Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Using HAProxy as an API Gateway, Part 6 [Security]

In almost every case, APIs have changed how modern applications connect to their data. Mobile apps, single-page web apps, IoT devices, integration hooks between software—all of these things rely on APIs to fetch, update, delete, and create data. In fact, one set of APIs might serve as the backbone of a website, mobile app, voice assistant device, and more, meaning one data store owns a treasure trove of information about us, the human users.

7 Best Network Infrastructure Mapping Tools

Network infrastructure mapping tools that help you maintain up-to-date maps can be the difference between quickly diagnosing a problem or wasting hours of your time. Similarly, network maps can help everyone in your organization better understand and optimize a network you inherit. In many cases, however, network maps contain stale information or don’t exist at all.

Secure by Design | Securing the Software Development Build Environment

The recent SUNBURST cyberattack on the SolarWinds software build environment is a concerning new reality for the software industry, representing the increasingly sophisticated actions by outside nation-states on the supply chains and infrastructure on which we all rely. SolarWinds is committed to sharing our learnings about this attack broadly given the common development practices in the industry and our belief that transparency and cooperation are our best tools to help prevent and protect against future attacks.

Network Throughput vs Bandwidth and How to Measure It

Have you ever used the term bandwidth? Probably. Have you ever used the term network throughput? Maybe. Have you used them interchangeably? Most likely. So let’s see where we get these mixed up. Namely, let’s look at the key differences between network throughput and bandwidth. And while we’re at it, let’s cover the fundamentals of throughput and how to measure it, so you can keep your network flowing efficiently and cleanly.

How To Avoid Complex Pricing And Lengthy Contracts With Your Global Internet Access

When it comes to your business’s global internet access, network speed, security and performance are paramount. Many enterprises use a premium internet service to meet the needs of their global operations. One option available to them, which we have covered extensively already on this blog, is to use dedicated internet access across a private MPLS network. The other is to use an IP transit service.

Using HAProxy as an API Gateway, Part 5 [Monetization]

In our previous blog post, Using HAProxy as an API Gateway, Part 2 [Authentication], you learned that when you operate HAProxy as an API gateway, you can restrict access to your APIs to only clients that present a valid OAuth 2 access token. In this post, we take it a step further. You will learn how to leverage tokens to grant some users more access than others and then charge for the service.

Auvik and Cherwell Present: Processes for Managing Your Network

In this webinar, Auvik’s Technology Advocate Steve Petryschuk and Cherwell’s Principal Solution Consultant Ryan Counts walk you through a few critical steps you can take to make network operations more manageable. You’ll learn which two process factors will help you go from reactive to proactive, how to assess your current network management methods using a simple framework, and when to incorporate tools to automate processes.

How to Reduce Bandwidth Consumption for Your Network?

Do you know who interacts with whom, when, and for how long and how frequently in your network? Network administrators must have clear visibility of bandwidth utilization using a robust bandwidth monitoring tool, to find out slow loading yet crucial connections, to plan out the capacity of network properly or to control the Quality of Service.