All Posts

Windows Guest Licensing: To KMS or Not?
October 20, 2015
Jim Millard
To better combat software piracy, Microsoft introduced License Activation with Windows XP/Server 2003; however, activation was pretty much implied and automatic if you had volume license keys. When these keys,…
The Challenges of Network Virtualization Technologies
October 20, 2015
Faisal Khan
Network virtualization, software defined network (SDN), and network function virtualization (NFV) have taken the communication industry by storm. They are no longer buzzwords; the industry is seriously focusing and converging…
How to Prevent a Data Breach from SQL Injection Attacks
October 16, 2015
Vaishnavi Vijayaram

The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top reasons for this exorbitant sum. Hackers attack websites to gather commercial information, consumer information, or targeted profiles.

Looking Backward to Look Forward
October 15, 2015
John Herbert
“Whoever wishes to foresee the future must consult the past” -unspecified “wise men” quoted by Niccolò Machiavelli With so many articles out there telling me how SDN will change the…
How to Explain Virtualization to Newbies
October 15, 2015
Matthew Leib
In the world of enterprise architecture, many parts of our daily conversations are taken for granted. We talk about virtualization, vMotion®, Storage vMotion, Replication, IOPS, and so very many other…
What If You Can’t Trace End-to-End?
October 15, 2015
Baron Schwartz
A lot of monitoring systems have a goal of end-to-end tracing, from “click to disk” or something similar. This is usually implemented by adding some kind of tracing information to…
Monitoring: How and Why We Do It
October 14, 2015
Bob Plankers

Monitoring is a lot of work. A monitoring system is a service unto itself, and like other applications it needs care, feeding, configuration, databases, DBAs, patching, and maintenance. Though it often prevents the loss of revenue, it doesn’t generate revenue except in rare circumstances. Last, it requires vigilance and attention to detail that is often overlooked or impossible in a busy IT environment. So why even bother?

Queueing Theory: Faster Trains Might Make London Underground Slower
October 10, 2015
SolarWinds
Let’s take a look at a great real-world example that effectively illustrates how queuing theory can be unintuitive even in situations that seem simple. A recent BBC report reveals researchers’…
The Premise of Premises: All Clouds Are Not Created Equal
October 9, 2015
Christopher Kusek

There’s a common misconception in the IT industry. This misconception stems from the premise that the premises of your infrastructure will either be more expensive or less expensive based on its location. Okay, that may sound like a lot of metaphorical jibber jabber and mixed-speak, but that’s how the industry talks when backed into a corner.

A Look into the Pi-Shaped Expert Model
October 7, 2015
Joep Piscaer
So you’ve started planning your career using a VCDX skillset. Continuing on that same train of thought, I want to walk you through an additional concept that might help you…
1174186