Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

How Obkio's NPO Plan Supports Organizations Making a Global Impact With Affordable Network Monitoring

At Obkio, we believe in using our resources to give back to organizations that make the world a better place. That’s why we launched our NPO Plan—a program designed to help non-profits access advanced Network Performance Monitoring at a significantly reduced cost. By offering our services to non-profits at a fraction of the price, we help them to focus on what matters most—supporting their missions, rather than worrying about IT costs.

Mastering NIS2 Compliance: Advanced Threat Detection Simplified

In this webinar, “Mastering NIS2 Compliance: Advanced Threat Detection Simplified” we’ll demystify NIS2 and demonstrate how the Progress Flowmon Network Detection and Response (NDR) solution can streamline compliance efforts and enhance an organization's security posture.

On the Radar: Ribbon Communications' Solution Offers Cloud Native Real-time Communications Architecture

There’s no doubt that telecom providers are under intense pressure to reduce costs and improve their security posture. Brent Kelly, Principal Analyst at global analyst firm Omdia, recently completed a fantastic piece on the benefits of cloud native technology for real-time communications. The cloud native moniker can sometimes be misconstrued as “moving to public cloud.” In reality, the technology supports the flexibility to deploy on premises, in a private, public, or hybrid cloud.

How to Effectively Monitor Nginx and Prevent Downtime

Nginx is widely known for its high performance and reliability. However, just like any software running in production, it requires continuous monitoring to ensure smooth operation. Issues such as high latency, unexpected crashes, or overwhelming traffic spikes can lead to performance degradation or even complete outages. Therefore, implementing a robust monitoring strategy is crucial to maintaining the health and stability of your Nginx deployment.

How to Use Network Visibility in Your Cyber Security Strategy

As organizations grow in size and complexity, their internal networks often become a “black hole” in terms of visibility. To keep these networks secure, this visibility needs to be managed, but time and budget seldom allow IT and cybersecurity professionals to gain actionable insights. N‑able’s VP, Product Management, Jim Waggoner and Head of Threat Research, Kevin O'Connor demystify network visibility and provide valuable takeaways you can implement today to mature your cybersecurity posture.

Beyond the Hype Blog Part 2 - DeepSeek and Other AI Models

The recent introduction of the DeepSeek R1 (DeepSeek) Large Language Model (LLM) has shaken up the AI landscape, suggesting that new low-cost and open-sourced providers could enter the market. This disruption creates huge opportunities for service providers to drive innovation and for their vendors and suppliers to enhance or innovate in economically feasible ways.

How to Mitigate and Prevent Network Automation Risk

Network automation platforms have many self-evident benefits. They empower NetOps teams to accomplish a lot more in a lot less time. More specifically, network engineers can automate simple tasks so that they can focus on more important, big-picture objectives. These platforms can streamline multiple processes before uniting them into a single, seamless flow.

9 Essential Network Monitoring Protocols: An Overview

Network monitoring protocols are essential for keeping your network running smoothly. They are data-collection and analysis techniques that provide insights into the health of your network and can help you identify and fix network problems before they cause major disruptions. Think of your network like a city's road system: data packets are cars, routers are traffic lights, and switches are intersections.

Why Super Bowl 2025 was a triumph for Internet Resilience

When you’re spending close to $8 million for a 30-second Super Bowl ad, the one thing you don’t want to leave to chance is your website—especially when millions of viewers, whether they came for the game, Kendrick Lamar, or to catch a glimpse of Taylor Swift in the stands, might head there right after the spot airs. Make no mistake: web performance is just as critical as the ad itself.

Bilateral and Multilateral Peering: What's the Difference?

These two types of peering relationship may seem similar at first glance, but there are a few considerations you should make to get the most out of your connection to an IX. When you join an internet exchange, the first thing you’ll need to do after physically connecting is establish some BGP sessions in order to get traffic flowing and to start enjoying the benefits of peering at an IX.