Cyber-attacks have become very common in today’s technology world. According to Akamai's Q2 2013 State of the Internet Report, the number of cyber-attacks that occurred during the second quarter of 2013 fluctuated across the globe. However, places like Indonesia and China experienced a significant increase in attack…
This year has thrown us through a loop and being stuck within our four walls eventually catches up with us all. Some of my hobbies are no longer safe and a new one needed to take its place. For me, accentuating the positive meant learning a new hobby. Finding the tools, information, time, and raw materials for making…
If you are like me, you watch your fair share of movies and TV. And being a seasoned IT pro, I always watch with a discerning eye when IT plays a critical role in advancing plot. One of my particular not-so-favorite clichés is when the cynical computer whiz (baseball cap worn usually askew) sits down in front of a…
All too often, federal IT personnel misconstrue software as being able to make their agency compliant with various regulations. It can’t – at least not by itself. Certainly, software can help you achieve compliance, but it should only be viewed as a component of your efforts. True and complete compliance involves defining,…
You have a network, and it's your job to keep it running. How do you know it's doing what it should? You could just wait to hear from your users; surely your CIO will let you know when his "internet is broken", but this approach may not have a positive influence on your continued employment. No, you need some network…
Four predominant IT use cases any network device configuration management tool must address are: * Configuration change management: scheduling device configuration backups, requiring change approval for configuration changes, scheduling execution of approved changed. * Compliance reporting: defining and enforcing…
Efficiently managing the performance of complex cloud environments requires more than monitoring and alerting Today’s cloud environments rely on microservices, service meshes, containers, and orchestration tools and are too complex for traditional tools to measure and monitor performance metrics effectively. The number of…
When examined at a micro level, any one event in 2020 could send anxiety skyrocketing, let alone all of these events piling one on top of the other. Talk about an anxiety ball lodged in the pit of your stomach. Sure, we could curl up and wait for the madness to inch by at a glacial pace while the ball grows and grows. Or…
SysAdmin Day is upon us, you SysAdmaniacs! It’s your day! We know how you may feel underappreciated at times throughout the year, so we went all out and created a board game in your honor. That’s right. Now, after another annoying day resetting passwords and resolving bottlenecks caused by I/O-heavy apps, you can unwind…
This may seem like one of the nitty-gritty questions for new remote workers, but it’s really simple: for the most part, you’ll get work done at home the same way you did in the office. Sure, you might have a few more emails than you did before, but otherwise, things are the same. You’re probably using a company system—or…
It looks like you're new here. Sign in or register to get started.