Artificial intelligence. It’s been on the lips of tech professionals and the…
This post is part of an ongoing series on the best practices for effective and insightful database monitoring. Much of what’s covered in these posts is not intuitive, yet vital…
Hyper-converged offerings are gaining popularity, and more vendors are entering the arena. Everything is software-defined; therefore, the technology cannot be separated like in a converged offering. This can bring a…
When you evaluate a monitoring solution for your environment, consider the solution’s ability to integrate with other applications and services. Most notably, a monitoring solution should be able to integrate…
This post is part of an ongoing series on the best practices for effective and insightful database monitoring. Much of what’s covered in these posts is unintuitive, yet vital to understand. Previous…
Indexes are usually built by way of a data structure; typically, that structure takes the form of a “tree.” Most commonly, the structure of choice is a B-Tree, which is…
In a previous article, I wrote about the virtualization administrator’s interest in choosing between the two operating system activation methods Microsoft® offers: Multiple Activation Keys (MAK) and Key Management Service…
SDN is about making networking more flexible and agile through programming network elements. Such programming needs to be done in a standard way. Hence, standardizing the southbound protocol that directly…
“How much load can this system sustain?” is a common question in capacity planning. The practical purpose is usually something like the following: How soon will the system begin to…
Virtualization is an amazing and valuable tool for so many reasons. I’ve been a proponent of the concept since GSX server, and early Workstation products. In the early days, I…
Anomaly detection sure is a hot topic. We’ve written about it ourselves a number of times, and Preetam Jinka and I just co authored a book for O’Reilly called Anomaly…