Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Hurricane Helene Devastates Network Connectivity in Parts of the South

In this post, we dig into the impacts from Hurricane Helene which came ashore late last month wreaking destruction and severe flooding in the Southeastern United States. Using Kentik’s traffic data as well as Georgia Tech’s IODA, we detail the impacts in three of the hardest-hit states: Georgia, South Carolina, and North Carolina.

What Is A Network Drop: Solving Drops in Networks

Network drops can seriously impact business operations, leading to lost productivity, communication breakdowns, and even financial losses. Whether you're managing critical systems, supporting remote teams, or delivering services to customers, a stable network is essential for maintaining business continuity. But what causes these network drops? How can you fix them? And most importantly, how can you prevent them from happening again?

The hidden challenges of Internet Resilience: Key insights from 2024 report

The result of responses from over 300 digital business leaders in North America and EMEA across technology platform providers, financial services, retail, and other industries, our research showed that almost half the surveyed organizations are losing upward of $1M monthly in terms of total economic impact (TEI) due to outages and service degradations.

What is Network Access Control? A Complete Guide to NAC

Network access control (NAC) is a critical component of any organization’s cybersecurity strategy. As companies adopt increasingly flexible work environments and emerging technologies like the Internet of Things (IoT), their networks have expanded rapidly. More users, devices, and access points mean more potential vulnerabilities that attackers could exploit. Implementing NAC solutions lets organizations stay securely connected despite relying on a complex, dynamic infrastructure.

3 Switch Features You Should Never Change

In separate incidents this past month, I’ve helped clients troubleshoot network problems that turned out to be due to misconfigured switches. In all cases, the errors turned out to be things that I don’t think should ever have been changed from their default settings. So I thought it might be useful to have a brief discussion about how switches work and what features should or should not be used in normal office environments.

Managed vs Unmanaged Switch: Which One Fits Your Network Needs?

The backbone of any business or home setup relies on robust, reliable infrastructure. At the heart of this infrastructure lies a fundamental piece of hardware: the network switch. And beneath that there is a battle: Managed vs unmanaged switch. Whether you’re a seasoned IT pro or someone just dipping their toes into networking, knowing the difference between managed and unmanaged switches can save you a lot of trouble (and money) down the road.

11 helpful KPIs to improve your network performance

Digitalization has surpassed network modernization, resulting in networks struggling to keep up with daily operations. While many networks can accommodate GenAI and other new technologies, network administrators are responsible for maintaining uninterrupted operations and preventing any errors. For this, they must diligently monitor network performance and related metrics so their networks remain secure and robust yet flexible enough to adapt to the latest technologies.

Monitoring Policy Groups in AppNeta: Streamlining Setup and Maintenance

The AppNeta by Broadcom product team has been focused on enhancing the solution’s capabilities for monitoring setup and administration. This evolution began with the introduction of Monitoring Policies, which provided a framework for setting up monitoring in a scalable, automated fashion. Following this, we added new network rules that made it simple to select and tag the networks that should be monitored.

Capturing a Complete Topology for AIOps

Our thinking and use of topology within AIOps and Observability solutions from Broadcom has advanced significantly in recent years while solidly building on our innovative domain tools. We’re looking to communicate these innovations, advancements, and benefits for IT operations. In this blog, we continue where the previous blog left off to explain the boundary blame concept and mechanism to obtain a sufficiently complete topology.