Day 5 - Code
Code. The word has had a mystical quality to it since its inception. Its origins come from the Latin word “codex,” which was a book constructed of paper bound by stacking papers and fixing one edge....
View ArticleLearning from the Past for Better Data-Driven Decisions
By Joe Kim, SolarWinds EVP, Engineering and Global CTO With the advent of the Internet of Things (IoT) and connected devices, the amount of data agencies collect continues to grow, as do the challenges...
View ArticleSIEM Solutions and Their Role in IT Security
Do you know how to protect your organization's sensitive data from today’s cyberthreats? One way is to arm the enterprise with a security information and event management (SIEM) tool. SIEM solutions...
View ArticleDay 6 - FUD (Fear, Uncertainty, and Doubt)
Thanks to pervasive acronymization of society, we now down in daily grammar like FOMO, FWIW, FML, FB, and FBF. What we should never have, as IT professionals, is FUD. “What is FUD,” you say? Fear,...
View ArticleDPA Integration Module 11.1 - PerfStack, Blocking, and Deadlocks
If you are using Orion, I am sure you have already heard of PerfStack (aka Performance Analysis), SolarWinds' Drag & Drop Answers to Your Toughest IT Questions. DPA did not make the first cut of...
View ArticleThe Actuator – December 6th
Had a wonderful time at AWS re:Invent last week. It was great to be at an event where I was just an attendee. It's been 15 years or so since that has happened. In case you missed it, Amazon had a long...
View ArticleThe only source of knowledge is experience...
The title of this post is a quote that might be (or not be) from Albert Einstein. I first thought the title of the post would be something like:” why root cause analysis is your saviour”, but I think...
View Article5 More Ways I Can Steal Your Data: Hire People Who Lack Empathy
In this last post of my 5 More Ways I Can Steal Your Data series, I focus on my belief that all data security comes down to empathy. Yes, that one trait that we in technology stereotypically aren't...
View ArticleNon-IT File Sharing and HIPAA Implications
When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn't until I really...
View ArticleSAM 6.5 is Generally Available!
If you're one of the many customers that tried the beta or release candidate, you've already seen many of the exciting new features in SAM 6.5. For the rest of you, here are more details about what's...
View ArticleLearning Module In Successfactor
TekSlate is the globally professional in Online Trainings of IT courses across the globe which emphasize on hands-on experience with examples from real-time scenarios by experts. About Course...
View ArticleDevOps Wrap-Up
Welcome to the final post in my series on DevOps. If you've been following along and reading comments for the previous posts, you know the content generated several questions. In this post, I will...
View ArticleDay 7 - Pattern
Snowflakes and conifers, elves and presents... see a pattern emerging? Us humans are pretty good at finding the message in the noise. Recognizing, sorting, and evaluating inputs, comparing them with...
View ArticleDay 8 - Virtual
For me, "virtual" is a buzzword being used to sell me the idea that things are simple and easy to configure. Many years ago, networking people achieved some virtualization by running VLANs in order to...
View ArticleWord-a-Day Challenge 2017: Week 1 Wrap-Up
The 2017 Word-a-Day challenge is off to an amazing start, and I wanted to share just a few of the incredible insights and amazing stories being shared in that space. If you hadn't heard about it until...
View ArticlePlease help us win! Post your review of Web Help Desk and get 750 Thwack Points!
Our Web Help Desk software is currently in the running for Gartner Peer Insights Annual Customers’ Choice award! And we’re super excited to participate. They recognize 7 software vendors who have an...
View ArticleDay 9 - Binary
Binary HaikuWith just two fingersCounting to two fifty-fiveJoined with seven friends When I was first learning about computers and the idea of binary numbers was introduced, I was lost. This was...
View ArticleDay 10 - Footprint
Starting out in life, we are poked and prodded and dressed up in strange clothing. One almost-universal gesture is to create a plater mold of a baby’s feet. This leaves a near permanent fossil of...
View ArticleDay 11 - Loop
Loops are among the most sublime constructs of programming, but as it turns out, often consume our personal lives as well. Whether baked into the silicon of routing ASICs or beautifully parallelized in...
View ArticleMonitor your storage arrays with a new free tool – Storage Performance Monitor
We’re happy to announce the release of SolarWinds® Storage Performance Monitor, a standalone free tool that provides a consolidated view of all your storage array’s performance.Designed for storage and...
View Article