This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Transitioning portions of IT applications and services into the cloud is something that’s starting to emerge in the minds of IT professionals across organizations of all sizes.
As the saying widely attributed (correctly or incorrectly, you be the judge) to the great Albert Einstein goes, “The definition of insanity is doing the same thing over and over again, but expecting different results.”
Considering the ongoing onslaught of payment system breaches, one of the things that operators of online shopping systems might want to evaluate is the security of their own shopping cart software.
Following my return from TechEd and Cisco Live! in June, I promised a recap of my experiences and impressions from VMworld, which was held late last month in San Francisco.
Last month, I outlined the need to move towards a more application-centric approach to IT monitoring, but what I didn’t specifically discuss is how the enduser fits into the equation.
As the world of technology continues to evolve around us and the boundaries between network and systems become less defined, systems administrators and network administrators need to evolve their monitoring practices to take on a more application-centered focus, rather than the traditional silos of systems monitoring or network monitoring.
Hardly a day goes by in my travels and discourses that I don’t encounter an IT pro new to an organization that discovers they’ve inherited some server, application, service, etc. that doesn’t make sense in its current implementation.