Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

A DWDM Guide: Definition, Benefits, and When You Should Use It

Today’s telecom, cable, and data providers constantly compete to provide the best, most reliable service to customers, while investing in the right technologies to maintain the integrity of data and enable the separation of users. Because of this, service providers often spend countless hours searching for cost-effective, yet future-proof solutions that fit their business needs. This is where DWDM comes in.

What Millions of Requests per Second Mean in Terms of Cost & Energy Savings | Willy Tarreau

Presented by Willy Tarreau (HAProxy) at HAProxyConf 2022. Discover the power of HAProxy in this must-watch talk by Willy Tarreau, the developer of the original HAProxy project. Learn how HAProxy has set new world records in performance and scalability and discover how its cutting-edge technology can help you save on costs and energy consumption. With climate change at the forefront of our minds, it's more important than ever to find ways to conserve energy in every aspect of our lives. Join Willy as he explores real-life examples of energy-efficient load balancing.

How Much Does That Minute Cost?

Network outages are both common and expensive – usually far more expensive than people realize. Yes, the network is down and the organization is losing money, but do you really appreciate how much money? And how much an outage can actually cost on a per minute basis? It’s not only more than most people think, it’s something that can be mitigated fairly easily.

SASE: A Long-term Play for Security

Secure Access Service Edge (SASE) is a strong trend emerging in enterprise network security, representing the long-term capability to integrate and consolidate a variety of networking and cybersecurity tools. Let’s do a quick dive on the technology to understand why it’s necessary. SASE emerged as an outgrowth of the software-defined wide-area networking (SD-WAN) technology movement, which made it easier to configure, orchestrate, and manage WAN connectivity from enterprise branches.

What is a Network Protocol and How Does it Work?

It is impossible to allow communication between computer systems, servers, routers, switches, and other network-enabled devices without following a set of protocols. Without protocols, devices would be unable to understand the electronic signals sent between them via network connections. Every day, billions of individuals utilize network protocols, whether they are aware of it or not. Each time you connect to the internet or make a phone call, you are using network protocols.

Understanding the Advantages of Flow Sampling: Maximizing Efficiency without Breaking the Bank

The whole point of our beloved networks is to deliver applications and services to real people sitting at computers. So, as network engineers, monitoring the performance and efficiency of our networks is a crucial part of our job. Flow data, in particular, is a powerful tool that provides valuable insights into what’s happening in our networks for ongoing monitoring and troubleshooting poor-performing applications.