Comments
-
As a non-systems/servers guy, I feel like this is lost on me; though I am interested to see how I can find out whether or not it's the network or the application.
-
At first I found this article funny, specifically when you said "We have moved on from bring your child to work to bring your own device to work..." But toward the end it turned toward the sinister side of things with the idea that the government is monitoring us in ways I've never thought of. Chills. You've seriously…
-
I couldn't agree more.
-
I honestly wish I had more input on this, but we don't really do any external websites/applications. Great article though, aluciani!
-
So, do we get an August mission too?
-
This is excellent! I'm pretty new to understanding DPI, so this is a good intro!
-
Hey, Apple internal support: If you want us to set up a demo for you, give us a call. ^^ This made me laugh. Amazing.
-
Right -- You get fifty points for bookmarking the mission, THEN (during the week of July 7th) you get points for each social networking site you added. as maria.bungau mentioned, you will receive the points you are due soon.
-
We don't really keep a standard... which is a good point. (Security policies are a must!)
-
Gah! Got today's question wrong... Didn't see the word "not" in the question. That's what I get for reading before drinking my first cup of coffee.
-
Bookmarking for later. Our QoS implementation is rather complicated (from my perspective; though I'll admit I'm a little new to the idea of QoS), but it seems to do well.
-
Still working on our baseline. I think the hardest part is getting all the parties involved (VoIP, Security, Wireless, etc) involved so that we can settle on certain settings.
-
So from what I gather from your reply: SIEM is reactive, PAD is more proactive (still reactive though); SIEM is external, server-based, on-going process in which it logs your network -- PAD is a firewall-based, process based less on the individual network and more on networking standards... Yes?
-
I'm afraid I can't seem to answer day 3 either.
-
Always scotch. Breakfast is the most important meal of the day, after all.
-
....aaaaaaaaaaaaand bookmarked for later. Nice work!
-
That may be a good thing -- that's how they get you.
-
This -- This is Glorious. I'll take the unlimited license, please. Also, will this subject be in the next version of the Solarwinds Certified Professional exam?
-
Thinking of intrusive devices makes me think of the "Eye-phone" episode of Futurama...
-
Awesome! Thanks, maria.bungau!
-
We tend to aim for reliability. Any lack of service in our business tends to be a big deal for people (even outside of our business).
-
I wish I had a good, solid answer for you-- but the sad fact is that we lack an overall security strategy within my workplace.
-
Well that clears it up a bit. Thanks kevincrouch4 !
-
IMHO there is a good reason to use a hybrid system if you have the resources (see: Money) to do so. Having multiple perspectives rarely hurts a situation.
-
Do we respond to the question via twitter, or through thwack?
-
Well, there were definitely more people who made it that far than I thought! I guess you were right, maria.bungau!
-
You don't feel like that may be a vulnerability?
-
Ahhhh, this would have been useful to me years ago, when I had to manage our device inventory.
-
As a former Marine, can confirm in the "Keep it Shiny" principle. We liked to call it "Officer Friendly."
-
I think the most difficult part of network management is keeping up with current technologies. Depending on where you work, some people don't understand the needs for heightened security, or at least not using telnet.