Comments
-
Whose wasn't? I remember explaining to her that "F7" was a single keystroke. She's come a VERY long way since then. Fortunately, my parents are properly skeptical of unexpected links and attachments, to the point of contacting the sender to verify before opening. This makes my life SO much easier.
-
That account said they heard about the site from GNS3 Jungle, and the contest is cross-advertised over there. I'm guessing that will draw a lot of new accounts here, just as the second phase of the contest will result in a bunch of new accounts being created over there.
-
I would very much like to see this as well. This is hindering me on a project and I'm surprised this wasn't there.
-
I'm really surprised this doesn't already exist.
-
I would have thought so, too. I thought that was a pretty easy call.
-
-
Good thoughts! We actually use multiple layers of protection for log monitoring, so this is covered.
-
I would consider the current situation to be expected behaviour.
-
Thanks, this is very helpful. If you haven't clearly defined the scope of what you've set out to do, it's very difficult to know if you're doing it right.
-
Great insight, thank you. I love the concept of Interrupted User Minutes.
-
After years in a NOC maintaining our Solarwinds platform, monitoring circuit, placing and managing circuit orders, 1st-tier troubleshooting routers, managing web filters, etc., I am now in a position where I am working at a different company who is implementing Solarwinds for the first time, and getting migrated to the new…
-
We haven't seen much here. I guess the biggest challenge is getting the resource allocation right.
-
I've always thought of CLI as a necessary evil. Evil because it's finicky and difficult to work with; necessary because there aren't really any tools that do the job better in most cases. I think it will be interesting to see how well the major players support NETCONF; for example, whether companies like Cisco decide it is…
-
I use TeamViewer so I don't have to keep messing with their router settings, plus I use a Mac. Same idea, though. Fortunately my parents have actually become pretty self-sufficient computer-wise. They've come a long way. The first time Mom used the computer, I remember explaining to her that not two keystrokes.
-
Oh, now you guys are just rubbing it in!
-
Congrats to the winners! One of these years I'll actually win one of these...
-
It works now. What was the issue? Here's the idea for anyone who wishes to vote on it:
-
Sounds like you're confusing it with Solarwinds Sandwich Monitor!
-
In many cases, attackers want access to a system, not specifically your system. Part of the reason that installing a home security system on your house works is that not all of your neighbors have one.The same is true of good network security. Making an effort to protect yourself, and to keep that protection updated and…
-
They will be posted in this thread (hasn't happened yet). The person who usually handles it is away until tomorrow. Danielle said she was working on it; I'm guessing she's running a little behind (plus she left her laptop charger at Ignite ).
-
It's E-ZPass here. No way I'm waiting an hour at the George Washington Bridge.
-
Probably because you can use scripts in SAM application components. Makes sense.
-
Coming soon from Solar Winds: Orion Network Administrator Monitor (NAM), which proactively monitors network administration staff and detects potentially dangerous activities such as go-karting, paintballing, and water bottles in the data center. Where NCM can help with HIPAA, SOX and PCI compliance, NAM addresses the…
-
This is really well-presented. The infographic in particular is very useful. I'm curious to what extent, if any, you feel that 2-factor authentication mitigates the need for excessive password length (which presents its own set of challenges)?
-
Definitely looks to be missing. Hey TiffanyNels, can you help?
-
wait until they get a little older and make it a family project. That's what my friends did over the course of a week with their kids and their Imperial Destroyer.
-
I *really* like that analogy.
-
At my company, we use a containerized solution on phones and tablets. The company has total control of everything in the container, and the user has control of everything outside.
-
I asked DanielleH the same question during the Solar Winds lab last week. She said that they are a little delayed in getting them posted since maria.bungau was on vacation last week, and she normally handles posting the points. We should see them this week.
-
You have to gird your loins in black and white stripes.