Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

How To Select The Right NaaS Partner

The end-goal for a CIO adopting a Network-as-a-Service (NaaS) approach is to create a predictable, cloud-like consumption model for enterprise infrastructure. NaaS is designed to ensure that the enterprise network is state of the art and continually adopts innovations, frees the enterprise IT staff from monitoring tasks, rolls up the range of SLAs, and reduces the need for specialist skills in-house.

What Is Load Balancing

Load balancing means splitting up network traffic so that you can distribute it evenly across a group of backend servers. For example, if you run two web servers, both hosting a copy of the same website, then you can balance the traffic across them, sending half to one and half to the other. The goal of load balancing is to increase the availability of your website or web-based application by routing a portion of requests to each server.

How to Diagnose Internet Problems in your Network | Obkio

Many Internet problems are intermittent which means that they appear in your network for a short time, and then reappear when you least expect them to. So you need the right tools to diagnose Internet problems. Choose a Network Monitoring Tool Obkio continuously monitors end-to-end network performance with synthetic traffic using Network Monitoring Agents. Monitoring Agents monitor network performance from the source up to the destination to identify network issues, diagnose connection problems, and collect information to help you troubleshoot.

Network AF, Episode 8: Staying curious with Ron Winward

In the first podcast episode of 2022, Avi welcomes Ron Winward to Network AF! Ron is the vice president of network services at INAP, global provider of secure, performance-oriented, hybrid infrastructure. Like Avi, Ron also grew up in Pennsylvania and is a member of the East Coast Access of Infrastructure.

What is Network Performance Management and how is it evolving in the cloud era

Join Michael Patterson, Kentik network technologist, to find out what NPM has become and why legacy solutions met their demise. Get in-depth details about these three must-have monitoring techniques: Watch this Kentik webinar replay to learn: Why these technologies bring deeper visibility into how your company’s internet connections and applications are being impacted and by whom. How to identify the third parties to reach out to when problems occur and see where to focus your optimization efforts.

What is an Access Control List (ACL)?

A commonly used tool at the Cisco command line is the access control list (ACL). At their simplest, access control lists are collections of IP addresses that are used by a router, switch, or a firewall to identify network traffic that must be handled in a special way. Cisco and other network vendors use ACLs for many different purposes. This article focuses on IOS access control lists as used on Cisco routers, although much of this discussion applies to Cisco switches as well.

Transforming Education and Government IT and Cloud Environments

State, local government, and educational institutions have unique IT requirements and regulations that traditional commercial organizations don’t face. From specific IT budgeting processes to strict compliance, public sector organizations are constantly forced to maximize every IT resource in their complex IT environments.