Operations | Monitoring | ITSM | DevOps | Cloud

November 2023

What's New at Kentik, Episode 1

Welcome to the inaugural episode of "What's New at Kentik?" hosted by our technology evangelist, Leon Adato. Learn about the latest advancements and offerings from Kentik, the network observability company, revolutionizing how you manage your digital infrastructure. In this episode, Leon unveils complete Azure observability for Kentik Cloud, introduces the groundbreaking Kentik Kube for Kubernetes visibility, and discusses how to tackle DDoS attacks and spoof traffic with Kentik Protect.

Networks in 2030: How service providers can plan for success

By 2030, the world will look very different, not in the least because of new technological innovations. Many will expect to see a proliferation of next-generation technological solutions from smart cities, to augmented reality, to autonomous cars, to the metaverse. Service providers have a role to play in ensuring that the underlying network that we have across the UK (and beyond) has the capacity and scalability to support these solutions.

Top 12 Best Practices for Network Monitoring

Network monitoring is a critical component in network management, ensuring that all systems and services are running smoothly. Monitoring a network involves continuously surveilling network components to detect any potential issues or performance bottlenecks that may arise. Doing so guarantees that the network’s performance remains at its peak, providing users with a seamless experience.

How to Create a Network Assessment Report with This Template

As an MSP, your role is to ensure your client’s network operates without a hitch. Checking the health of their network and sharing your findings in a network assessment report helps you identify potential vulnerabilities so you can fix them sooner rather than later. Creating these reports is a critical part of an MSP’s role, but it’s also a tedious one. That’s why we’ve created a network assessment report template.

What is Zero Trust and How IT Infrastructure Monitoring (ITIM) Makes it Happen

When the concept of Zero Trust emerged in 2010, it marked a sea change in how IT and network security are handled. The term, invented by Forrester Research analyst John Kindervag, is loosely based on the “never trust, always verify” motto. So why is this a sea change? Before 2010, IT focused on perimeter defenses and the concept of DMZs — areas of the network they deemed safe based on the protection they implemented.

The First 48 Hours of Ransomeware Incident Response On-Demand Webinar

The first 48 hours of incidents response is the most critical. We will explain few important steps that need to be taken to mitigate the impact on service availability, information systems integrity and data confidentiality. The cyber resilience is also covered by the individual national regulations and directives. In this on-demand webinar we’ll let's take a closer look at it and explain why principles of Network Detection and Response shall be a crucial part of technical measures implementation for regulated entities.

How to Perform A Network Stability Test: A Kickass Guide for Network Admins

Let's talk about the unsung heroes of the digital world – network administrators. For network administrators, ensuring that a network remains robust, resilient, and responsive is not just a priority – it's a mission-critical task. The ability to identify potential bottlenecks, optimize performance, and proactively address vulnerabilities is a skill that sets apart seasoned professionals from the rest.

Making Utilities Smart

Watch our dedicated IP Optical session where we cover Ribbon’s offering for the Utilities sector. For utilities to meet their regulatory, safety, and business objectives, they need to become "Smart". The legacy TDM communications network used by utilities is not able to effectively support the new digitized, decentralized services. A modernized communication network is required. Ribbon provides seamless, risk-free migration of the legacy TDM communications network.

On-premise vs SaaS: Which Network Monitoring Tool You Should Choose?

On-premise or SaaS network monitoring tool: which one to choose? This question has been bugging many businesses for quite a few years now. And no matter how much I hate to say it but the answer to this burning question is — it depends. Yes, it depends on several factors. In this blog, we will list all those factors that you should keep in mind before making this decision.

Cloud Observer: Subsea Cable Maintenance Impacts Cloud Connectivity

In this edition of the Cloud Observer, we dig into the impacts of recent submarine cable maintenance on intercontinental cloud connectivity and call for the greater transparency from the submarine cable industry about incidents which cause critical cables to be taken out of service.

Practical Demo: Elevate Your VPN. Empower Your Hybrid Workforce

Get ready to revolutionize your remote access experience, as this expert webinar shows you how to elevate your VPN to new heights. Because as organizations like yours embrace hybrid work models, it’s vital to have effective, efficient secure access solutions. Ivanti experts will give you an immersive demonstration of the advanced features and capabilities that will take you to the next level in safeguarding secure access. Be sure to join us so you can experience the future of VPN technology.

