Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Fundamentals: Application Acceleration and the Benefits for your Service Delivery

Application acceleration is all about improving the responsiveness of a digital service. When clients access web applications, they are expecting near-immediate feedback from servers. Maintaining that level of performance requires ensuring the right resources are available to process requests, shortening the information retrieval process, and maintaining system uptime by warding off threats.

A NetOps Guide to DDoS Defense

Join Kentik and Cloudflare as we discuss and analyze the latest in DDoS attack trends. (We’re seeing some really interesting patterns in our data!) Back by popular demand: Doug Madory, Kentik’s Director of Internet Research, will walk through how BGP monitoring can determine if DDoS mitigations are actually effective. What you’ll learn.

Take Network Monitoring to the Extreme with WhatsUp Gold/Flowmon Duo

Network monitoring is the key to efficient, reliable operation, as well as performance and security. The deeper and more broadly you can monitor (yes, you want to do both), the better your network operates. What if you could combine a superstar in network infrastructure monitoring with the champion of network flow monitoring? You can. Progress, owner of WhatsUp Gold, recently acquired Kemp and their market-leading Flowmon solution.

Troubleshooting SaaS User Experiences with AppNeta from Broadcom Software

Many organizations are moving to SaaS-based hosting environments but how do you monitor the user experience of these apps when they no longer exist within the four walls of your data center? In this demo, we are going to reveal how network operations teams can gain true visibility into the user experience with AppNeta from Broadcom Software - even when they do not own any of the network infrastructure delivering that experience.

What can be learned from recent BGP hijacks targeting cryptocurrency services

On August 17, 2022, an attacker was able to steal approximately $235,000 in cryptocurrency by employing a BGP hijack against the Celer Bridge, a service which allows users to convert between cryptocurrencies. In this blog post, I discuss this and previous infrastructure attacks against cryptocurrency services. While these episodes revolve around the theft of cryptocurrency, the underlying attacks hold lessons for securing the BGP routing of any organization that conducts business on the internet.

Harness Continuous Observability to Continuously Predict Deployment Risk

In my previous blog, I discussed how continuous observability can be used to deliver continuous reliability. We also discussed the problem of high change failure rates in most enterprises, and how teams fail to proactively address failure risk before changes go into production. This is because manual assessment of change risk is both labor intensive and time consuming, and often contributes to deployment and release delays.

Make Your MSP a Recession-Proof Business

Many believe we’re either in a recession or on the brink of one. It’s a familiar cycle: high inflation, international strife, supply chain challenges, and tightening monetary policies are all driving fears of a downturn. While the IT industry has exceeded expectations for the past few years, it isn’t immune to a recession. As a result, many IT MSPs are thinking about what they can do to ensure a recession-proof business over the next year and beyond.