Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

OpenTracing via Jaeger

Within enterprises, it used to be that applications ran on a single server. Owners could directly monitor that discrete machine, conveniently access all the logs they needed, see all the metrics that mattered, and hit the reboot button, without needing to confer with “everyone.” Those days are gone. Modern application architectures stretch the definitions of the words “federated” and “distributed.” We now have distributed applications.

DataOps Uncovered: A Bold New Approach to Telemetry and Network Visibility

Network telemetry and DataOps play a critical role in enhancing network visibility. By combining both, organizations can improve network visibility and gain insight to help them optimize their network performance, improve security, and enhance the overall user experience.

The Ultimate Raspberry Pi Network Monitor Setup for Tech Enthusiasts

Are you tired of slow Internet speeds and mysterious network hiccups? Well, fear not because we have the ultimate solution for you: a Raspberry Pi network monitor setup with Obkio! Cloud and hosted solutions are becoming more and more popular, which makes monitoring network performance more important than ever.

How Much Bandwidth Do I Have? How Do I Check Bandwidth Speed

Understanding how to check your bandwidth speed can make all the difference when your Internet connections appear slower than usual. Sometimes, not everything works as expected. A video conference takes too long to load everyone's cameras; downloading a vital document starts at a snail's pace; webpages present the visitor with a low-resolution HTML version of their website. Why do these kinds of issues occur in the office?

3 IoT applications that should consider private networking

As IoT (Internet of Things) device form factors have got smaller and batteries have got better, use cases for IoT applications have expanded into every sector. From trucks, to shipping containers, people, to cattle, an organisation’s assets can be fixed, mobile, autonomous and even sentient - relaying information that can deliver new business insights and competitive advantage. But these benefits only come if the information is able to get to the right place at the right time.

The New Networking Realities in Healthcare

Systems for managing electronic health records (EHRs), clinical decision support, claims and payments, operations, and more are advancing rapidly in the healthcare industry. A more complex and dynamic mix of internal and external networks now play an integral role in patient outcomes. Digital transformation in healthcare is swiftly moving from islands of data to interconnected hybrid environments through critical apps like Epic Systems.

The SolarWinds Platform

This video discusses the SolarWinds Platform, its different components, and how those components work together to monitor our customers’ diverse environments. This video is suitable for anyone who wishes to understand what the SolarWinds Platform and its components are, and what is the difference between the Orion Platform, the SolarWinds Self-Hosted Platform, Hybrid Cloud Observability, and SolarWinds Observability.

Ukraine's Wartime Internet from the Inside

It has now been over a year since Russian forces invaded its neighbor to the west leading to the largest conflict in Europe since World War II. Kentik’s Doug Madory reviews what has happened with internal connectivity within Ukraine over the course of the war in this analysis done for a collaboration with the Wall Street Journal. This February marked a grim milestone in the ongoing war in Ukraine.

How to Comply with Current EU Regulations NIS2 & RCE

Individual EU Member States are expected to transpose the NIS2 and RCE directives into national legislation. It will concern not only critical, essential and important entities, but also National Security Authorities and various accredited CSIRTs. In this webinar, we discuss important milestones, individual measures and obligations, and the capabilities of the Flowmon solution, which can help organisations comply with directives and paragraphs of Cyber Security Acts, especially in the area of risk-management measures, network security monitoring and incident reporting.