Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

How to Locate a Device Using a MAC Address

Every device on a network has a unique address called IP address, which helps identify the device and enables other devices to communicate with it. “IP” stands for Internet Protocol. The purpose of an IP address is to handle the connection between devices that send and receive information across a network. Without an IP there is no way to establish that connection. Each IP address is a series of characters, such as “192.168.1.1”.

Financial Impact of an Outage

In October 2021, the world’s largest social media platform suffered a massive worldwide outage affecting billions of customers. Facebook has a monthly active user base of 2.8 billion users, which increases to 3.5 billion when you include its subsidiaries such as Instagram, WhatsApp, and Oculus. The platform succumbed to a “Gigalapse,” which happens when a server can’t adequately respond to excessive demand.

The Auvik Network Device Buyer's Guide

Buying the right network devices is an essential part of network design, and can have an impact throughout the network lifecycle. Get it right, and your network is high-performing, easy to troubleshoot, and reliable. Get it wrong, and downtime, complexity, and costs add up fast. A network device buyer’s guide would probably be really helpful. So we made you one.

K-12 and Network Monitoring: Solving IT Mysteries, Meeting Challenges

To say that K-12 school systems have challenges is an understatement. COVID forced schools to make a dramatic turn towards remote learning, which meant the network was anything but insular, forcing IT to efficiently support thousands of new remote endpoints. That is on top of other K-12 network challenges. Issue number one: tight budgets. Most school systems are tight for cash, especially after the financial stresses of COVID and all the millions spent on PPE.

Common interoperability challenges for multi-cloud

As cloud technology has matured, hybrid and multi-cloud approaches have become commonplace. Enterprises have discovered that not all applications are suitable for the public cloud, meaning on-premise data centres are still active, and each public cloud has its own strengths and weaknesses, driving businesses to mix-and-match to suit their needs. This results in interoperability challenges for multi-cloud environments.

Gzip Compression for Faster Web Pages (Apache, Nginx, WordPress)

Even reducing the loading time of our website by a second can have a drastic impact on the traffic we get. It is vital for our websites to load quickly in this fast-moving world, where all the information we need can be found within a blink of an eye. One way to achieve it is using Gzip compression. The Gzip algorithm compresses and decompresses data in order to make websites load faster in a client's machine.

Network Configuration Management: The Benefits & Importance

Configuration management is one of those network management topics people often neglect. It’s not very exciting—but it’s incredibly important. Administrators rely on network configuration management in a variety of circumstances. Let’s discuss what network configuration is, delve further into the importance of network configuration, and explore the benefits of configuration management.

Kentik moves up the stack with Synthetic Transaction Monitoring

In our quest to provide the leading network observability solution, Kentik has been focused on developing a service for NetOps teams that empowers them to have intimate knowledge of their network traffic and the devices that route traffic. Our service helps them plan capacity, project costs, optimize routes, detect unwanted traffic, troubleshoot issues and analyze events.

Securing the Software Development Build

Tim Brown, SolarWind CISO and VP, Security, explains how SolarWinds is ensuring the integrity of the build process and how we share learnings with our partners, community, and customers; as well as how we're leveraging and contributing to open-source initiatives and lead by example in securing the supply chain.