Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Topology for Incident Causation and Machine Learning within AIOps

Our thinking and use of topology within AIOps and Observability solutions from Broadcom has advanced significantly in recent years, while solidly building on our innovative domain tools. We’re providing a blog post series to communicate these innovations, advancements, and benefits for IT operations. In this blog post, we continue where the previous blog post left off.

From Headaches to Hassle-Free: The Modern Fix for Network Troubleshooting

In today’s fast-paced business world, where the network is the lifeblood of everything from remote work to cloud apps, keeping things running smoothly isn’t just important—it’s fundamental. A single hiccup in connectivity can bring productivity to a screeching halt, and nobody wants that. So, what used to be a mundane task—network troubleshooting—has now become one of the most vital jobs for any Infrastructure and Operations (I&O) team.

What is network uptime? Know how to measure and increase it.

Organizations that rely on traditional networks struggle to keep pace with rapidly evolving technologies and accelerate innovation. As AI, cloud, and decentralization create new challenges, the key to moving forward at a faster pace is to make sure the network is always available and working without any interruptions. This measure, known as network uptime, is crucial for assessing the reliability and performance of an organization's IT infrastructure.

Supply Chain Security: Leveraging NDR to Combat Cyberthreats

Supply chain attacks impact both individual suppliers and their customers' organizations. Detecting and mitigating these attacks early is crucial to help prevent data breaches, operational disruptions and reputational damage. Fortunately, with the right tools, you can detect traces left behind by the attackers.

How to Enhance Cloud Security with Proactive Proxy Strategies

Cyber threats can hit businesses of any size, anywhere. A single breach might do more than just leak data (which is already bad) - it could also halt operations, endanger your budget, and damage your reputation. Luckily, you don't have the battle of data security alone. You have a wide range of tools at your disposal, starting with antivirus solutions, two-factor authentication, and going further to network monitoring software and more.

Latency vs. Jitter: Understanding Network Metrics

As you set out to optimize and understand your network, two essential metrics you'll need to master are latency and jitter. While they might seem similar at first glance, both latency and jitter represent distinct aspects of how data travels across a network, influencing everything from seamless VoIP calls and smooth video streaming to immersive online gaming and responsive cloud applications.

Networking Field Day 35: Democratization of Data Access Using Network LLMs with Selector AI

In this brief demo of the Selector platform, a user interacts with Selector Copilot to explore behavior within their network infrastructure. They first look into the latency of their transit routers, revealing a regional issue. The user drills down into network topology information to further investigate the latency, where they access details about devices, interfaces, sites, and circuits. Selector Copilot is then leveraged to surface circuit errors. Notably, each visualization provided by Selector Copilot can be copied and pasted onto a dedicated dashboard.

Learnings from ServiceNow's Proactive Response to a Network Breakdown

ServiceNow is undoubtedly one of the leading players in the fields of IT service management (ITSM), IT operations management (ITOM), and IT business management (ITBM). When they experience an outage or service interruption, it impacts thousands. The indirect and induced impacts have a multiplier effect on the larger IT ecosystem. Think about it. If a workflow is disrupted because of an outage, then there are large and wide ripple effects. For example: The list goes on.