Day 10: Container
You know LEGO bricks—the multi-colored building blocks you can use to build cool things like a Star Wars™ Star Destroyer™, or an airplanes, or whatever you can dream up? A really simple way to make...
View ArticleHow to Monitor Changes to Windows Server Roles
FEATURED EPISODE:How to Monitor Changes to Windows Server RolesDecember 10, 2019Your servers perform distinct functions in your environment. If one of those roles is removed or added unexpectedly,...
View Article3 Strategies for Managing the IT Impact of Classroom Technology
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Mav Turner with ideas for improving the management of school networks by analyzing...
View ArticleHappy New Year: What Will Be Different This Time Around?
2019 is coming to an end, and what a great year it was! This tech year was all about data security, IoT, automation, artificial intelligence and machine learning, connected cloud, and hybrid cloud...
View ArticleDay 11: Orchestration
When you’re playing with all your cool LEGO Brick toys, you need some way of making sure you always have the right Lego pieces at the right time. It wouldn’t do for you to have everything you need to...
View ArticleDay 12: Microservices
So back to the LEGOs example. If applications are like multi-colored LEGO® bricks, that you can use to build death stars and airplanes, then microservices would be like the tiny connector pieces that...
View ArticleHow to Configure an Office 365 Tenant
IntroductionIn a roundabout continuation to one of my previous blog posts, Did Microsoft Kill Perpetual Licensing, I’m going to look at the basic steps required for setting up an Office 365 tenant....
View ArticleSEM and SQL Server Audit - Better Together
As a production database administrator for many years, I was tasked with security requests. These requests ranged from “who changed what” and included detection of SQL injection attacks. That role...
View Article[Survey] Cybersecurity and Your Day-to-Day
Our Security product team is looking for some thought leadership inspiration and to learn about your day-to-day thoughts and interactions with cybersecurity! Take this survey and with our thanks, you...
View ArticleDecember Writing Challenge Week 2 Recap
Week 2 of the challenge has brought even more insights and wisdom than I imagined - although I should have expected it, given how incredible the THWACK community is day after day, year in and year out....
View ArticleJust Throw it in the Cloud! - The Battle of the Clouds Series
Scenario: a mission-critical application is having performance issues during peak business hours. App developers blame the storage. The storage team blames the network. The network admin blames the...
View ArticleDon't Let Technical Debt Be Your Company's Subprime Loan: Mapping Your Way to...
I was in the pub recently for the local quiz and afterwards, I got talking to someone I hadn’t seen for a while. After a few minutes, we started discussing a certain app he loves on his new phone, but...
View ArticleHow to Monitor Changes to Antivirus Exclusions
FEATURED EPISODE:How to Monitor Changes to Antivirus ExclusionsDecember 17, 2019Virus scanning can be a main contributor to poor application performance, but administrators must walk a fine line to...
View ArticleUsing User Access Management to Defend Against Insider Threats
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by Jim Hansen about leveraging access rights management to reduce insider threats and help improve...
View ArticleDay 18: Parent-Child
“Parent-Child”—This phrase has many different meanings, but the most poignant to me is the relationship of a human parent to their child. Sure, there’s the Orion parent-child relationship, but it’s the...
View ArticleThe Actuator - December 18th
I hope this edition of the Actuator finds you and yours in the middle of a healthy and happy holiday season. With Christmas and New Year's falling on Wednesday, I'll pick this up again in 2020. Until...
View ArticleDay 17: Syslog
In 1980s, a long, long time ago, a person was sending an email and wanted to know why some emails didn’t get delivered. So, they created a way to write down everything with the email system did in a...
View ArticleDay 13: Alert
The Origin of the AlertWhen I was five years old, I loved tales about soldiers. So, settle down and let me tell you a story about some soldiers. In the late 16th century or thereabouts, while...
View ArticleDay 14: Event Correlation
An event could be any number of things; essentially an event is something that happens. Lots of things happen; you boil a kettle, add coffee granules to a cup, add milk to the cup, add boiling water...
View ArticleDay 19: Tracing
LEGO® multi-colored building bricks can be used to build cool things like planes, buildings, and even cool superhero vehicles like the Batmobile. There are instructions that tell you how to put the...
View Article
More Pages to Explore .....