Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

ICYMI - Network Monitoring and InfluxDB

At this year’s InfluxDays event, the capabilities of InfluxDB took center stage. It’s not enough to simply deploy a technology platform and hope people will use it. This isn’t a Kevin Costner movie. That’s why it’s helpful to talk about specific use cases, their typical challenges, and how InfluxDB can address those challenges. Fortunately, that’s just what Influxer Charles Mahler did for network monitoring.

An Overview of STIR/SHAKEN: What it is and Why it is Important

Receiving a phone call from an unfamiliar number—and deciding whether or not to answer that call—has become an increasingly pervasive problem for nearly everyone. Sophisticated robocalls and Caller ID spoofing are now a regular (albeit frustrating) part of consumers’ daily lives.

How to choose the best network monitor for your business

Network monitoring is a vital IT operation that helps organizations keep the business functioning without technical disruptions. To help shoulder the burden of network management for IT operations team and ensure the organization is free from network downtime, organizations turn to network monitoring tools. This is why selecting the best network monitoring tool for your organization is a crucial decision to make.

What is IT Infrastructure Monitoring? Is It Different from Network Monitoring?

Computer marketers and analysts never saw a term they didn’t want to change. Not leaving well enough alone with the tried and true "network monitoring," more folks have taken to using the term "infrastructure monitoring." That term is so general as to have little meaning. Afterall, what infrastructure are we talking about? Bridges, roads, servers and NICs? Very confusing.

The Critical Role of Intrusion Prevention Systems in Network Security

An Intrusion Prevention System (IPS) is a network security and threat prevention tool. Its goal is to create a proactive approach to cybersecurity, making it possible to identify potential threats and respond quickly. IPS can inspect network traffic, detect malware and prevent exploits. IPS is used to identify malicious activity, log detected threats, report detected threats, and take precautions to prevent threats from harming users.

Three cloud trends to watch in 2023

Digital transformation continued apace in 2022, with the public cloud helping businesses reduce the financial risk of innovation and drive agility when they need it most. A quote from Dave McCarthy, Research Vice President at IDC, sums up the sentiment of the year: "Cloud is no longer considered a location but rather an operating model for future innovation." With that in mind, here are three of the key cloud trends to watch in 2023…

HAProxy User Reviews Show Community Momentum

{ If you think you can’t do something with HAProxy, go have a look, because you probably can. Onward and upward! In 2022, many happy HAProxy users turned to G2 – a leading aggregator of user reviews and product ratings – to leave their feedback. These user reviews were so positive that G2 recognized HAProxy as a Leader in Load Balancing, DDoS Protection, and API Management, with an additional leadership position for momentum in the load balancing market.