Follow these steps and get yourself out of the server room and onto the beach.
Last Friday was Sysadmin Day (or, System Administrator Appreciation Day in full form), an annual day of recognition for hard working sysadmins. It was created by sysadmin Ted Kekatos in 2009 after being inspired by an HP ad promoting LaserJet 400 printers where a sysadmin was celebrated by colleagues. For context and the full story, check out this 2011 interview with Ted by Spicehead Nic Tolstoshev.
As I watched Star Trek Beyond in the theater, I couldn’t help but relate working on an IT team to working on the USS Enterprise. All that they endure in this latest installment is metaphorical to everything IT does for a business. It’s easy for IT teams to fall apart when team members lose themselves, due to selfishness or burnout. It’s equally important for IT to keep the ship (or USS Enterprise) in running order. The movie evens starts with Kirk feeling bored and disassociated with his current job after being in space for 995 days, something which IT pros can all relate. "The grind", as we like to call it.
Data archiving is an odd practice at times. When big data is focused on every last bit of information, the idea of relegating any amount of it to outdated media can seem like a waste of resources. Add the cloud and you begin to see how out of place this concept can be.
More complexity, fewer results. This is the general consensus among IT teams everywhere. IT infrastructures have evolved into a Frankenstein of servers, access points, applications, and mobile devices. To throw another wrench in there (pun intended), the tools we implement to control complex business networks end up increasing complexity due to the lack of integration between all of these tools. What you get is a tangled mess of solutions that only complicate matters.
If you do any security monitoring, it's easy to get overwhelmed by the amount of events you need to track. You can start by doing longer hours, but eventually you'll end up in a swamp — sucked in to the point that workflow comes to a standstill.
The future of IT will be molded not just by technology, but also by changing expectations and attitudes toward support's role within the organization.
Human error is responsible for more than half of all security breaches as of last year, making employees the biggest cyber threat of all. Shadow IT, on the other hand, is the deliberate installation of software that is not authorized by IT. The reasons for it? They vary, but generally include tools to make your tickets easier — which should already be available in a centralized company repository.
The plotline for a data center's Big Data story is still being written, and already there is no lack of twists and turns. The Internet of Things (IoT) is just the latest in a multi-episode drama that'll spawn as many shark-jumping forecasts as processes.
IT is a pretty thankless job; long hours to deploy technology that's often invisible to the average user isn't exactly an ego boost as you leave work every night. But for every moment of sheer frustration — and they are many — there's a much lighter side to support, affectionately called "information technology humor." Cue canned laughter.
Automating NAS to perform regular network drive backups can be the difference between staying open and losing everything. "Point your NAS at your online service or a device on your network," he says, "and it will automatically suck everything down."
As it grows, your company will probably have an emergency at some point that warrants crisis management in IT. No matter if it's a data breach, natural disaster or product malfunction, you're usually the first blamed for its occurrence and the last credited with resolution. Even in the case of a weather event, sysadmins take the hot seat if user machines aren't up and running quickly. But as they say, people don't remember the mistake — they remember how you handled it.
Take pride in knowing that your company depends on its help desk. And when it comes to information technology problem solving, few skill sets are more valuable to ensure business continuity. Yep, even marketing execs and similar partners pale in comparison to those whose workload is defined by troubleshooting.
When transitioning to a new solution, do IT vendors elicit a mix of anticipation and fear? That makes sense. You're eager to see the new service hard at work, but simultaneously concerned it won't live up to promised hype or deliver on promises made by the supplier.
It's been a year since Sony Pictures employees logged into their workstations, expecting to start a normal workday, when they were greeted by soundbites of gunfire, images of skeletons and threats scrolling across their monitors. To date, the Sony Pictures attack is arguably the most vivid example of advanced persistent threats used to disable a commercial victim. A corporate giant was reduced to posting paper memos, sending faxes and paying over 7,000 employees with paper checks.
Get our latest blog posts delivered in a monthly email.