Comments
-
Cool!
-
Helpful. Informative. Thanks!
-
Interesting.
-
Interesting article, thanks for posting. These are the concepts that my engineering side really enjoys.
-
Bookmarking this for future reference!
-
Interesting article.
-
Nice info.
-
I bookmarked this as a handy reference page.
-
That would be handy but our Change Management approval process has the changes discussed and approved before hand and then it is just a matter of actually making the changes and proving that they were made. Good thoughts though!
-
Of the cloth, that standardized is better than bleeding edge. Have a sandbox to test equipment and concepts but try to keep switches and routers the same in both hardware and configuration. Try to be conscious of the budget and try to keep project scope and expectations in line with the business goals and objectives. Tough…
-
this is a great feature. Thanks for sharing.
-
Bookmarked. Good reference material.
-
Interesting reading.
-
I had something like that a few years ago. Had a vendor setup an access database that was shared but was limited to 10 connections. When the environment grew to 100 users it become a huge nightmare. It took the vendor some two years to figure out to re-implement using a SQL server. Of course, this is a critical application…
-
Great article.
-
Congrats Leon. Seems strange how quickly time passes when you find something you enjoy!
-
It does seem counter intuitive that you have to turn the firewall service on in order to disable the zones of the firewall. Or you have to turn on the firewall service to allow a remote access application to connect to the local machine.
-
I bookmarked this page so I can keep the reference links. Thanks!
-
I have done a number of these conversions in former lives. We were moving to VSphere and I used VMWare's coldclone application to make the conversion. Of course, this meant the server had to have scheduled downtime but it caused us no issues making the clone and spinning it up in the VSphere environment. All the post…
-
Great information!
-
Logs are a great tool for tracing what happened. But, in relation to SIEM's there is the need to correlate the Log data with packet captures. I have spent countless hours gleaming through logs both inside the SIEM as well as a syslog server to determine an issue, only to be halted by the fact that a packet capture is…
-
Interesting reading.
-
We implemented a policy that all BYOD are allowed to freely use the guest network. No restrictions but it has a completely separate internet connection and the user must VPN from the device back into the network to access any resources.
-
Thanks
-
From my days of Industrial Engineering, People don't want change, but IT is all about change. We grow, we adopt, we learn, we develop, we implement, we research, and we repeat. The concept of silos is what I would consider the biggest limiting factor. When sub-departments or people create solutions and don't take into…
-
Interesting article.
-
Nice article. Thanks!
-
This article was a good read. THanks!
-
Actually, I appreciate the listing of tools. I have not had the experience of any of them but I am bookmarking the page as reference. Might be useful to discuss with our VDI team. Thanks!
-
Thanks for sharing.