Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

How Auvik Network Management Optimizes Network Performance: Real User Insights

Network performance challenges can cripple business operations, leaving IT teams scrambling to identify bottlenecks while users experience frustrating slowdowns. Without proper visibility into bandwidth utilization, latency issues, packet loss, and network availability, organizations risk reactive troubleshooting that costs time and productivity.

Identify slowdowns across your entire network with Datadog Network Path

As modern infrastructure becomes increasingly distributed across on-premises data centers, multi-cloud environments, ISPs, and remote offices, understanding how traffic flows across your network is critical to delivering reliable performance and great user experiences. But pinpointing the source of network slowdowns remains one of the most persistent challenges for operations, network, and IT teams.

High Availability by Design: WhatsUp Gold Strategic Shift from Failover

As IT environments grow more distributed and resilient, the Progress WhatsUp Gold network monitoring solution is evolving to meet the moment. Starting in early 2026, Progress will officially retire the legacy Failover Manager and usher in a new era of high availability (HA) by design. This modern, scalable approach aligns with today’s best practices in infrastructure.

How to Monitor WiFi Access Points: Best Practices for Business WiFi

WiFi Access points (APs) are the foundation of business WiFi. They’re the devices making sure laptops, smartphones, and even IoT gadgets connect reliably without cables. If an access point fails or becomes overloaded, the entire wireless experience can collapse, no matter how strong your Internet connection is. By keeping a close eye on your APs with the right WiFi access point monitoring software, you can catch issues before users even notice them.

The Outage You Didn't See Coming: How to Discover and Monitor Certificates Proactively

Progress WhatsUp Gold Certificate Discovery and Monitoring is a seamless capability included out of the box. It’s a proactive safeguard designed to help you spot certificate issues before they escalate into business problems.

Reduce PHI Risk Exposure With a Strategy That Supports HIPAA Compliance

Health Insurance Portability and Accountability Act (HIPAA) compliance is about more than firewalls and passwords. Your file-sharing solutions could be the weakest link in protecting sensitive patient data. When we think about healthcare cybersecurity, we tend to focus on large systems: electronic health records, databases, and billing platforms. But one everyday workflow that’s also as vulnerable – and often overlooked – is file transfer.

How Much Time Could You Save with Network Config Automation?

If you’re a network admin reading this, you already know the feeling. You’ve probably lost track of how many hours you spend doing the same repetitive tasks week after week, month after month. Backing up configs manually. Rolling back failed changes at 2 AM. Hunting down that one switch that somehow lost its configuration. Compiling compliance reports that should take minutes but somehow eat up your entire afternoon. Yet all those “quick” tasks add up.

The Influencer Making Network Engineering Cool Again

What happens when a social media obsession turns into one of the most unconventional and impactful careers in tech? In this episode of Uplink, Alexis Bertholf, Global Technical Evangelist at Megaport, explores how she’s making network engineering cool again, and why connectivity is the oxygen that cloud and AI can’t live without.

What's Hiding in Your Wiring Closets?

Let's be provocative for a moment. You probably don't know what is actually on your network. You have the CMDB, spreadsheets, diagrams from the last big refresh, and the institutional knowledge of your veteran engineers. But is this information accurate? Is it complete? Answering that question with absolute certainty can be difficult for many who manage complex IT environments.