Low Tech Solutions to Survive a High-Tech World

“Identity theft sucks. If you’ve ever been through this, you realize how painful this truly is.”

And with that, Jeff Moulton of the Georgia Tech Research Institute began his identity theft workshop at AFCEA’s West 13 conference in sunny San Diego. I was fortunate enough to attend the identity theft workshop where he shared some simple, common sense ways that even the “most technologically-challenged” folks can utilize to reduce their exposure to identity theft.

Read more

Remote Network Performance Monitoring

Each network manager must decide which open source and proprietary solutions offer methods to use to gather and make sense of the performance data. This means a delicate balance of monitoring networks and recognizing that monitoring can add to network traffic. Here we will look into a few of the remote monitoring options.

Read more

Just give me the project ā€“ Iā€™m technically brilliant!

People from all walks of life can be technically brilliant and do a great job if someone would ‘just give them the project’. Many consultants become consultants because they believe they can provide a better product or service and make more money than if they stayed working for a company.  It’s great to dream big […]

Read more

vSphere Essentials: Virtual Machines

The VMware component that allocates CPU, Memory, and Input/Output is called Hypervisor. The installation of ESXi software right on top of the physical server (Dell Server in our case) is called bare-metal hypervisor architecture. So, an x86-based system running the virtualization layer directly is the bare metal hypervisor. This bare metal hypervisor option is common […]

Read more