Comments
-
I agree with most of this. Although I have yet to be about to use wireless in federal atmospheres.
-
I love the alert. And I can't wait to hear what the announcement is.
-
You can do this through the compliance piece of ncm. It can search a config and then you can set a remediation action.
-
I started with a basic computer class in school (it was actually more like a typing class on a computer, since they didn't really teach any computer language on the C64). I also liked the atari, which led me into electronics. After high school, I started an electrical engineering degree. I liked it, but I hated doing all…
-
Good article. Flash from the past... lol
-
All goes back to having the right policies and processes in place. That and monitoring
-
Those are good and pretty funny. Thanks!
-
This was a very good read! Good job with your situation and this article!
-
Very good information. I have not used these
-
Congrats Jeff Catlin
-
OK. I am interested now
-
I hear what you are saying, but the jury is still out on whether this will be the future in network management. NMSs will have to support this new "standard". If they don't support it, it will go nowhere fast. I also have not seen anything out there about many management software vendors supporting NETCONF YANG, much less…
-
I agree. Look at the new Microsoft Server OSs. You now have the option (preferred option) of installing the OS as a core installation (without gui). With the gui, it is less secure and runs more services and has a bigger disk footprint. The Core installation only runs what the server actually needs to run. A lot less…
-
I don't really think that we will ever be able to keep up, no matter how automated a system is. You still have to "teach" the system. They will always find a way. We can only do the best we can to stay on top for the biggest threats.
-
Everywhere I have been, it has always been the same thing. Purchase basic tools or tools for the most important things first, and then build from there. Once the first set of tools is in place, then see what tools integrate with them or can add capability (non-duplicate). Most places won't just throw all the money at a…
-
Good write up and if anyone needs any of these, I know a great place that teaches them all and tests you wherever you are. RFK Solutionz
-
cvachovecj In reference to this: HOW TO ADD VARIABLES TO CLI STATEMENTSYou may want to include certain variables, that you normally use e.g. in device templates, in your CCT. This approach helps you keep your template as device-independent as possible. Additionally, you can include e.g. IP address (of your TFTP server,…
-
I have to agree with mr.e. If there is no market for it, no one will be left behind. Vendors don't support protocols just to support them. They are asked to or "forced" to by their end users or defined standards. If these don't exist, they don't get support. It is the money game. Why invest money into something just…
-
And yet some more good reads. You keep this up sqlrockstar and you are going to set a standard.
-
Since I don't feel you get told enough. You two are awesome DanielleH and maria.bungau
-
I agree.
-
I think it's here somewhere...
-
I agree that there are definitely short life cycles for applications these days. I do not forsee a change either.
-
Availability, but we don't specifically have all the right modules as of now. Working on that now. A lot of it is manual and very time consuming.
-
This tool will never be on any networks that even think about security. It is so outdated. It certainly isn't more powerful than a netflow collection tool that actually shows you what is going on on your network. Any network admin would rather have that then a file transfer program. Just my opinion, but I'd be surprised if…
-
I'm really don't have the time to invest in excel spreadsheets for something like this. That is just crazy. Every employer that I ever worked for would laugh at me all the way out the door for not getting anything else done. I'm sorry, but I don't look at excel as a tool to use for this kind of practice. But to each his…
-
Good series so far. I have had very similar experiences. I was with an organization that spent millions on a monitoring solution that they also tried to use for everything. If it did not have the capability, and if there was another module for that product that performed the needed function, they bought it. It did not…
-
I have been very fortunate in my career to have upper management that at least somewhat understood the importance of security. Working in government environments also helps, since we are bound by certain standards. I have also worked in the commercial environment as well. Most of the time, smaller businesses have no clue.…
-
* How do you present your case to a CTO/CFO? Do you have some go to metrics that you find they understand more than others? Up time or time lost. Latency. High bandwidth utilization * Do you correlate performance data with other groups of financial data to show a bottom line impact of a performance issue or outage? Yes.…
-
I wish, but my schedule won't allow it. That is awesome that you you put these up for grabs. I can't believe no one has jumped on these yet.