All Posts

Introducing Query Anomaly Detection
November 11, 2015
Baron Schwartz
Anomaly detection sure is a hot topic. We’ve written about it ourselves a number of times, and Preetam Jinka and I just co authored a book for O’Reilly called Anomaly…
The Five Commandments of Tomorrow’s Network
November 10, 2015
John Herbert
Recently, I’ve been giving some thought  to the roadblocks I discover when I attempt network automation and orchestration, and how those roadblocks affect the software-defined data center idea as a whole. As a result,…
Nobody Loves Graphite Anymore
November 6, 2015
Baron Schwartz
Many of our customers use Graphite, and I don’t think anyone would argue with me when I say it’s probably the most commonly used time series database in the DevOps…
Operations vs. Engineering Tools
November 3, 2015
Michael Stump
Whether your IT operation is a small-scale endeavor or a web-scale enterprise, systems monitoring plays a critical role in the delivery of your services. The ability to quickly and accurately…
Hybrid IT
October 27, 2015
Amy Manley
These past few years you’ve heard a lot about the cloud. The cloud that’s always been there has a new approach for companies. Run your applications directly from the cloud…
Troubleshooting SQL Server, Part 2 : Inside or outside? Error or Not?
October 26, 2015
Kevin Kline
In the popular white paper entitled Troubleshooting SQL Server Wait Statistics, I take you through three scenarios in which a wait stats-only approach is insufficient or even harmful to detecting, diagnosing,…
Great Advice on Monitoring Amazon RDS For MySQL From Datadog
October 21, 2015
Baron Schwartz
Our friends at Datadog just published an insanely great three part series on monitoring Amazon RDS for MySQL using Datadog. You should go read that now.
Windows Guest Licensing: To KMS or Not?
October 20, 2015
Jim Millard
To better combat software piracy, Microsoft introduced License Activation with Windows XP/Server 2003; however, activation was pretty much implied and automatic if you had volume license keys. When these keys,…
The Challenges of Network Virtualization Technologies
October 20, 2015
Faisal Khan
Network virtualization, software defined network (SDN), and network function virtualization (NFV) have taken the communication industry by storm. They are no longer buzzwords; the industry is seriously focusing and converging…
How to Prevent a Data Breach from SQL Injection Attacks
October 16, 2015
Vaishnavi Vijayaram

The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top reasons for this exorbitant sum. Hackers attack websites to gather commercial information, consumer information, or targeted profiles.

1169181