Insights From the IT Trends Report 2024 — AI: Friend or Foe?

Artificial intelligence. It’s been on the lips of tech professionals and the…

Latest Posts

Is That Query Bad?

This post is part of an ongoing series on the best practices for effective and insightful database monitoring. Much of what’s covered in these posts is not intuitive, yet vital…

How to Hyper-converge Effectively

Hyper-converged offerings are gaining popularity, and more vendors are entering the arena. Everything is software-defined; therefore, the technology cannot be separated like in a converged offering. This can bring a…

The Benefits of Integrating Monitoring with ITSM Solutions

When you evaluate a monitoring solution for your environment, consider the solution’s ability to integrate with other applications and services. Most notably, a monitoring solution should be able to integrate…

A Trendline Is a Model

This post is part of an ongoing series on the best practices for effective and insightful database monitoring. Much of what’s covered in these posts is unintuitive, yet vital to understand. Previous…

The Value of Log Structured Merge Trees

Indexes are usually built by way of a data structure; typically, that structure takes the form of a “tree.” Most commonly, the structure of choice is a B-Tree, which is…

KMS Server Activation

In a previous article, I wrote about the virtualization administrator’s interest in choosing between the two operating system activation methods Microsoft® offers: Multiple Activation Keys (MAK) and Key Management Service…

Intent-based Networking – A Must for SDN

SDN is about making networking more flexible and agile through programming network elements. Such programming needs to be done in a standard way. Hence, standardizing the southbound protocol that directly…

Capacity Planning with the Universal Scalability Law

“How much load can this system sustain?” is a common question in capacity planning. The practical purpose is usually something like the following: How soon will the system begin to…

When Should You NOT Virtualize That System?

Virtualization is an amazing and valuable tool for so many reasons. I’ve been a proponent of the concept since GSX server, and early Workstation products. In the early days, I…

Introducing Query Anomaly Detection

Anomaly detection sure is a hot topic. We’ve written about it ourselves a number of times, and Preetam Jinka and I just co authored a book for O’Reilly called Anomaly…