This past year has flown by, and it’s time again to call…
Anomaly detection sure is a hot topic. We’ve written about it ourselves a number of times, and Preetam Jinka and I just co authored a book for O’Reilly called Anomaly…
Recently, I’ve been giving some thought to the roadblocks I discover when I attempt network automation and orchestration, and how those roadblocks affect the software-defined data center idea as a whole. As a result,…
Many of our customers use Graphite, and I don’t think anyone would argue with me when I say it’s probably the most commonly used time series database in the DevOps…
Whether your IT operation is a small-scale endeavor or a web-scale enterprise, systems monitoring plays a critical role in the delivery of your services. The ability to quickly and accurately…
These past few years you’ve heard a lot about the cloud. The cloud that’s always been there has a new approach for companies. Run your applications directly from the cloud…
In the popular white paper entitled Troubleshooting SQL Server Wait Statistics, I take you through three scenarios in which a wait stats-only approach is insufficient or even harmful to detecting, diagnosing,…
Our friends at Datadog just published an insanely great three part series on monitoring Amazon RDS for MySQL using Datadog. You should go read that now.
To better combat software piracy, Microsoft introduced License Activation with Windows XP/Server 2003; however, activation was pretty much implied and automatic if you had volume license keys. When these keys,…
Network virtualization, software defined network (SDN), and network function virtualization (NFV) have taken the communication industry by storm. They are no longer buzzwords; the industry is seriously focusing and converging…
The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top…