrow’s Network

Recently, I’ve been giving some thought  to the roadblocks I discover when I attempt network automation and orchestration, and how those roadblocks affect the software-defined data center idea as a whole. As a result,…