-
The Actuator – June 26th
Home after a couple weeks on the road between Cisco Live! and Data Grillen. My next event is Microsoft Inspire, and if you're attending, please stop by the booth so we can talk data. As always, here are some links from the Intertubz that I hope will hold your interest. Enjoy! Meds prescriptions for 78,000 patients left in…
-
21st Century Application Development
There’s a revolution underway with application deployment, and you may or may not be aware of it. We’re seeing a move by businesses to adopt technology the large public cloud providers have been using for many years, and that trend is only going to increase. In my previous post on digital transformation, I looked at…
-
To Cloud or Not to Cloud?
There’s a question I’m sure is keeping some IT managers and CTOs up at night. How do you know when it’s right to move a workload to the cloud? And when you finally make the decision to migrate, how do you choose the best location for your application? As mentioned in my previous post, cloud is a buzzword that carries with…
-
The Actuator – June 3rd
I hope you all had a safe and restful holiday weekend. Summer is finally upon us, and parts of our world are reopening. We’re grateful the weather has allowed for us to spend time working outside at night and on the weekends. I hope everyone reading this is able to find some enjoyable outside activities this summer. As…
-
Improving Cybersecurity Starts at the Endpoints
Careful monitoring and attention to endpoints are just two elements of a strong cybersecurity strategy for K-12 districts. Cybersecurity must be a top priority for K-12 schools. Schools need to prioritize thwarting industrious hackers who are intent on getting to the treasure trove of information and personally…
-
Ideas for Combatting DoD Mobile Security Threats
In government, mobile devices are both embraced and resisted. The mobility and ease of use afforded by smartphones and tablets helps boost worker productivity even as they open doors for hackers. According to research by Wandera, in 2018 there were 455,121 mobile phishing attacks, 1.9 million Wi-Fi incidents, and 32,846…
-
The Actuator – May 20th
I don’t want to alarm you, but Memorial Day is this coming Monday. I know. It feels as if we skipped most of March, and all of April. But here we are. I hope you’re able to enjoy the coming holiday with family and friends in some manner. As always, here's a bunch of links I hope you find useful. Enjoy! Here's Who Just…
-
SolarWinds IT Trends Report 2020: The Universal Language of IT
Show of hands: who thinks “hybrid IT” is new, shiny, and filled with wonderful possibilities? Judging by fresh survey data and ongoing conversations on THWACK, not many of you. We’re now years into an era marked by hybrid IT, where on-premises, cloud infrastructures, and SaaS occasionally live in harmony if the tech pros…
-
Recovering from a Database Disaster: Planning Makes a Big Difference
By Joe Kim, SolarWinds EVP, Engineering and Global CTO Because databases are so important to federal IT, I wanted to share a blog written earlier this year by my SolarWinds colleague, Thomas LaRock. Federal IT pros must be prepared for every situation. For most, a database disaster is not a matter of if, but rather when.…
-
The Actuator – May 13th
Our local Starbucks reopened this past Thursday. Mobile orders only and only one person at a time is allowed inside to pick up their order. It felt almost normal to visit the shop. I look at this as the beginning of businesses opening up again. There will be a period of adjustment as we adapt to the new normal, but we’ll…