/ Chris Grundemann

Chris Grundemann

Avatar photo

Chris Grundemann

Chris Grundemann is a passionate, creative technologist and a strong believer in technology’s power to aid in the betterment of humankind. In his current role as Principal Architect at Myriad Supply he is expressing that passion by helping clients build bigger, faster, more efficient IT infrastructure that is easier to operate and scale.

Chris has well over a decade of experience as both a network engineer and solution architect designing, building, and operating large IP, Ethernet, and Wireless Ethernet networks. Chris holds 6 patents in network technology and is the author of Day One: Exploring IPv6 and Day One: Advanced IPv6 Configuration, an IETF RFC, a personal weblog, and various other industry papers and blogs. As a volunteer he is currently serving as President of IX-Denver, Program Committee (PC) member for AfPIF, ISOC-NY liaison to NYNOG, and Chair of the Open-IX BCOP committee. Chris often speaks at conferences, NOGs, and NOFs the world over. He has held previous positions with Markley Group, Internet Society, CableLabs, tw telecom, CO ISOC, ARIN, NANOG, CEA, UPnP, DLNA, RMv6TF, and several others.

The Latest Posts Featuring Chris Grundemann

Inside the Black Box: Bridging the Database Observability Gap
March 27, 2026
Database

Over the past 15 years, Agile and DevOps have accelerated application delivery, enabling faster, more reliable releases. Yet the database layer often remains a blind spot for observability and performance monitoring.

In this article, Kevin Kline shows why closing the database observability gap is critical to improving performance, efficiency, and resilience for DBAs, developers, and the businesses that depend on their data.

You Are Here – Visibility & Control
Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this…
You Are Here – Identity & Access Security
Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape…
You Are Here – Endpoint & Application Security
So far in this series we have reviewed a few popular and emerging models and frameworks. These tools are meant to help you make sense of where you are and how…
You Are Here – Perimeter Security
In part 1 of this series, we covered some of the most prevalent and most promising cybersecurity models and frameworks available today. These are all tools that can help you…
You Are Here – Making Sense of Modern InfoSec
Now that we all carry supercomputers complete with real-time GPS mapping in our pockets, a reference to physical maps may feel a bit antiquated. You know the ones I’m talking…