What is Zero Trust and How IT Infrastructure Monitoring (ITIM) Makes it Happen

When the concept of Zero Trust emerged in 2010, it marked a sea change in how IT and network security are handled. The term, invented by Forrester Research analyst John Kindervag, is loosely based on the “never trust, always verify” motto. So why is this a sea change? Before 2010, IT focused on perimeter defenses and the concept of DMZs — areas of the network they deemed safe based on the protection they implemented.

Network Monitoring Best Practices to Elevate Your Admin Game

Just as car owners rely on indicators to track their vehicle's health, you as a network administrator depend on monitoring systems to keep an eye on the network's vital signs. It involves inspecting and addressing various network components, from devices like routers to critical assets like applications and services, user experience and service providers. In the connectivity world where network reliability is non-negotiable, you must not settle for mediocrity.

How To Monitor Cisco Catalyst Metrics with Grafana

In today's interconnected world, the reliability of network infrastructure, especially Cisco Catalyst switches, plays a key role for businesses. To ensure these critical components perform optimally, it's vital to monitor their metrics effectively. This article will show you how to effortlessly monitor Cisco Catalyst metrics with Grafana, a top-tier monitoring and visualization platform.

Web Management Address Autodetection

The release of 4.1 comes with some exciting updates. Web management address discovery now becomes a breeze with Autodetection. Firmware Updates now support Panduit Gen5 and nVent Enlogic EN2.0 rack PDUs. Not to mention, the Location Layout offers enhanced floor plan visualization with convenient export options. These updates and more provide you with better control and improved visibility.

Best Practices for Monitoring Network Usage & Maximizing Performance

As organizations continue to expand their digital footprint, the demand for a robust and efficient network infrastructure has surged. To navigate the complexities of today's networks, IT professionals must not only be vigilant in monitoring network usage but also adept at implementing best practices to ensure peak performance.

Proactive Network Monitoring: A Key to Network Reliability

Proactive network monitoring is no less than a superpower. Just like how the Spidey sense alerted Spiderman of any dangers, proactive network monitoring also helps you to: This is why every business big or small is investing in proactive monitoring to optimize their systems and resolve security issues in real-time. In this blog, we will share some of the key benefits of proactive network monitoring along with the top challenges and best practices that can help your business in the long run.

How to Evaluate Your Current Network Management Solution

Is your network management solution still up to the task? With remote work, cloud adoption, IoT, and more pushing networks to evolve rapidly, reliance on an outdated system risks performance issues, security gaps, insufficient visibility, and increased downtime. But when is it time to upgrade or replace your existing platform?

Better when closer: the role of the data centre in your network

For those who remember the tech world before the COVID digitalisation gold-rush, the 2019 assertion by Gartner that 'The Data Centre Is (Almost) Dead, ruffled feathers. The report warned that by 2025, 80% of enterprises will shut down their traditional data centres. In fact, 10% of organisations already have. Then the pandemic hit and the global demand for world-class user experiences (for workforces and customers alike) exploded.

Optimizing SD-WAN Monitoring Efficiency for MSPs: SATLX Deploys Obkio for Distributed Continent-Wide Network Monitoring

In today's rapidly evolving digital landscape, organizations across industries increasingly rely on Software-Defined Wide Area Networks (SD-WANs) to streamline their network infrastructure and enhance connectivity between geographically dispersed locations. As the demand for efficient and reliable network performance continues to grow, Managed Service Providers (MSPs) face the challenge of effectively monitoring and managing these complex SD-WAN environments.

Monitor the state of your Tailscale private network with Datadog

Tailscale is a modern remote access solution that allows customers to easily scale, segment, and manage a private network as their business grows. It enables encrypted point-to-point connections using the open source WireGuard protocol, so that devices on your private network can only communicate with each other.

Kubecon 2023: Code, Culture, Community, and Kubernetes

Kubecon 2023 was more than just another conference to check off my list. It marked my first chance to work in the booth with my incredible Kentik colleagues. It let me dive deep into the code, community, and culture of Kubernetes. It was a moment when members of an underrepresented group met face-to-face and experienced an event previously not an option.

What is the Role of AIOps in Modern Network Management?

In IT, the introduction of Artificial Intelligence for IT Operations (AIOps) has been nothing short of revolutionary. As networks become increasingly complex and data-driven, traditional network management methods are proving inadequate. AIOps has emerged as a critical tool in the arsenal of network managers, offering innovative solutions to manage and optimize networks in real-time.

Network Overhead, Latency with Secure Access Service Edge (SASE)

Digital Experience Monitoring (DEM) has become an area of focus for Secure Access Service Edge (SASE) vendors. As businesses adopt SASE or security-as-a-service technology for compliance and security, they must consider the overall employee digital experience. SASE architectures add network overhead and impact performance, response times, and latency. In this article, we will delve into.

