Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

What is UDP Packet Loss & How to Monitor It

Have you ever found yourself scratching your head over UDP packet loss? You're not alone. UDP (User Datagram Protocol) is a go-to for streaming, gaming, and VoIP, but when packets start going AWOL, it can spell trouble for your network's performance. Imagine you're in the middle of an important VoIP call, a critical online gaming session, or a live video stream, and suddenly things get choppy or laggy—that's UDP packet loss rearing its ugly head.

Building Resilient Government IT: Strategies for Secure, Compliant, and Scalable Connectivity

As Australian government agencies progress in their digital transformation journeys, how can IT leaders innovate without compromising compliance, sovereignty, or operational stability? This blog was originally published on PublicSectorNetwork.com.au on 11th June 2025 and republished with permission.

How to Monitor MPLS Networks

If you manage an enterprise network, then you’ve definitely come across MPLS. Although many businesses rely on MPLS technology for large, high performing networks, they can suffer from network problems, like network congestion, that can impact user experience. Monitoring MPLS using a Network Monitoring tool is key to identifying and solving network issues that impact MPLS performance.

Maximizing Uptime: How to Monitor Network Ports

Keeping critical services running smoothly starts with visibility, and that begins at the port level. Whether you're managing a lean environment or a complex network infrastructure, knowing which ports are active, listening, or down can make or break your response time. In this video, we walk through how to fully configure port discovery and monitoring in SL1. You'll learn how to track availability, respond to port failures with automated alerts, and ensure your systems are always one step ahead of potential issues.

Why it's important to use a VPN and how NoProx can help you stay private

In today's world, online security is of critical importance. There are solutions designed to protect your personal data and system from all sorts of threats. Choosing the right tools is important not only for individuals but also for entire companies. NoProx offers the most advanced and effective solutions for data protection, privacy, and maintaining anonymity.

What is a Jitter Buffer and How It Works

If you've ever been on a choppy VoIP call or sat through a video meeting where people sounded like robots from the ‘90s, you’ve likely run into a little thing called jitter. It’s one of those sneaky network issues that doesn’t always get the attention it deserves, until it ruins your real-time traffic. As IT pros and network admins, you're probably used to dealing with packet loss and latency. But jitter? That one's a bit trickier.

Elephant Flows: The Hidden Heavyweights of AI Data Center Networks

Elephant flows are no longer rare. They’re foundational to AI workloads. In today’s GPU-heavy data centers, long-lived, high-volume flows can distort ECMP, overflow buffers, and rack up unexpected cloud bills. Kentik helps you see and tame these elephants with real-time flow analytics, automated alerting, and predictive capacity planning.