Joshua Chessman has been working in the technology field for over 25 years from his start working in desktop services at a Fortune 500 company to his current leadership role in the Advanced Technology Group at Riverbed Technology. Josh spends his time performing a delicate balancing act between the demands of work and the demands of his family consisting of a wife, four children, and disobedient but sweet Beagle.
Posts from Joshua Chessman
07-Nov-2016 • by Joshua Chessman
AppResponse 11 Part 2: What’s in it for NetShark Users
In the last post we looked at what SteelCentral AppResponse 11 is going to bring to the table for new users....
03-Oct-2016 • by Joshua Chessman
Financial Services and the Sharks: Swimming Together
Financial exchange companies live and die by their ability to deliver the information they need to the appropriate places....
28-Jun-2016 • by Joshua Chessman
Setting Preferred Interfaces Programatically
With the introduction of high-speed interface reporting in SteelCentral NetProfiler and SteelCentral NetExpress (the all-in-one version of NetProfiler for small and medium enterprises), we’ve begun a new age in interface troubleshooting and monitoring!...
14-Jun-2016 • by Joshua Chessman
Class Based Quality of Service (CBQoS) Metrics and aaNPM
Why didn’t my call go through? How come this video is so choppy? Why couldn’t I get the data I needed from that application?...
18-May-2016 • by Joshua Chessman
Finding the Needle in the Haystack with Riverbed SteelCentral NetProfiler
Data. As we have moved to the (supposedly) paperless society the amount of data (both on and off paper) has increased at near exponential rates. ...
11-Apr-2016 • by Joshua Chessman
NetProfiler and SteelScript: Giving 110%!
We all want to know what is happening on our networks. That’s why we use tools like SteelCentral NetProfiler and SteelCentral NetShark. What hosts are communicating with what other hosts? How much traffic are those hosts sending? What ports is that data being sent on? However you look at it, this sort of information is the bread and butter of the network performance monitoring (NPM) product world. Traffic reports, user-defined policies, analytics, and all sorts of other tools are built into the product to let you take advantage of that information....
28-Mar-2016 • by Joshua Chessman
How Many Applications Do We Have?
Applications are the life blood of your organization. Whether it is e-mail, financial, customer management, or order processing, all businesses today rely on applications for their day-to-day operations. Depending on the application and your business model you may have one or two applications sitting in the cloud that you use because you have to, or you may have hundreds upon hundreds of applications spread between a local data center and the cloud. Those applications may be necessary evils that are used but unloved, or tools that streamline productivity, increase profits, and make everyone’s lives easier....
14-Mar-2016 • by Joshua Chessman
Let's Communicate, Universally!
As more and more companies roll out voice over IP (VoIP) solutions and more and more companies enter the VoIP market in different ways, the options for saving money by migrating from traditional PBX-based phone systems to modern, flexible VoIP solutions grows on an almost daily basis. From the early days of Asterisk, Avaya, and Cisco to the current Microsoft Skype for Business and Google Voice options, individuals and businesses have never had more choices when it comes to communicating....
18-Jan-2016 • by Joshua Chessman
Moving, Moving, Moving, Keep that Data Center Moving!
The data center is the lifeblood of any large organization. Servers critical to your day-to-day operation sit on racks using power, generating heat, and causing application owners stress. A minor outage in a data center can represent millions of dollars an hour in lost revenue while a major outage can hugely impact the bottom line revenue of your company. Add to this the fact that the physical location of your data center can be a major factor in reliability and availability and the data center can be seen as a huge headache....
04-Jan-2016 • by Joshua Chessman
WAN Optimization and aaNPM: So Much Better Together
WAN optimization solutions such as Riverbed SteelHead have the potential to save your company money and drastically improve worker productivity. By reducing the amount of traffic traversing your expensive MPLS links you can downsize the link—sometimes significantly. ...
16-Dec-2015 • by Joshua Chessman
No REST for the Weary
Application Aware Network Performance Monitoring (aaNPM) solutions sit on your network and monitor the traffic. They store information about what hosts are talking to what other hosts over what ports, protocols, and applications sending how much traffic. A wide variety of metrics are available for this information depending on the source of the information being collected and coalesced.
04-Dec-2015 • by Joshua Chessman
They Went Where?
Tracking where people are going on your network—and ensuring they are going to only those places they should be going is an integral part of properly securing a network. According to The Economist (The Cost of Immaturity, 2015) it takes on average 205 days for a company to detect that it’s network has been compromised. That is more then six months from when an attacker first accesses information on your network to when you first notice the attack has occurred—having nothing to do with the amount of time it takes to recover from such an incident....
20-Nov-2015 • by Joshua Chessman
Can You Hear Me Now?
All networks have problems. Whether you are dealing with the newest, best designed network leveraging all the latest technology, up-to-date software or an old, poorly designed network running antique hardware with out-of-date software, you are going to experience problems. These problems will appear in different ways: network outages, performance issues, intermittent problems, or any one of a dozen other options. It is when these problems occur and how we deal with them that is important....
29-Oct-2015 • by Joshua Chessman
Performance! Visibility! Security?
Network security. These words are enough to strike fear into the most cold-hearted CSOs. A network compromise can bring down systems, managers, executives, and even entire companies. Securing the data on your corporate network is not only one of the most important things a company can do, but also one of the hardest.
There are lots of tools that are dedicated to providing network security: vulnerability scanners, intrusion detection and prevention, firewalls, and much more. Every company has its own ideas and approaches to the best ways to achieve the unachievable: the total securing of the corporate network.
As part of your decision on how to secure the network, it is important to recognize that there is no one tool that is going to provide your entire solution. A firewall will help keep people outside your network from getting in, but does nothing to help once someone is on the inside. An intrusion device will help identify when someone intrudes, but does nothing to secure the perimeter. The trick is to have an entire arsenal of tools that can be used to identify issues and then investigate and thus rectify them....