Hopefully, you all had a safe and spooky Halloween last weekend and a good time raising Cybersecurity Awareness in October. In case you missed it, SentryOne joined the SolarWinds family last month. We’re very excited to continue growing our portfolio of database monitoring and management products. Look for Tom’s thoughts…
Chris Wahl (@ChrisWahl) recently wrote a great product review of Virtualization Manager on his blog Wahl Network. It got me thinking that it would be nice to get to know him a little better. So, we tracked him down and got answers to a few questions for this month’s IT Blogger Spotlight. Enjoy! SWI: So, tell us a little…
Protecting your identity is becoming more and more difficult. Though many people don’t stop to consider it, even the most minor conveniences can go hand in hand with an incredible amount of privacy loss. For example, Amazon recently debuted new hand scanners in stores in Seattle where you can scan your palm to make a…
You probably heard about the GoDaddy outage in September (2012). A corruption in routing tables across the company’s network left millions of Godaddy-hosted sites dark for many hours. To mitigate damage, Godday offered impacted customers one month of service. Had Godaddy been publicly traded, an outage of that magnitude…
Every year brings new opportunities for federal IT professionals to reduce risk by addressing threats—both existing and emerging—with new tools, technologies, and tactics. This year has proven to be a little different, with the emergence of COVID-19 forcing federal agencies to make the jump to remote work. Although the…
I recently had the opportunity to interview Cole Lavallee of Waters Corporation. At Waters, Cole and his team use Server & Application Monitor, Log & Event Manager and DameWare to monitor and troubleshoot hundreds of servers, critical applications, and sites worldwide to reduce any downtime and increase customer…
The work being done on federal, state, and local levels to ensure the health of society during and post-COVID-19 will be driven by the Internet of Things (IoT). From contact tracing to drones, the reopening of America will be regulated by millions of data streams delivered from thousands of connection points. IT…
SECURITY FOLKS, GET READY FOR THE WEBCAST!! Why is this important to you? In recent years, you would have heard about the loss of sensitive information through USB drives and other mass storage devices that make it easier than ever for data to walk out the door, that too when the usage of thumb drives at workplaces are…
The Digital Air Force Initiative is an effort to leverage data and applications at the edge, along with artificial intelligence and machine learning, to “field a 21st Century infrastructure responsive to the demands of modern combat.” Like other defense organizations, the Air Force aims to modernize its systems and move…
WAN History Wide area network (WAN) technologies have come a long way since the early 2000s. It was the age of “traditional WAN,” where dedicated leased lines, frame relay circuits, and asynchronous transfer mode (ATM) circuits were the only games in town. The Dow Jones Industrial Average was around 11k, and the…
It looks like you're new here. Sign in or register to get started.