I recently came across a project requirement calling for an encrypted version of a VOIP protocol; I couldn’t fulfill the request, because the software didn’t support encryption of the protocol. However, I was able to resolve the issue by asking a simple question: “Is encryption an actual...
4 Comments - no search term matches found in comments.
I don’t miss the days when a zillion raw data points made up a transaction and application experience was displayed on something resembling a starship console. Application monitoring tools could, albeit with a great deal of elbow grease, identify performance issues, but they weren’t up to the...
2 Comments - no search term matches found in comments.