Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

10 Best Tools for Monitoring Wireless Access Points

Monitoring wireless access points is business-critical, allowing teams to facilitate day-to-day workflows. These wireless access points (APs or WAPs) provide strong Wi-Fi signals and transmission ranges for sending and receiving valued information. But wireless access points are susceptible to cyberattacks that jeopardize your revenue and reputation.

Effortless Peering Across Europe With Console Connect

Did you know that you can now use Console Connect for high-performance, on-demand interconnection with peering partners in Europe? We’ve recently on-boarded three of Europe’s largest and most important Internet Exchanges to the Console Connect platform: AMS-IX, DE-CIX and LINX. Discover more about our new IX partners and what their availability on Console Connect means for you…

Using HAProxy as an API Gateway, Part 6 [Security]

In almost every case, APIs have changed how modern applications connect to their data. Mobile apps, single-page web apps, IoT devices, integration hooks between software—all of these things rely on APIs to fetch, update, delete, and create data. In fact, one set of APIs might serve as the backbone of a website, mobile app, voice assistant device, and more, meaning one data store owns a treasure trove of information about us, the human users.

7 Best Network Infrastructure Mapping Tools

Network infrastructure mapping tools that help you maintain up-to-date maps can be the difference between quickly diagnosing a problem or wasting hours of your time. Similarly, network maps can help everyone in your organization better understand and optimize a network you inherit. In many cases, however, network maps contain stale information or don’t exist at all.

Secure by Design | Securing the Software Development Build Environment

The recent SUNBURST cyberattack on the SolarWinds software build environment is a concerning new reality for the software industry, representing the increasingly sophisticated actions by outside nation-states on the supply chains and infrastructure on which we all rely. SolarWinds is committed to sharing our learnings about this attack broadly given the common development practices in the industry and our belief that transparency and cooperation are our best tools to help prevent and protect against future attacks.

Network Throughput vs Bandwidth and How to Measure It

Have you ever used the term bandwidth? Probably. Have you ever used the term network throughput? Maybe. Have you used them interchangeably? Most likely. So let’s see where we get these mixed up. Namely, let’s look at the key differences between network throughput and bandwidth. And while we’re at it, let’s cover the fundamentals of throughput and how to measure it, so you can keep your network flowing efficiently and cleanly.

How To Avoid Complex Pricing And Lengthy Contracts With Your Global Internet Access

When it comes to your business’s global internet access, network speed, security and performance are paramount. Many enterprises use a premium internet service to meet the needs of their global operations. One option available to them, which we have covered extensively already on this blog, is to use dedicated internet access across a private MPLS network. The other is to use an IP transit service.

Using HAProxy as an API Gateway, Part 5 [Monetization]

In our previous blog post, Using HAProxy as an API Gateway, Part 2 [Authentication], you learned that when you operate HAProxy as an API gateway, you can restrict access to your APIs to only clients that present a valid OAuth 2 access token. In this post, we take it a step further. You will learn how to leverage tokens to grant some users more access than others and then charge for the service.