Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Mav Turner about the complexities of server and application management. Hyperconvergence makes the old question of, “is it the network or the application?” harder to answer; good thing we have tools to help.…
Omar Rafik, SolarWinds, Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Mav Turner about machine learning and artificial intelligence. These technologies have recently become vogue and Mav does a great job of exploring them and their impacts on federal networking. Machine learning…
By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Jim Hansen. Jim offers three suggestions to help with security, including using automation and baselines. I agree with Jim that one of the keys is to try to keep security in the background, and I’d add it’s…
Four score and one post ago, we talked about Baltimore’s beleaguered IT department, which is in the throes of a ransomware-related recovery. Complicating the recovery mission is the fact that the city’s IT team didn't know when the systems were compromised initially. They knew when the systems went offline, but not if the…
In post #3 of this information security series, let's cover one of the essential components in an organization's defense strategy: their approach to patching systems. Everywhere an Attack When did you NOT see a ransomware attack or security breach story in the news? And when was weak patching not cited as one of the…
In the second post in this information security in a hybrid IT world series, let’s cover the best-designed security controls and measures, which are no match for the human element. “Most people don’t come to work to do a bad job” is a sentiment with which most people will agree. So, how and why do well-meaning people…
Welcome to the first in a five-part series focusing on information security in a hybrid IT world. Because I’ve spent the vast majority of my IT career as a contractor for the U.S. Department of Defense, I view information security through the lens that protecting national security and keeping lives safe is the priority.…
Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have in your thoughtful comments. Thanks for following along. Let’s take a quick look back at the previous posts. Post #1: When "Trust but Verify" Isn’t…
Today’s data center is full of moving parts. If your data center is hosted on-premises, there’s a lot to do day-in and day-out to make sure everything is functioning as planned. If your data center is a SaaS data center hosted in the cloud, there are still things you need to do, but far fewer compared to an on-premises…
This is the fourth post of my series on hyperconverged infrastructure (HCI) architectural design and decision-making. For my money, the differences between these diverse systems is a function of the storage involved in the design. On the compute side, these environments use x86 and a hypervisor to create a cluster of hosts…
It looks like you're new here. Sign in or register to get started.