Posts

Anatomy of a crisis: why SA is on the brink of rolling blackouts

Image
Eskom has shut down 11 power station units due for major maintenance because it lacks the funds to fix them. This comes as the embattled power utility struggles to find coal to feed its coal-fired power stations — the bulk of its fleet. Moneyweb earlier reported that 11 of Eskom’s 15 coal-fired power stations have less than the required 20 days’ coal stock — and of those, five have less than 10 days’ stock.
Read the article over at TechCentralhere.


Searching for technology writers in South Africa

Image
After a few months of trying to syndicate some of my LinkedIn articles on South African publications such as TechCentral, MyBroadband and ITWeb and receiving the feedback for the stable door not to hit my ass on the way out I decided to start an open publication that caters for technology in South Africa. Thus I am searching for technology writers to write articles on Medium and to submit them to the publication “The Technology Burrow”. To be added as a writer to the publication, please send me a note or inbox me. My idea is to have community based news and articles available from a wide range of non-commercial contributors who enjoy writing. So if this is your thing, please sign up. Promise that you won’t encounter a Rinkhals or have the stable door smack your ass!

Cisco fuses SD-WAN, security and cloud services

Image
Cisco secures SD-WAN software, bolsters cloud-based Office 365 application access, and offers DevNet SD-WAN development options.
 Read the article over at Network World here.

2018 Cybersecurity Checklist

Image
Preventing Initial Compromise.  The best defense against cyber attacks is to prevent attackers from gaining initial access to a machine in the first place.
Access the checklist here.


Single point of failure analysis - reducing the risk of outages on business critical service

Image
ITIL suggests three processes that can be used by an user of a data centre to determine reliability. It is not sufficient to look at the physical layer and make a determination as significant number of service are being abstracted and delivered in a virtualization fashion. It cannot be assumed that the configuration of the virtual infrastructure is resilient and neither can it be assumed that all services are being delivered in a generic fashion.
Read the article over at LinkedIn here.


Why the legacy pricing models of network management are dated

Image
Many network management products are licensed using a legacy licensing model. The significant majority still use the old and dated licensing model that Microsoft was familiar with before we knew about the cloud and starting using Office 365. Many of these products are packed with features that are never touched but you still pay for them. It's time to wake up, smell the roses and join the cloud generation. Ironic, as most of these packages claim to assist in managing the cloud...
Read the article over at LinkedIn here.

SD-WAN can be a smart solution—if you avoid the pitfalls

Image
There are many benefits promised by efficient software-defined wide area network (SD-WAN). From new agility and speed of provisioning to driving down total costs, it’s no wonder some of the world’s biggest companies are moving in this direction. But it pays to look beyond the surface value of any solution. SD-WAN, in particular, can appear deceptively simple. Often viewed as an out-of-the-box, set-it-and-forget-it solution, SD-WAN implementation and post-implementation management can be wrought with pitfalls.
Read the blog post over at the Burwood Group here