The scarcity of qualified talent in the IT sector is especially pronounced…
As IT professionals, we have all been there, the dreaded help desk call “Is email down?” (Replace with any business critical application). One of the worst things we deal with…
We’re excited to share Anomaly Detection for Monitoring a new, free eBook written by Preetam Jinka and Baron Schwartz. In the eBook, published in collaboration with Ruxit and O’Reilly, Preetam…
January 28 is Data Privacy Day (DPD). Observed since 2008, DPD brings awareness to the importance of data privacy and protection. According to the Verizon 2015 Data Breach Investigations Report,…
In 2016, we published our eBook Everything You Need to Know About Queueing Theory, and as part of its launch, we blogged about one way (of the many) queueing theory…
“Horizontal expansion loses the depth, though excessive depth that only provokes darkness is futile. Therefore a balance between depth and vastness is essential in learning” ― Privavrat Thareia This year, consider…
Over at the Percona Performance Blog, Vadim recently published benchmark results for Apache Spark, and the shape of the graphs caught my eye. Here’s one of Vadim’s charts: The benchmark…
If there’s a chance to save time by using scripts or automation tools, I always take it. Over the years I’ve found that there are a set of common themes…
Contemporary monitoring solutions are no different from any other distributed application in your environment. Even a small-scale deployment can include multiple components: often, these include a Web server, an application server, and…
We all want our systems to have high availability, but sometimes the exact meaning of “high availability” isn’t very clearly defined. However, availability — like scalability, performance, and so on…
VMware® as a technology has a huge potential to sprawl. Have you created an environment for testing purposes? Have projects required a number of guest VMs to be built, but…