Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

How Much Network Capacity Should Businesses Maintain

Network capacity: So, how much network capacity does your business actually need? The answer depends on your users, applications, and growth plans. Today, we’ll calculate your network capacity requirements, avoid common pitfalls, and ensure smooth operations — whether your team is in-office, remote, or hybrid.

Beyond the Horizon - Backup Gets Smart

In this behind-the-scenes conversation from Empower 2025 in Berlin, N-able Head Nerd Eric Harless catches up with Stefan Voss, VP of Prudoct Management at Cove, to unpack what's new and what’s next for cloud-based data protection. From executive summary reports and billing APIs to Google Workspace backup and AI-powered recovery assurance, this episode is packed with insights for MSPs aiming to drive efficiency, reduce risk, and scale smarter.

Remote Desktop File Transfer: Securely Move Files Between Desktops

Remote desktop file transfer allows people to transfer files between remote desktops and local machines quickly—and it is more vital than ever. IT teams rely on remote desktop tools to access servers, while remote employees use these tools for file transfers when working from home or collaborating with colleagues at other locations.

IoT Implementation For Small Businesses: How To Get Started

The Internet of Things (IoT) is reshaping how businesses operate, and it's not just for tech giants or large-scale manufacturers. Small businesses now have access to affordable, scalable IoT solutions that can open new doors to smarter decision-making and improved customer experiences. Adopting IoT can feel unfamiliar at first, especially when you're juggling daily operations with limited resources. But with the right approach, it can become a powerful tool for growth, offering better control over your business and unlocking valuable data-driven insights.

How to Detect Insider Threats: An In-Depth Guide

Cybersecurity threats don’t exclusively come from external attackers—insider threats must also be considered and mitigated. Insider threats come from employees, contractors or business partners who have legitimate access to IT systems to fulfill business functions. They have access to data and systems that are valuable to cyberattackers or would cause reputational damage if disclosed outside the organization. For example, an insider could leak private company information.

Beyond the Horizon - Backup Gets Smart

In this behind-the-scenes conversation from Empower 2025 in Berlin, your hosts catch up with Stefan to unpack what's new and what’s next for cloud-based data protection, automation, and AI in the MSP space. From executive summary reports and billing APIs to Google Workspace backup and AI-powered recovery assurance, this episode is packed with insights for MSPs aiming to drive efficiency, reduce risk, and scale smarter. Whether you're navigating cloud migrations, looking for ways to simplify invoicing, or just curious about the future of SaaS protection — this quick but impactful episode has you covered.

What Is High Availability in SQL Server?

Developed by Microsoft in the 1980s, SQL Server is a relational database management system designed to help store, retrieve, and manage data. SQL Server’s strong data processing capabilities, robust security, and high scalability make it an excellent option for enterprise environments that need to process high volumes of advanced analytics, transactions, and more. Data availability is vital for businesses of all sizes, so organizations strive for high availability (HA).

Cloud-Based Network Management: Benefits & How it Works

Managing networks has never been more complex—more devices, more remote work, and more security challenges. Traditional on-premise solutions can struggle to keep up, requiring constant maintenance and on-site troubleshooting. That’s why businesses are shifting to cloud-based network management, which provides real-time visibility, automation, and remote access to keep networks running smoothly.

Choosing the Right Transport Protocol: TCP vs. UDP vs. QUIC

A decision-making framework breaking down the strengths, weaknesses and ideal use cases to help users choose the proper protocol for their systems. Initially published in The New Stack We often think of protocol choice as a purely technical decision, but it's a critical factor in the user experience and how your application is consumed. This is a high-impact business decision, making it crucial for the technical team to first understand the business situation and priorities.

How to Migrate from SolarWinds to Auvik Without Downtime

Switching from one network management system (NMS) to another is a big decision for IT teams and MSP businesses. An NMS is the central hub for everything from network troubleshooting deep dives to planning hardware refresh cycles and enabling quarterly business reviews (QBRs). And even if a different platform is clearly a better fit for your organization than your current NMS, it’s important to consider the operational overhead of actually making the switch.