In this episode of Defrag This, we discuss the nuances of IT networks in dangerous industries.
Keeping an up-to-date network inventory is essential for network efficiency, especially given current networks changing dynamics. The Cisco Discovery Protocol (CDP) is a network discovery tool, which assists network administrators and engineers in identifying neighboring Cisco devices, particularly those running lower-layer, transparent protocols.
Footprinting your environment is the first step to identifying ways in which intruders can penetrate your network. Thankfully, we offer a free utility that helps with precisely this task! In this Snip, Anthony Howell shows you how to use WhatsUp PortScanner to scan a host machine for open ports, then he'll show you how to harden your system using the host's firewall.
Users are part of any network and while sometimes troublesome, it’s the responsibility of the IT admin team to ensure that users can access only the resources necessary to perform their roles. The receptionist has no need to access software project data and software developers have no interest in HR resources. Therefore, user permissions are necessary.
For years, there have been concerns of the Chinese government building backdoors and spying capabilities in to phones and hardware built on their soil, and now it seems those concerns are coming to head with a recent Bloomberg story that alleges that Chinese government agents installed thousands of spy chips into servers used by Amazon, Apple, and the US government. How true are these allegations, are our servers safe? In this article, we’ll attempt to figure out what—if anything—happened, and how IT pros should react.
Many health care IT organizations create service-level agreements (SLAs) for new applications and infrastructure projects. It's important to collect metrics related to SLA line items and review your metrics on a regular basis.
In this article, we share some tips on how to construct an Request for Proposal (RFP) document. It will list the major things to consider when compiling your RFP (many of which often get overlooked) and provide guidelines on a typical RFP lifecycle.
It can be tempting to build your own DIY Network Monitoring solution, but what's the real cost of building and maintaining such a tool at scale?
For sysadmins and other IT pros, Halloween plays itself out all year long with all sorts of network nightmares and stranger things that can turn any server room into a house of horrors.
The IoT in healthcare can absolutely help make people more proactive about their health and provide physicians with better information, but it also becomes a nightmare to manage all this data and move it from device to device.
Defrag This has covered machine learning and AI at a higher level—but never before have we had the chance to dive into how autonomous applications work by design.
“If there’s one thing I hate the most, it’s software licensing.” This was said to me, unprompted, by my friend Janine who works in government. She managed operations at large federal organization and handled budget items in the billions of dollars each year. But her biggest hassle was dealing with how her vendors handled software licensing.
Get our latest blog posts delivered in a weekly email.