I recently wrote about my experience going from IT to DevOps. If you’re currently in IT and looking to get involved with software development, or just curious about the transition, I advise you to go check it out. After sharing that post, I got a bunch of requests to share how I broke into IT […]
Going From IT to DevOps
If you’ve worked in IT, this story may sound familiar…
You start out as tech support, eventually land a help desk role, gain experience, maybe get promoted to help desk level 2, or become an IT admin.
What is NGINX?
Intro to NGINX If you’ve been following along with my posts, you have a sound introduction to Apache Web Server, how it functions, it’s place in history, and how Sumo Logic can help you sort through the numerous logs provided. Apache Access and Error logs are integral to understanding the traffic patterns and issues your users […]
How to Monitor Apache Web Server
In order to effectively manage and monitor your infrastructure, a web admin needs clear and transparent information about the types of activity going on within their servers. Server logs provide a documented footprint of all traffic and errors that occur within an environment. Apache has two main log files, Error Logs, and Access Logs. Error […]
Introduction to Apache Web Server
What is Apache Web Server? Apache HTTP Server is a free and open-source web server that delivers web content through the internet. It is commonly referred to as Apache and after development, it quickly became the most popular HTTP client on the web. It’s widely thought that Apache gets its name from its development history and […]
Securing Your Infrastructure With Best Practices From DevSecOps.
How do you secure something you can’t even see, hear, or touch? They say the only secure server is one that isn’t turned on or connected to the internet. While that is true, it isn’t really practical, so we need to figure out ways to avoid exposing our company or clients data to malicious actors. Whether […]
The Dangers of Shadow IT
Shadow IT is a term often used to describe information-technology systems and solutions built and used inside organizations without explicit organizational approval. It is also used, along with the terms “Stealth IT” and “Client IT”, to describe solutions specified and deployed by departments other than the IT department. At one point, Shadow IT was merely […]
The Difference Between HDDs and SSDs, and Why It Matters To You
The last time you purchased a new iMac, there maybe have only been one kind of hard drive available (Apple SATA Disk Drive). If you look at Apple’s website today you may notice that there are now three options to choose from: Serial ATA Drive @ 7200RPM Fusion Drive SSD/Flash Storage While it may be […]
Troubleshooting Methodologies w/ Eli the Computer Guy
Eli is an IT Professional with his own YouTube channel and 750K subscribers. I’ve learned a lot from his free videos. He covers Networking basics like TCP/IP, DNS, VPNs, Servers, and other relevant info. This class teaches students the mindset and processes required to professionally troubleshoot computer systems. Every new technician should fully understand the […]
Manage Your Passwords with a Tiered System
We need to rethink how we manage our passwords and online assets. We tend to reuse the same username and password across all websites. We’ve seen a rash of databases for social services being dumped all across the dark web and even open internet. Whether it’s Ashley Madison, Adobe, MySpace, or even LinkedIn, major social […]