The scarcity of qualified talent in the IT sector is especially pronounced…
In a previous article, I wrote about the virtualization administrator’s interest in choosing between the two operating system activation methods Microsoft® offers: Multiple Activation Keys (MAK) and Key Management Service…
SDN is about making networking more flexible and agile through programming network elements. Such programming needs to be done in a standard way. Hence, standardizing the southbound protocol that directly…
“How much load can this system sustain?” is a common question in capacity planning. The practical purpose is usually something like the following: How soon will the system begin to…
Virtualization is an amazing and valuable tool for so many reasons. I’ve been a proponent of the concept since GSX server, and early Workstation products. In the early days, I…
Anomaly detection sure is a hot topic. We’ve written about it ourselves a number of times, and Preetam Jinka and I just co authored a book for O’Reilly called Anomaly…
Recently, I’ve been giving some thought to the roadblocks I discover when I attempt network automation and orchestration, and how those roadblocks affect the software-defined data center idea as a whole. As a result,…
Many of our customers use Graphite, and I don’t think anyone would argue with me when I say it’s probably the most commonly used time series database in the DevOps…
Whether your IT operation is a small-scale endeavor or a web-scale enterprise, systems monitoring plays a critical role in the delivery of your services. The ability to quickly and accurately…
These past few years you’ve heard a lot about the cloud. The cloud that’s always been there has a new approach for companies. Run your applications directly from the cloud…
In the popular white paper entitled Troubleshooting SQL Server Wait Statistics, I take you through three scenarios in which a wait stats-only approach is insufficient or even harmful to detecting, diagnosing,…