Resources (384)

  1. Branch Maintenance via Out-of-Band Management

    Out-of-band management, aka OOBM, plays a vital role in modern IT operations of all sizes and scales. Indeed, OOBM might be judged “mission critical” for headquarters operations and data centers alike. But OOBM is tremendously important for satellite IT operations, as well, most notably for branch and remote offices. Such operations span a wide range of locations and roles, with tens to hun… Read More

  2. Stay Connected with Out-of-Band Management

    During a security assessment, auditors always ask this one question: “How do you manage your devices?” The answer should be: “out-of-band management.” Is that your answer? If not, you may have issues that need immediate attention. What Is Out-of-Band Management? Let’s get started with a definition. Out-of-band management, or OOBM, is a technology that allows you to connect to devi… Read More

  3. Systems Management and the FCAPS Standard

    Managing systems and networks ultimately means understanding what they comprise, what they can do, and who’s allowed to use them. In IT, systems and network management is an important discipline with a long history, with many approaches and tools to implement them. FCAPS Sets the Management Stage A comprehensive model for network and device management appeared in the 1980s as part of the Ope… Read More

  4. Tips for Proper Out-of-Band Network Design

    Out-of-band (OOB) networking provides a separate, independent pathway in and out of systems and networks. OOB doesn’t depend on production networks to access equipment, perform management and monitoring tasks, make repairs, or access data for legal or technical reasons. But what’s the proper way to set up an OOB network? Do you know and understand how they differ from standard networks? If… Read More

  5. SASE: Rethinking Network Security in the Age of the Globally Distributed Cloud

    Today's network security solutions are proving inadequate, based on a major shift in the spotlight on where data and resources are located and work is performed in the enterprise network. With the increase in remote-based users, Software-as-a-Service (SaaS), and globally distributed cloud services, the focus of identification has changed from the data center to the user or device. This isn't yo… Read More

  6. The 'Three E's' of Exceptional IT Content

    In my work the last few years, I’ve overseen the creation of content that helps IT vendors connect with information-hungry IT buyers. I’ve been observing how that content is received and find the '3 E’s' mnemonic a helpful way to remember each ingredient. I’m constantly teaching my team (and the army of contributors we work with) to think about these things. Here they are... Read More

  7. Where to Spend on IT Content Marketing in 2020

    We polled our audience to find out how they feel about the standard stable of IT marketing tactics and assets. The overwhelming feedback we received reveals six key areas we recommend that our clients invest in, and three that are little more iffy in terms of bottom-line results. Read More

  8. How Impactful Is VMware’s New Core-Limited Licensing?

    This week, VMware announced new licensing restrictions for vSphere, which I wrote about here.  I wanted to get more understanding for how impactful this change would be for existing customers.  On today’s ActualTech Media EcoCast, I asked our audience for two pieces of information.  The first asked viewers if they have any servers with individual processors of more than 32 cores.  The second… Read More

  9. VMware’s Licensing Change Redux: Better the Second Time Around

    The year was 2011. I was comfortably ensconced in my office at Westminster College watching as VMware brought out a marketing executive to discuss the company’s revolutionary new licensing program. As soon as I saw that it was a marketing person giving the news about a change in licensing, I thought to myself, “This isn’t going to be a positive announcement.” And it wasn’t. vSphere… Read More

  10. Report: Cloud Spend Tops Data Center Spend for First Time in 2019

    “Trend” stories have some value, in the same way virtual machine snapshots have some value: they’re helpful, and often quite helpful, as long as you understand their limitations. (And always remember: a snapshot is not a backup!) You know the end-of-year trend articles: “Top Stories of 2019,” “Most Downloaded Songs of 2019,” and so on. They provide a look at what happened in the p… Read More

  11. Google Anthos: Kubernetes the Easy Way

    Kubernetes continues to gain popularity in the industry, and shows no signs of slowing down. This container management platform has essentially won the container wars, and is now the de facto orchestration tool for containers. Kubernetes is popular because managing containers is a serious pain. But Kubernetes itself is a pain, too—ask any admin who’s tried to bootstrap it. In fact, the most… Read More

  12. WannaCry Ransomware Hits Hard in 2019

    If your organization was pummeled by the WannaCry virus last year, you’re not alone: nearly a quarter of all ransomware attacks were of that variety. And the damage it did was staggering. That’s according to PreciseSecurity.com, which reported that WannaCry was the most common crypto ransomware attack of 2019, accounting for 23.56% of all such assaults globally. The article also estimate… Read More

  13. Challenges to Cloud Computing Resource Planning

    Cloud computing has transformed how enterprises think about infrastructure. A decade ago, IT professionals had to make server projections months or years in advance, deciding on the types of servers they’d need. That would in turn be largely determined by the services required for their business needs, and expected loads those servers would bear. Cloud computing has changed the game. Enterpri… Read More

  14. ‘The Cloud’ Is No Magic Bullet

    There remains a belief among some in IT that moving to “the cloud” will solve all their problems. This is, emphatically, not the case. It’s entirely true that the cloud has massive advantages in terms of things like the ability to scale, to move capital expenditure (CapEx) costs to a more budget-friendly operational expenditure (OpEx) cost model, and faster time to market via containers.… Read More

  15. 5 Big Challenges of Multi-Cloud Management

    Cloud computing is ubiquitous. Enterprises are continuing to move to the cloud in record numbers. According to the RightScale 2019 State of the Cloud report, 91% use some form of cloud, and 84% of enterprises have a multi-cloud strategy. It's easy to see why: a multi-cloud architecture, comprised of different cloud platforms, offers the versatility to accommodate a wide range of enterprise computi… Read More

  16. Virtual Summit Wrapup: Architecting and Supporting the Pillars of IT in 2020

    The next decade is around the corner: 2020 beckons, and with it come a host of challenges and opportunities in the IT space. To help get a handle on what we can expect, ActualTech Media held its largest-ever Virtual Summit on Nov. 8, 2019. In all, 12 vendors presented their vision of the future, and how their products will help enable that future. The companies represented the full gamut of IT:… Read More

  17. Untangled: The ActualTech Cloud Solutions Megacast

    Although the cloud is rapidly maturing, it’s fair to say that most companies are still trying to figure out their cloud strategy: what workloads to put there, the proper mix of public and private clouds, determining the risks vs. benefits, costs, CapEx vs. OpEx… the list goes on. To add to the choices is the number of cloud vendors out there, ready to help your business. All this means that… Read More

  18. Ripcord Unleashes Robots to Transform Your Paper Documents

    In recent years, enterprise-class organizations have been increasingly finding that big data analytics is allowing them to capitalize on business insight that’s hidden within their seldom-used data. One factor preventing such processes from being as effective as they could be, however, is the overall availability of data: Large organizations commonly have vast amounts of data that they can’t l… Read More

  19. How to Defend Against IoT-Based DDoS Attacks

    A new variant of Mirai—the botnet that took down the Internet on most of the U.S. east coast in 2016—has now emerged, and it’s growing fast. Termed Echobot, the malware behind the botnet targets more than 26 vulnerabilities to propagate. Most agree that it has the potential to pose an even greater threat than Mirai, and cause significantly more damage.  This is no surprise. Given the mas… Read More

  20. SADA Goes All-In on Google Cloud Platform

    When it comes to public cloud, there are three leaders, and then all the rest. Those leaders are Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). And they’re in that order, as well—AWS at the top, followed by Azure, with GCP in third. If that’s the case, does it make sense for a cloud services provider to focus their efforts on GCP, instead of the others? For S… Read More