The scarcity of qualified talent in the IT sector is especially pronounced…
Our friends at Datadog just published an insanely great three part series on monitoring Amazon RDS for MySQL using Datadog. You should go read that now.
To better combat software piracy, Microsoft introduced License Activation with Windows XP/Server 2003; however, activation was pretty much implied and automatic if you had volume license keys. When these keys,…
Network virtualization, software defined network (SDN), and network function virtualization (NFV) have taken the communication industry by storm. They are no longer buzzwords; the industry is seriously focusing and converging…
The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top…
“Whoever wishes to foresee the future must consult the past” -unspecified “wise men” quoted by Niccolò Machiavelli With so many articles out there telling me how SDN will change the…
In the world of enterprise architecture, many parts of our daily conversations are taken for granted. We talk about virtualization, vMotion®, Storage vMotion, Replication, IOPS, and so very many other…
A lot of monitoring systems have a goal of end-to-end tracing, from “click to disk” or something similar. This is usually implemented by adding some kind of tracing information to…
Monitoring is a lot of work. A monitoring system is a service unto itself, and like other applications it needs care, feeding, configuration, databases, DBAs, patching, and maintenance. Though it…
Let’s take a look at a great real-world example that effectively illustrates how queuing theory can be unintuitive even in situations that seem simple. A recent BBC report reveals researchers’…
There’s a common misconception in the IT industry. This misconception stems from the premise that the premises of your infrastructure will either be more expensive or less expensive based on its…