All Posts

Operations vs. Engineering Tools
November 3, 2015
Michael Stump
Whether your IT operation is a small-scale endeavor or a web-scale enterprise, systems monitoring plays a critical role in the delivery of your services. The ability to quickly and accurately…
Hybrid IT
October 27, 2015
Amy Manley
These past few years you’ve heard a lot about the cloud. The cloud that’s always been there has a new approach for companies. Run your applications directly from the cloud…
Troubleshooting SQL Server, Part 2 : Inside or outside? Error or Not?
October 26, 2015
Kevin Kline
In the popular white paper entitled Troubleshooting SQL Server Wait Statistics, I take you through three scenarios in which a wait stats-only approach is insufficient or even harmful to detecting, diagnosing,…
Great Advice on Monitoring Amazon RDS For MySQL From Datadog
October 21, 2015
Baron Schwartz
Our friends at Datadog just published an insanely great three part series on monitoring Amazon RDS for MySQL using Datadog. You should go read that now.
Windows Guest Licensing: To KMS or Not?
October 20, 2015
Jim Millard
To better combat software piracy, Microsoft introduced License Activation with Windows XP/Server 2003; however, activation was pretty much implied and automatic if you had volume license keys. When these keys,…
The Challenges of Network Virtualization Technologies
October 20, 2015
Faisal Khan
Network virtualization, software defined network (SDN), and network function virtualization (NFV) have taken the communication industry by storm. They are no longer buzzwords; the industry is seriously focusing and converging…
How to Prevent a Data Breach from SQL Injection Attacks
October 16, 2015
Vaishnavi Vijayaram

The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top reasons for this exorbitant sum. Hackers attack websites to gather commercial information, consumer information, or targeted profiles.

Looking Backward to Look Forward
October 15, 2015
John Herbert
“Whoever wishes to foresee the future must consult the past” -unspecified “wise men” quoted by Niccolò Machiavelli With so many articles out there telling me how SDN will change the…
How to Explain Virtualization to Newbies
October 15, 2015
Matthew Leib
In the world of enterprise architecture, many parts of our daily conversations are taken for granted. We talk about virtualization, vMotion®, Storage vMotion, Replication, IOPS, and so very many other…
What If You Can’t Trace End-to-End?
October 15, 2015
Baron Schwartz
A lot of monitoring systems have a goal of end-to-end tracing, from “click to disk” or something similar. This is usually implemented by adding some kind of tracing information to…
1170182