Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

IP Blacklisting: Your Beginner's Guide

IP Blacklists contain ranges of or individual IP addresses ‌you want to block. A blacklist can be used in combination with firewalls, intrusion prevention systems (IPS), and other traffic filtering tools. With the recent developments in cyber security, organizations are increasingly relying on IP blacklisting to protect their networks.

Anatomy of a Supply Chain Attack Detection and Response

In today's world of global supply chains, a breach never stops at a supplier level but cascades all the way up the chain. So being able to detect and stop a supply chain attack at an early stage before an attacker exfiltrates confidential company data or damages company operations and reputation is critical to your organization's survival. Luckily, hackers always leave a trace, so proper detection can help you stop breaches at an early stage before hackers achieve their goals.

What Are Preload Resource Hints?

Preloads are a powerful optimization technique that can make significant improvements to crucial performance metrics such as Core Web Vitals. I have written on prefetching a DNS lookup or even preconnecting to a domain. Preloading is a much more powerful extension of these concepts because it enables you to download entire resources in advance. In this article, let’s look at.

CDN Log Analysis

Since the beginning of the Internet, the speed of delivering content has been an issue. While processor enhancements, network acceleration, and web frameworks have brought drastic improvements to performance, the goalposts have continued to shift further away; devices operate on wireless connections with limited bandwidth, and the Internet is accessed from every corner of the globe.

Is it Time to Retire Your VPN?

VPNs: not just sponsors of YouTube tech videos! If you think of Virtual Private Networks (VPNs) as data privacy tools or a way to access geographically restricted content, then the idea they’re dying out probably seems far-fetched. But if we’re talking about internet-based VPNs, the kind that enables access to corporate networks, there’s been plenty of prognostication that the last days of VPN may be upon us.

What is SD-WAN

SD-WAN is software to help manage the WAN. It makes the management and operation of a WAN by decoupling the networking hardware from its control mechanism and making it more straightforward. SD-WAN is a transformative technology used to simplify IT infrastructure management through a virtual WAN architecture that securely connects users to their applications. To understand SD-WAN, we should start with the traditional WAN.

5 Ways An SDI Platform Can Improve The Performance Of Your Applications

Improving the performance of applications and workloads that employees and customers engage with can have direct benefits to an organisation’s productivity and profit. In this blog we look at 5 ways that an SDI platform which offers private connectivity can help IT teams streamline networking activities and navigate performance challenges very quickly.

Solving slow web applications - Kentik Synthetics Page Load Test

Kentik's Phil Gervasi talks with Product Manager Sunil Kodiyan to discuss what synthetic testing is and how it can be used to troubleshoot issues with web applications. Sunil demonstrates the use of the Kentik Synthetics Page Load test, which provides a granular breakdown of how every component on the page is loading. Using that information, web app developers can easily track down exactly what’s impacting a site’s performance—whether it’s a site hosted on-premises, in the cloud, or by a SaaS provider.