A while back, I wrote a blog post that detailed how patch management products work with the WSUS API to publish third-party updates (see ). Looking back, this got me thinking about how, from a Patch Manager perspective, WSUS patch management and ConfigMgr/SCCM patch management are essentially the same. However, this…
While we continually look for ways to simplify firewall configuration and change management tasks, a simple erroneous rule can lead to very big risks in the network. However careful we may be, redundant or shadowed rules always seem to find their way in. There’s certainly a pressing need for smart and easy ways to find and…
In a previous post, I outlined a couple of steps you should take to ensure that you are best protected against "apocalyptic disaster" on your network. In short: * Get a Network Management Software (NMS) to keep track of network health. SolarWinds NPM network monitor is a great place to start for this. * Since that NMS is…
I like cake. Most people do, I suppose. And that’s why I use cake as an analogy in my classes and presentations whenever I talk about users, data, and performance. See, there are many, many layers of cake between users and their data. Some layers are thicker than others, some more delicious, and some more important. But…
In the VMworld 2013 keynote session in San Francisco Monday morning VMware made a number of announcements mostly related to software-defined data center (SDDC) capabilities. While they focused a lot on networking, storage and hybrid cloud, the capability that will probably have the most impact in the short term will be the…
Do you ever feel like you’re not taking full advantage of the power of your alerting system? Have you seen snippets of coolness from other users and wondered how they did it? Check out our head geeks in SolarWinds Lab Episode #3 as they discuss all four types of alerts in a single episode, with tutorials and hands on…
"The technological singularity is the theoretical emergence of superintelligence through technological means. Since the capabilities of such intelligence would be difficult for an unaided human mind to comprehend, the technological singularity is seen as an occurrence beyond which events cannot be predicted." - Wikipedia.…
I recently read a blog about Networking in the Cloud by Jeff Loughridge discussing the configuring of a network composed of both physical and cloud components. While he provided some insightful configuration examples and stressed the importance of working with your cloud provider, there was no mention of the impact on…
The largest population of the world, China, woke up last Sunday (25th August, 2013) to the most colossal distributed denial of service (DDoS) attacks to have rattled the Chinese digital age. With over 8 million websites affected[1] on .cn domains, the government has condemned this incident and dubbed it the biggest ever…
The evolution in mobile technology has changed the way we work. Gone are the days when work was only done on personal computers. Even laptops have slowly paved way to trendy mobile phones and tablets. With a new and sophisticated device hitting the market on a daily basis with better technological supremacy, employees are…
It looks like you're new here. Sign in or register to get started.