Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

NetOps for Application Developers: Understanding the Importance of Network Operations in Modern Development

True observability requires visibility into both the application and network layers. For companies reliant on multi-zonal cloud networks, the days of NetOps existing as a team siloed away from application developers are over.

DataOps Uncovered: A Bold New Approach to Telemetry and Network Visibility

Network telemetry and DataOps play a critical role in enhancing network visibility. By combining both, organizations can improve network visibility and gain insight to help them optimize their network performance, improve security, and enhance the overall user experience.

Ukraine's Wartime Internet from the Inside

It has now been over a year since Russian forces invaded its neighbor to the west leading to the largest conflict in Europe since World War II. Kentik’s Doug Madory reviews what has happened with internal connectivity within Ukraine over the course of the war in this analysis done for a collaboration with the Wall Street Journal. This February marked a grim milestone in the ongoing war in Ukraine.

Speeding Up the Web: A Comprehensive Guide to Content Delivery Networks and Embedded Caching

Content delivery networks are an important part of the internet, as they ensure a short path between content and the consumers. The idea of placing CDN caches inside ISPs networks was created early in the days of CDNs. The number of CDNs with this offering is growing and ISPs all over the world take advantage of the idea. This post explains how this works and what to look out for to do it right.

Practical Steps for Enhancing Reliability in Cloud Networks - Part I

Delivering on network reliability causes an enterprise’s data to become more distributed, introducing advanced challenges like complexity and data gravity for network engineers and operators. Learn concrete steps on how to implement cloud reliability and the trade-offs that come with it.

eBPF Explained: Why it's Important for Observability

eBPF is a powerful technical framework to see every interaction between an application and the Linux kernel it relies on. eBPF allows us to get granular visibility into network activity, resource utilization, file access, and much more. It has become a primary method for observability of our applications on premises and in the cloud. In this post, we’ll explore in-depth how eBPF works, its use cases, and how we can use it today specifically for container monitoring.

Reinforcing Networks: Advancing Resiliency and Redundancy Techniques

Resiliency is a network’s ability to recover and maintain its performance despite failures or disruptions, and redundancy is the duplication of critical components or functions to ensure continuous operation in case of failure. But how do the two concepts interact? Is doubling up on capacity and devices always needed to keep the service levels up? The truth is, designing a network that can withstand the test of time, traffic, and potential disasters is a challenging feat.

Diving Deep into Submarine Cables: The Undersea Lifelines of Internet Connectivity

Under the waves at the bottom of the Earth’s oceans are almost 1.5 million kilometers of submarine fiber optic cables. Going unnoticed by most everyone in the world, these cables underpin the entire global internet and our modern information age. In this post, Phil Gervasi explains the technology, politics, environmental impact, and economics of submarine telecommunications cables.

What Does It Mean To Build a Successful Networking Team?

What does it mean to build a successful networking team? Is it hiring a team of CCIEs? Is it making sure candidates know public cloud inside and out? Or maybe it’s making sure candidates have only the most sophisticated project experience on their resume. In this post, we’ll discuss what a successful networking team looks like and what characteristics we should look for in candidates. What does it mean to build a successful networking team?

Securing Your Network Against Attacks: Prevent, Detect, and Mitigate Cyberthreats

As networks become distributed and virtualized, the points at which they can be made vulnerable, or their threat surface, expands dramatically. Learn best practices for preventing, detecting, and mitigating the impact of cyberthreats. As networks become distributed and virtualized, the points at which they can be made vulnerable, or their threat surface, expands dramatically.