Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

WhatsUp Gold Device Group Access Rights

Watch this video to learn about Device Group Access Rights, which allows you to fine-tune Read and Write access to monitored devices in WhatsUp Gold. Find more information on WhatsUp Gold and Device Group Access Rights: WhatsUp Gold Device Group Access Rights online training WhatsUp Gold User Authentication and Device Group Access Rights Learning Path Device Group Access Rights documentation.

What Wi-Fi 7 Means for the Future: Speed, Latency, and Performance Upgrades

Wi-Fi 5 (802.11ac) brought faster speeds and better performance for devices, supporting up to 3.5 Gbps and improved efficiency on the 5 GHz band. Wi-Fi 6 (802.11ax) took it further by enhancing speed (up to 9.6 Gbps), increasing capacity, and reducing latency, making it ideal for homes with multiple connected devices. Its features, like OFDMA and Target Wake Time, optimize performance for streaming, gaming, and smart homes.

Mastering NIS2 Compliance: Advanced Threat Detection Simplified

In this webinar, “Mastering NIS2 Compliance: Advanced Threat Detection Simplified” we’ll demystify NIS2 and demonstrate how the Progress Flowmon Network Detection and Response (NDR) solution can streamline compliance efforts and enhance an organization's security posture.

On the Radar: Ribbon Communications' Solution Offers Cloud Native Real-time Communications Architecture

There’s no doubt that telecom providers are under intense pressure to reduce costs and improve their security posture. Brent Kelly, Principal Analyst at global analyst firm Omdia, recently completed a fantastic piece on the benefits of cloud native technology for real-time communications. The cloud native moniker can sometimes be misconstrued as “moving to public cloud.” In reality, the technology supports the flexibility to deploy on premises, in a private, public, or hybrid cloud.

NPT 2714 Hardware Overview

The NPT 2714 is a high-capacity, fully redundant IP aggregation router designed by Ribbon, featuring a unique architecture that combines the modular capabilities of traditional systems with the efficiency and simplicity of fixed systems. The innovative design of the NPT 2714 enables operational continuity, allowing for flexible upgrades and expansion without service interruptions. Key features include in-service upgradeability from 7.2 to 14.4 terabits per second, nine front-accessible I/O cards, and various operational interfaces.

Beyond the Hype Blog Part 2 - DeepSeek and Other AI Models

The recent introduction of the DeepSeek R1 (DeepSeek) Large Language Model (LLM) has shaken up the AI landscape, suggesting that new low-cost and open-sourced providers could enter the market. This disruption creates huge opportunities for service providers to drive innovation and for their vendors and suppliers to enhance or innovate in economically feasible ways.

How to Mitigate and Prevent Network Automation Risk

Network automation platforms have many self-evident benefits. They empower NetOps teams to accomplish a lot more in a lot less time. More specifically, network engineers can automate simple tasks so that they can focus on more important, big-picture objectives. These platforms can streamline multiple processes before uniting them into a single, seamless flow.

9 Essential Network Monitoring Protocols: An Overview

Network monitoring protocols are essential for keeping your network running smoothly. They are data-collection and analysis techniques that provide insights into the health of your network and can help you identify and fix network problems before they cause major disruptions. Think of your network like a city's road system: data packets are cars, routers are traffic lights, and switches are intersections.

How to Effectively Monitor Nginx and Prevent Downtime

Nginx is widely known for its high performance and reliability. However, just like any software running in production, it requires continuous monitoring to ensure smooth operation. Issues such as high latency, unexpected crashes, or overwhelming traffic spikes can lead to performance degradation or even complete outages. Therefore, implementing a robust monitoring strategy is crucial to maintaining the health and stability of your Nginx deployment.

How to Use Network Visibility in Your Cyber Security Strategy

As organizations grow in size and complexity, their internal networks often become a “black hole” in terms of visibility. To keep these networks secure, this visibility needs to be managed, but time and budget seldom allow IT and cybersecurity professionals to gain actionable insights. N‑able’s VP, Product Management, Jim Waggoner and Head of Threat Research, Kevin O'Connor demystify network visibility and provide valuable takeaways you can implement today to mature your cybersecurity posture.