Comments
-
I found the answer on the hint page, melonizame
-
"Security is hard because people are dumb." I think to myself (both asking myself to do this and wondering why others don't,) "Can you think one or two steps ahead? Where will this lead?"
-
"... we can always rely upon our Zip drives to get us back up and running!" I wasted some money on those things.
-
Having conversations with outside service providers is also needed in many cases depending on the industry you are in. If they can't meet your up time requirement then you need to come up with another solution or live with what they can provide. Thanks for the article.
-
Been there, done that!
-
I was thinking about Google’s tenth messaging service will “unify” Gmail, Drive, Hangouts Chat I'm disconnected enough that unless it will replace Slack and Microsoft Teams it doesn't hold my attention.
-
I received my backpack yesterday. I had a great time opening and closing all ten compartments!
-
Think about the ransomware attacks after quantum supremacy. I'm sure the real threat will be someone finding a way to retrieve and publish all data on any and all computers. Which will be fine for a while since there will be too much data. Then someone will find a way to organize the data and use which would result in no…
-
Here you go
-
Hi stantong. You probably want to ask the question here Network Performance Monitor by selecting "Start a Discussion" on the left hand menu. When you do you might want to rephrase the question a bit. If your question is "Is it possible to send an email from a SolarWinds alert?" The answer is, yes. If your question is can…
-
327 million Americans. 100 million credit applications. I'm sure there are people who have applied more than once, potentially people outside of the US have applied, and applications from companies. Has 1/3rd of the US really applied for a credit card with one bank? I wonder if this data also included "pre-approved"…
-
SaaS is something my manager has asked me to look into for some of our in-house solutions. This article gave me some more things to think about!
-
Interesting article. The monitoring strategy suggested in this situation sounds the same as for any large application or system, does it not?
-
"Leaky Database" makes me think of finger pointing during system outages. IT'S NOT THE NETWORK!
-
Like @"rschroeder" I do not believe the provided answer options actually answer the question. The answers should be the ones @"rschroeder" provided, or the question should be something like "What are typical ways, or forms, monitoring professionals support the business?"
-
Interesting read. I understand "disk encryption" but I don't understand "Fire and disk encryption." I was also confused a bit about the "primary reason" section. I am assuming respondents were allowed to select more than one "primary reason" in order for the percentages added together to be more than 100%.
-
[Hi from the Seattle SWUG. I had the courtesy to wait until your presentation was over sqlrockstar before commenting.] From the Productivity article-- “Productivity software should be something you use less than the thing you used before.” Makes me think that outcome of social media is anti-social behavior, and bills in…
-
I was about to create a feature request for the same thing. Even if clearing all alerts for an unmanaged node is not the default behavior, it would be nice to have a configuration option that would clear all alerts for a node when it is set to an unmanaged state.
-
I just finished my upgrade to 2019.2. I'm looking forward to getting my hands dirty with these new features.
-
I hope the DoD is doing these three things already!
-
3) Visual firewall connection mapping
-
"How much does an average data breach cost an organization? According to IBM's latest numbers, the tab can run up to $3.92 million after investigation expenses, damage control, repairs, lawsuits and fines." What is $3.92 million compared to an average profit of the Fortune 500 companies at $2.2 billion! This might not be…
-
The fines imposed on companies like Facebook should definitely be more meaningful. Have you ever looked to see where that money goes? It appears it gets stashed away in a non-interest bearing account with the Fed, or put in a General fund in the government. I think a law should be made to that if it does not go to the…
-
There are enough SIEM tools out there that you shouldn't have to build your own or try to re-invent the wheel with tools not meant to be SIEM tools. This article gives good pointers for selecting a tool that fits you.
-
Thanks for the article. Great points!
-
Me too!
-
Not is this context of policing others, but I get what you are saying.
-
Next month I think all questions should come from Thwack users, and SolarWinds employees pick the best 20 questions to post for the month.
-
I missed one, not because I didn't know the right answer, but because I clicked too quickly when selecting the answer and submitting it. When reading the response, I was wondering why it said I got it wrong when I thought I selected the answer in the response. Oh well.
-
This comment probably could apply to many of the articles. "Standards. They matter."