Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Learn how monitoring VPNs enhances your remote workforce's productivity: The ITOM podcast [Episode 3]

The ITOM podcast returns with yet another episode aimed to alleviate all your remote work woes. In the last episode, we drilled into the nuances of VPN security, encryption, hashing algorithms, certification authorities, and much more. Now we’ll discuss the practical implications of VPNs on remote work. VPNs have become many organizations’ best bet to help maintain business continuity in this era of remote work.

How To Identify Network Issues with Traceroutes | Obkio

When looking at a Traceroute, there's usually two important values for each hop or router: Latency Packet Loss Latency: Refers to the time difference between the time when a packet was sent and when a response was received. The latency between two hops can be affected by a number of things such as: To qualify the latency in a traceroute as good or bad, you should analyze historical traceroutes.

5 Reasons to Leverage Ping Monitoring Software to Manage Your Device Network

Managing a device network comes with a host of unique challenges covering everything from security to speed. Some of these challenges can be made easier through the use of ping monitoring service or software. Ping monitoring is the act of pinging a device (assessing the time taken for ICMP protocol packets to be delivered to the target host and returned) regularly. If there's no response - or a later response than expected - you get an alert. This time is usually very fast, measured in milliseconds.

Continuing to Execute During Uncertain and Challenging Times

We are rapidly approaching the six-month mark of the COVID-19 global pandemic and expect to be living with its effects for the foreseeable future. While our Ribbon business has not been immune from this once in a lifetime public health crisis, together we have managed it very effectively and kept our customers first! This is largely due to the extraordinary efforts of our people, along with the quick actions and decisions we took to change our work model and carefully manage expenses.

Monitor your network traffic anywhere with NetFlow Analyzer's GUI on your iPhone

With the evolution of technology in recent times, the face of communication is ever-changing. In today’s environment, failing to adapt to these changes would mean failing to understand what the customer needs. Since every organization is migrating to smartphones and tablets, and employees are starting to depend more on these mobile devices, we at the NetFlow Analyzer team decided to up our game in terms of our mobile offering.

Engineer Intelligent Alerting for Efficient Network Monitoring

Imagine a scenario where your Network Monitoring team has a group of very talented, organized, and focused technicians. Close to half of them are engaged in monitoring the system almost throughout the day. They can take care of the issues and problems as soon as they arise, and you are never facing any downtime. This is an ideal case scenario, right?

How to solve network issues faster than ever with Auvik

Getting to the bottom of a network issue is a race against the clock. But with Auvik, time is on your side. Learn how having network topology, performance metrics, traffic analytics, and centralized logs all in one convenient dashboard can help you dramatically shrink resolution times on network issues and keep your end users connected.

How Can the Public Sector Get Remote Working Right?

Mobile working is becoming the reality for an increasing number of public sector staff. But the threat and impact brought by the coronavirus COVID-19 outbreak has seen many organizations instructing office-based employees to work remotely, as a way to minimize the risk of infection and spreading of the virus.

Master the art of VPN encryption: The ITOM podcast [Episode 2]

Gear up as The ITOM podcast returns with an all new episode specially tailored to help ease all your remote work woes in an IT environment. In the last episode, we discussed VPNs, their protocols, and the advantages of using a VPN in the remote work setting. Episode 1 helped set the stage for us to dive deeper into the nuances of VPN security and encryption. Encryption helps transform confidential information into cipher text or coded text for safe transit across secure VPN tunnels.

Dynamic SSL Certificate Storage in HAProxy

Use the HAProxy Runtime API to update SSL certificates in HAProxy without a reload. When you route traffic through an HAProxy load balancer, you gain the ability to terminate SSL at the load balancer. HAProxy encrypts communication between the client and itself and then sends the decrypted messages to your backend servers, which means less CPU work on the servers because there’s no encryption work left to do.