Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Application Slowness Troubleshooting:Prove it is not the Network!

This article was originally published on NetworkDataPedia. The one complaint that an IT administrator dreads to receive is one where an end user says, “My application is slow!”. The application in question can be a web application, an enterprise application like SAP, Microsoft SharePoint, or a SaaS application like Salesforce or Office 365.

Go Beyond Audit: Network Monitoring for BFSI Companies

With pandemic’s sudden hitting, most offices and companies had to quickly move their operations and have an apt Work-from-Home policy defined, the technology gap in both the front end and the companies’ back-end operations came in scathing review , While BFSI institutions also had a WFH policy, there services were deemed to be necessary. Since people couldn’t line up outside banks, the banks had to keep their technology fine-tuned to assist their customers in these testing times.

How an Oil & Gas conglomerate automated their IT service delivery

Our client is one of the biggest oil and gas conglomerates in India, contributing to around 75% of Indian domestic production. They have been in business for over 60 years, currently employing around 30,000 people. With decades of growth, they have entered into different ancillary companies and expanded globally. The expansion has led to several offices, branches, desks, and teams spread across geographies.

Discovery Net Scan: the best network discovery software

Previously, in Pandora FMS blog, we learnt a little about the great revolution that the Discovery feature brought to Pandora FMS. This tool reduces the complexity of certain existing features in Pandora FMS, and also introduces new tools that turn this software into a complete monitoring system. In today’s episode we are going to take a walk through the bowels of one of its tools, Discovery Net Scan, which is an exponential upgrade to recon tasks. Are you ready?

Why a Zero-Trust Network Is More Desirable-and Achievable-Than Ever

A few years ago I wrote a blog article about the zero-trust network security model and why I thought it was something every organization should be thinking about implementing. While I still believe that to be true—probably more true than ever, in fact—the landscape since then has changed a great deal, particularly because of the increase in cloud-based services, and zero-trust is now an extremely achievable goal.

What Does My Website Look Like From China? Test and Monitor Performance from China

In this current age of the Internet, it’s a common practice to build a website to run your online business. With the networks all around the world, theoretically, you can do business boundlessly. However, like each country has its boundary, the world of Internet is not a world without any control. In fact, every country has its own laws and rules toward this virtual world. And the case is especially different, when China’s Internet environment is involved.

Internal Applications: Monitoring from Behind Your Firewall

As companies decide whether or not to move ahead with an “everything in the cloud” strategy for providing consumer-facing applications, enterprise applications are also getting a new shape with web-based applications to support internal business operations. These applications live inside the private network of the organization and often have role-based access.

Overcoming VPN bandwidth and capacity complications using Firewall Analyzer

As companies move towards a flexible, remote work environment, the demand for VPN services has increased considerably. This need to ramp up VPN infrastructures in such a short time comes with its fair share of operational problems and security concerns. Over purchasing VPN capacity would put a dent in the IT budget while under purchasing would result in loss of productivity.

Alien Wavelengths to Shared Spectrum

Alien wavelengths are commonplace today. Here a transponder pair from one optical system vendor connects to, and transmits over, the optical line system (OLS) – constituting fixed/reconfigurable multiplexer and amplification elements primarily – from another vendor. (While it can be technically feasible to pair transponders from different vendors, typically this is not done for commercial and operational reasons.)