Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Why Does Your Network Get Blamed When Trouble Lies Beyond the Firewall?

The familiar scene unfolds: Critical applications are sluggish, user complaints are mounting, and the IT war room is buzzing. Eyes quickly dart towards the network team. It’s an almost instinctual reaction. But what happens when the problem isn't within the corporate LAN or even the data center? What if the real culprit lurks somewhere in the vast, untamed wilderness of the internet, a cloud provider's backbone, or a third-party SaaS application’s infrastructure?

How LoRaWAN Sensors Support Businesses of All Sizes

In an era where digital transformation is reshaping the business landscape, companies are seeking innovative solutions to enhance efficiency and decision-making. LoRaWAN (Long Range Wide Area Network) sensors have emerged as a powerful tool for organizations of all sizes, providing a cost-effective way to collect and utilize data. These sensors can monitor everything from environmental conditions to asset status, offering insightful analytics that can drive informed decisions and operational improvements.

How to Fix Latency Spikes in WAN and LAN Networks

Even a few seconds of delay in your network can be the difference between closing a deal on a video call, or watching it buffer into oblivion. These delays, known as latency spikes, are unpredictable surges in the time it takes for data to travel across your network. Whether you're running a cloud-based CRM, managing VoIP calls across offices, or supporting remote teams on Microsoft Teams or Zoom, latency spikes can disrupt productivity, hinder performance, and lead to a flood of support tickets.

Identifying Idle Paths in a Data Center Leaf-Spine Fabric

In leaf-spine data center networks, traffic often becomes imbalanced, leaving some uplinks idle and resulting in wasted bandwidth. Kentik helps engineers identify underutilized paths, diagnose the causes, and take corrective action using enriched telemetry, visual topology maps, and intelligent alerts, turning hidden inefficiencies into actionable insights.

Regulation Nation: The what, when, why and how of the new CMMC for MSPs

As the cybersecurity landscape continues to evolve, the U.S. Department of Defense (DoD) is ramping up efforts to ensure that contractors and their vendors adhere to robust security standards. One of the key initiatives driving this transformation is the Cybersecurity Maturity Model Certification (CMMC). But what does CMMC mean for Managed Service Providers (MSPs) and IT shops, and how can you ensure your business is prepared to meet these new compliance requirements?

Elastic bandwidth and the future of AI-driven networks

In this employee spotlight blog, Shaheen Kalla, Presales Team Lead, explores what the future of AI in networking may hold and the possibilities it presents. So much has been written about AI in the context of software engineering, machine learning, and data manipulation - especially where large datasets are involved. However, very little has been explored when it comes to AI from a networking perspective.

The End of the Network Engineer as We Know It?

For decades, the enterprise network was a well-defined fortress and network engineers were its meticulous guardians. However, their visibility and control was largely confined within the parameters of their organization's infrastructure. The cloud revolution and the ubiquity of SaaS applications have shattered these traditional boundaries. Today, for virtually every organization, the internet is the new enterprise network.

Bring a Business Service Perspective to Your Network Monitoring

In recent years, network performance and business performance have become increasingly intertwined. Now, virtually every critical employee and customer service is in some way reliant upon network connectivity. When connectivity falters, those critical processes can be impaired or stopped completely. However, for too many teams, it can be difficult to knowledgeably determine how specific outages or issues actually affect a business service. For example, say an operator discovers a device is down.

SQL Server Security: Protecting Your Data From Threats

If your organization isn’t focused on data security, it’s time to make some changes, particularly if you rely on SQL Server to manage and store valuable information. Cyber threats, data breaches, and malicious attacks are on the rise—and they are constantly evolving. That’s why it’s essential to have robust security measures in place. SQL Server has several built-in security features, but you must take a proactive approach to protect your data.