We put in all this work to create a fully customized toolchain tailored to your situation. Great! I bet you’re happy you can change small bits and pieces of your…
This is a continuation of one of my previous blog posts, Which Infrastructure Monitoring Tools Are Right for You? On-Premises vs. SaaS, where I talked about the considerations and benefits of…
In post #3 of this information security series, let’s cover one of the essential components in an organization’s defense strategy: their approach to patching systems. Everywhere an Attack When did…
Did you come here hoping to read a summary of the past 5+ years of my research on self-driving, autonomous vehicles, Tesla, and TNC businesses? Well, you’re in luck… that’s…
The bigger the project, the more risk there is. Any decent-sized project needs a professional project manager to run it and help mitigate that risk. When it comes to big…
Hybrid IT merges private on-premises data centers with a public cloud vendor. These public cloud vendors have a global reach, near limitless resources, and drive everything through an API. Tapping…
In the second post in this information security in a hybrid IT world series, let’s cover the best-designed security controls and measures, which are no match for the human element.…
We’ve established that choosing a one-size-fits-all solution won’t work. So, what does work? Let’s look at why we need tools in the first place, and what kind of work these…
In my last post, you may have noticed I mentioned “evil” four times, but also mentioned “good” four times. Well, you’re in luck. After all that talk about evil and ethics, I want…
In my previous post, we talked about the CALMS framework as an introduction to DevOps, and how it’s more than just “DevOps tooling.” Yes, some of it is about automation…