Many of us have or currently operate in a stovepipe or silo IT environment. For some, this may just be a way of professional life. But regardless of how the…
In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few…
Building a culture that favors protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data…
So you’ve made it through a disaster recovery event. Well done! Whether it was a simulation or an actual recovery, it was possibly a tense and trying time for you…
When it comes to networking specifically, software-defined networking is a model in which the use of programmability allows IT professionals to increase the performance and their ability to accurately monitor…
In my last post, I talked about microservices and how their deep connection can offer a quality application. Now, I want to move up a layer. Not only between microservices, but…
In a distributed tracing architecture, we need to define the microservices that work inside it. We also need to distinguish the “component” behavior from the “user” behavior and experience—similar words,…
Building a monitoring and alerting system should always be driven by your business needs. This is an ongoing debate between the IT organization–which tends to focus on granular measures–and the…
At some point, your first storage system will be “full.” I’m writing it as “full” because the system might not actually be 100% occupied with data at that exact point…
Enterprise networks and IT environments can be a very unique type of organization to work with. No matter what division is involved, change management can be a stressful thing for…