Mac Remote Access Overview

Imagine this: an employee at the satellite office across the country is having computer trouble, but they use a Mac device. Or maybe you have dozens of Mac end-user devices to reach, update, troubleshoot, or otherwise manage, but you don’t have time to find each device and manually address the issues. Since many IT professionals … Read more Mac Remote Access Overview

How to Use FTP on a Mac

IT professionals looking to use FTP on a Mac must fully understand what FTP is, the risks involved, and the tools available to help them increase efficiencies and keep sensitive information secure. To understand how to use FTP on a Mac, it’s important to fully grasp what FTP is and how it works. File transfer … Read more How to Use FTP on a Mac

Is OneDrive Secure? Microsoft OneDrive for Business Security Risks

Microsoft OneDrive for Business is a cloud-based storage platform designed to help you organize, access, edit, update, and send files across devices. In 2014, Microsoft launched OneDrive, a rebranding of its original storage platform SkyDrive, with a mission to simplify cloud storage for all. Many businesses choose OneDrive because it offers many opportunities to share … Read more Is OneDrive Secure? Microsoft OneDrive for Business Security Risks

What is SOX Compliance?

In 2002, Congress passed the Sarbanes-Oxley Act, named after its sponsors Senator Paul Sabanes (D-MD) and Representative Michael G. Oxley (R-OOH-4). Instituted “to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws,” the Sarbanes-Oxley Act (commonly referred to as SOX) established a stricter protocol for internal controls … Read more What is SOX Compliance?

Ultimate Guide to Network Monitoring

Basics of Network Monitoring General Networking IP Addresses and Subnetting Switching and Routing Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) General Windows Monitoring Elements General Monitoring Techniques and Protocols Ping Simple Network Management Protocol (SNMP) Syslog Leveraging the Power of Scripts Database Basics Relational database design SQL queries Tips and Resources Monitoring 101 … Read more Ultimate Guide to Network Monitoring

Top 10 Log Sources You Should Monitor

There are literally hundreds of possible types of log sources around your environment and choosing which bubble to the top of your IT consciousness can be difficult. In a job where everything seems to be a top priority, understanding all the log types and sources available for selection can be daunting. In your environment, some logs may be more valuable than others, but having general guidance about logging and what types of logs may be available to monitor can help make you a better technologist.

Read moreTop 10 Log Sources You Should Monitor

Welcome to the new DNSstuff!

Before I worked for SolarWinds, DNSstuff was my go-to place for checking how the rest of the internet saw my domain information. After joining SolarWinds, it’s still my go-to place. Over the years, we have increased the value of the site by adding tool reviews, guides, industry news, tweaking existing tools, and adding entirely new free tools. Realistically, the site hasn’t had many formatting updates over the last five years. That needed to change.

Read moreWelcome to the new DNSstuff!

Monitoring Software: Build vs. Buy

Chances are good that you’ve encountered the “build versus buy” dilemma at some point in your professional career. With the increased popularity of hosted IT and developer-facing SaaS, the decision to outsource IT functions or build and maintain them in-house is more complicated than ever. Unfortunately, many decision makers still allow their decisions to be … Read more Monitoring Software: Build vs. Buy

Top 50+ Tech Influencers and Thought Leaders You Should Follow

Today’s technology is growing at an extraordinary pace, so it is important to follow industry influencers and thought leaders to stay in the loop and learn new trends and best practices. Keeping on top of things in the industry is a great way to make sure you are functioning most effectively every day.

We have compiled a list (in no particular order) of tech geeks from system, virtualization, storage, database, network, and security management domains, who we think are the top influencers and thought leaders you should follow.

Read moreTop 50+ Tech Influencers and Thought Leaders You Should Follow