VMware’s big hype for VMworld 2013 in San Francisco was all about bringing software-defined data center capabilities to market. Since the compute aspect of the data center has pretty advanced virtualization capabilities (i.e., “software-defined”) that meant the primary focus was on advancing the network and storage…
JK: How did you get started blogging (blog.scottlowe.org)? SL: I started writing on my blog in 2005. At the time, I was learning a lot, and I wanted a way to capture the knowledge I was gaining. I guess you could say that my blog started as more of a knowledge base than anything else. It wasn’t until 2007 when I…
Many of us are getting back to work after a few weeks of relative quiet (or for those of us with large families, at least a week of quiet from work-related issues). And as we're catching up on emails and updating our TODO lists, a look back may help us plan how best to move forward. Last week, Head Geek Lawrence Garvin…
In a previous post, I provided our Scalability Engine Guidelines technical reference as an attachment. It has since been updated and published to the Network Performance Monitor (NPM) Documentation page of solarwinds.com. Check it out. As an additional note, if you are installing Additional Polling Engines for NPM version…
Almost every year since Security Information & Event Management (SIEM) became a relatively mature technology, SC Magazine has done one of their Group Tests with SIEM products. All sorts of SIEM and log management vendors are invited to put their products to the test in SC Magazine's lab environment, where the reviewers…
When managing your Cisco DHCP, ASA devices, and Windows DHCP servers with IPAM, you may encounter errors that refer to DHCP connection errors. Generally speaking, most of these errors are easy to address. IPAM uses Windows RPC calls to retrieve the list of scopes, leases, and reservations. Since IPAM runs within a local…
As I was catching up on the latest IT industry news, I landed on Amit’s Technology Blog. Amit (@amitpanchal76) was a delegate at this year’s Virtualization Field Day 4. I found it very cool that Amit was highlighting his visit to SolarWinds and providing his view on AppStack in his blog post, “How SolarWinds Aims to Offer…
What’s in a log file? The very purpose of IT security is to be proactive make it difficult for someone who attempts to compromise your network. You also need to be able to detect the actual breaches as they are being attempted. This is where log data really helps. Collecting and analyzing logs, help you can understand what…
As Joel Dolisy described in A Lap around Appstack, the first installment of the AppStack series, there are many components in the application stack including networking, storage, and computing resources. The computing resources include hypervisors, virtual machines, and physical machines that provide applications,…
Got any zombies on your network? That probably depends on how you define “zombie,” right? Virtual Machine Zombies A zombie could be a lost, lone virtual machine languishing on your network. Or a zombie might be a dummy machine, taken over by a spammer, sending out spam messages whenever it’s ordered to. Whether you’re…
It looks like you're new here. Sign in or register to get started.