Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

What is Network Performance Management and how is it evolving in the cloud era

Join Michael Patterson, Kentik network technologist, to find out what NPM has become and why legacy solutions met their demise. Get in-depth details about these three must-have monitoring techniques: Watch this Kentik webinar replay to learn: Why these technologies bring deeper visibility into how your company’s internet connections and applications are being impacted and by whom. How to identify the third parties to reach out to when problems occur and see where to focus your optimization efforts.

What is an Access Control List (ACL)?

A commonly used tool at the Cisco command line is the access control list (ACL). At their simplest, access control lists are collections of IP addresses that are used by a router, switch, or a firewall to identify network traffic that must be handled in a special way. Cisco and other network vendors use ACLs for many different purposes. This article focuses on IOS access control lists as used on Cisco routers, although much of this discussion applies to Cisco switches as well.

Transforming Education and Government IT and Cloud Environments

State, local government, and educational institutions have unique IT requirements and regulations that traditional commercial organizations don’t face. From specific IT budgeting processes to strict compliance, public sector organizations are constantly forced to maximize every IT resource in their complex IT environments.

SNMP monitoring solution: Significant monitoring insights in a click

Simple Network Management Protocol (SNMP) is a networking protocol that aids in the transfer of data among devices, thereby managing and monitoring devices present in the internet protocol network. Networks have an array of devices connected to them, and new devices get introduced to them as trends in technology evolve. These new devices are often used to simplify complex processes but end up complicating simple networks.

The Importance of Network Insights in Achieving Full End-To-End Observability

When we talk about observability, we tend to focus first and foremost on the metrics, logs, and traces that you can collect from applications – such as request rates, error rates, and request duration. Infrastructure-level metrics, like CPU and memory utilization, might factor into the discussion as well. Here’s a third category of critical observability insights that teams tend to overlook: the network.