Operations | Monitoring | ITSM | DevOps | Cloud

How AI In The NOC Will Transform Network Operations

In July 2024, a routine network configuration change at Microsoft caused a global outage that left millions without access for 90 minutes. The culprit, however, was a network issue within the Microsoft WAN that disrupted global routes. Unfortunately, this isn’t a one-off network outage but a part of a broader, troubling trend. Modern Network Operation Centers (NOCs) are far too siloed and broken to handle the growing complexity of modern networks.

Threat Detection and Response: How Flowmon Detected an Attack in Real Time

According to a study by IBM, organizations, on average, take more than 190 days to identify a data breach and an additional 60 or more days to remediate the issue. The financial implications of such an event, including mitigation and remediation, run into millions and can pose a serious risk to business continuity. However, organizations can effectively handle these scenarios with the help of robust security solutions and well-defined processes.

Announcing InfluxDB 3 Enterprise free for at-home use and an update on InfluxDB 3 Core's 72-hour limitation

Two weeks into the alpha release of InfluxDB 3 Core (our new open source offering) and InfluxDB 3 Enterprise (our newest commercial offering), we’ve received a good amount of feedback that the 72 hour limitation in Core is too limiting. This fell into three categories: For the users in category 1, we’re announcing a free tier of InfluxDB 3 Enterprise for at-home, non-commercial use.

How to utilize CPU offloads to increase storage efficiency

When storing large amounts of data, the cost ($) to store each gigabyte (GB) is the typical measure used to gauge the efficiency of the storage system. The biggest driver of storage cost is the protection method used. It is common to protect data by either having multiple replicas within the storage system or by using erasure coding to create data chunks and parity chunks to reduce the raw storage consumed, albeit at the cost of higher CPU utilisation.

5 Most Common MPLS Issues & How to Fix Them

From 2010 to 2017, MPLS (Multiprotocol Label Switching) was the go-to solution for enterprise networks. It offered reliability, security, and performance that businesses relied on for their critical operations. Since then, many organizations have moved to SD-WAN, attracted by its flexibility and cost-effectiveness. However, MPLS is far from obsolete.