Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

NoSQL Database Monitoring with DX UIM

A NoSQL database provides a mechanism for data storage and retrieval, without using the tabular relations associated with relational databases. Originally referred to as "non-SQL" or "non-relational" databases, NoSQL databases are increasingly used in big data and real-time web application environments. NoSQL systems are also sometimes called “Not only SQL” to emphasize that they may support SQL-like query languages or sit alongside SQL databases in polyglot-persistent architectures.

Why Redundancy Should Be An Important Part Of Your Multi-Cloud Strategy

For many organisations, multi-cloud has become or is becoming inevitable. After all, it’s unlikely there is a single cloud out there that is able to support all your requirements. More than likely however, is the chance that your business is becoming multi-cloud by stealth. Organisations typically use several, to dozens, to hundreds of Software-as-a-Service (SaaS) products, as well as a handful of Infrastructure-as-a-Service (IaaS) hosting services, and development Platforms-as-a-Service (PaaS).

What is remote network monitoring?

Remote network monitoring is a technical specialty that was born almost at the same time as networks themselves. Since then, many strategies have emerged when it comes to monitoring network elements. In this article we will talk about the current techniques based on SNMP polling and network statistic collection through Netflow, and we will also mention outdated systems such as RMON. Most techniques are purpose-oriented, so they are especially useful.

Network Nickels and Dimes: Government IT on a Budget

State and local governments have always had to get a little creative when it comes to efficiently managing the government IT budget—they have to ensure they can stretch those dollars as far as they’ll go. However, inefficient network management practices are only adding to the challenges of local government IT modernization, and sucking the life out of their information technology budget.

Bolster network monitoring with root cause analysis

If you own an enterprise, then you know the value of a healthy network and how seriously detrimental a network outage is to your business. But network issues are inevitable. The heavy dependence on networks to meet the ever-changing client and internal usage requirements takes a heavy toll on the network. This makes networks vulnerable to common problems such as unplanned, sudden downtime, high resource utilization, and hardware malfunctioning.

Welcome to the Auvik family, MetaGeek!

We have some exciting news. Today I’m thrilled to welcome a new member to the Auvik family. The MetaGeek team are experts in wireless and through their 15+ year history, MetaGeek has led the way in creating tools to help network administrators and wireless engineers build, monitor, and troubleshoot Wi-Fi networks. At Auvik, we have an ambitious and aggressive roadmap to deliver a remarkable technology management experience.

Modernizing Network Monitoring with InfluxDB and Telegraf

This article was originally published in The New Stack. As the technology landscape continues to change at a rapid pace, enterprise companies are in a rush to catch up and modernize their legacy IT and network infrastructure to capture the benefits of newly developed tools and best practices. By adopting modern DevOps techniques, they can reduce their operational costs, increase the reliability of their services and improve the overall speed and agility at which their IT teams are able to move.

Network AF, Episode 13: Talking networking and PR with Ilissa Miller

In this episode of the Network AF podcast, Avi Freedman connects with Ilissa Miller, network whisperer and PR industry veteran. Ilissa and her team translate technology into business terms by helping clients understand the value and functionality of a company. Avi asks Ilissa how she got into the field, her biggest takeaways that helped launch her own business and what’s important in today’s networking world.

The Future of Monitoring: Turning Unknown Unknowns into Known Knowns

To ascertain risk, national security and intelligence professionals have long used concepts such as known knowns, known unknowns, and unknown unknowns. The idea of unknown unknowns was created in 1955 by American psychologists Joseph Luft (1916–2014) and Harrington Ingham (1916–1995). This concept continues to be used today in risk assessments and is applicable to technology. The unknown unknowns are the threats and potential problems that remain invisible until their impact manifests.