Master Your SaaS Discovery Process Using Auvik

SaaS discovery is really easy if you’re an end user. You can probably find a product that meets your needs with a Google search and a credit card. However, SaaS discovery from an IT management and governance perspective is a whole different beast. In the past, there haven’t been a lot of easy ways to detect application usage in the browser or restrict user activity without creating hyper-restrictive internet usage policies. Enter SaaS discovery platforms.

The Ultimate Network Monitoring Solution Buyer's Guide

When was the last time your network threw a surprise party – and by party, we mean a full-blown connectivity catastrophe? If you're thinking, "Not on my watch," well, kudos to you! But here’s the reality check – it's not a matter of 'if' but 'when'. With more than 30 years of collective experience in the industry, our team knows that network issues come knocking sooner rather than later, and usually when you least expect it. So, how ready are you for the pitfalls hidden in the future?

What is Bandwidth Monitoring: Benefits, Efficiency and Best Practices

Bandwidth Monitoring is a vital function essential for the smooth flow of data and business success in the digital landscape. Many businesses, individuals, and data centers use networks to share information or services with each other. However, at times customers may experience poor results from unreliable connections, but these problems could also be signs of more serious network problems.

Traditional Network Monitoring vs. AIOps Network Monitoring: A Comparative Analysis

The digital shift has particularly influenced the world of network management, where traditional monitoring is gradually giving way to AI operations (AIOps) solutions. It illustrates a clear shift towards automated and predictive IT operations management. While traditional systems have their place, particularly in smaller or less complex environments, AIOps represents the future of network monitoring, offering the ability to anticipate and prevent issues.

No Signal, No Problem: Troubleshooting Network Disconnection

Welcome, Network Admins and IT Pros! In the fast-paced world of digital infrastructure, network hiccups are more than just inconvenient—they're hurdles that demand swift resolution. In this guide, we're cutting to the chase. Designed for the practical minds that keep the digital gears turning, this blog is your go-to resource for tackling network disconnections head-on.

Mastering Firewall Logs - Part 1

A firewall is a network security device or software that is used to monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewall Logs contain valuable information about network and security events. These logs are essential for security and infrastructure monitoring for enterprises. While this data is critical to securing enterprise networks, they are also one of the most voluminous data types security teams use to monitor and secure their networks.

Implementing QoS for VoIP for Exceptional VoIP Call Quality

Businesses and individuals alike have embraced the flexibility and cost-effectiveness of VoIP, but ensuring a seamless and high-quality experience requires more than just a reliable internet connection. Enter Quality of Service (QoS), a crucial framework that governs and prioritizes network traffic to guarantee optimal performance for real-time applications like VoIP.

Have Your Cake & Eat It, Too: Seamless Migration from VPN to SSE

Explore the value proposition that comes with making an easy migration from VPN to SSE with Ivanti. Preserve the value of existing deployments while gaining one-stop secure access for all types of applications, centralized management from a single console, robust security and real-time risk management, and more. Ivanti Solution Value proposition for easy migration from VPN to SSE Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Managing Cisco Switch Logs with Kiwi Syslog Server

Network management, particularly the effective handling of system logs, is crucial in maintaining a high-performance and secure IT infrastructure. Log files, or simply logs, are generated by network devices such as switches and routers, serving as valuable resources to understand the intricacies of network performance, spot anomalies, and even comply with regulatory requirements.

Alerts Should Work for You, Not the Other Way Around

The entire reason we have monitoring is to understand what users are experiencing with an application. Full stop. If the user experience is impacted, sound the alarm and get people out of bed if necessary. All the other telemetry can be used to understand the details of the impact. But lower-level data points no longer have to be the trigger point for alerts.

Alerts Don't Suck: YOUR Alerts Suck!

Join Leon Adato, Kentik's Principal Technical Evangelist, for, "Alerts Don't Suck: YOUR Alerts Suck." In this engaging talk, Leon shares a personal anecdote about generating a staggering 772 tickets - twice - in just 15 minutes, setting the stage for an enlightening exploration of alert management. Leon discusses the common misconceptions and pitfalls of alerts in network observability, distinguishing between effective and ineffective alert strategies. He demystifies the concepts of monitoring versus observability, offering practical advice on creating alerts that genuinely add value and drive action. Whether you're an IT professional, network engineer, or anyone interested in improving your alerting philosophy, this talk is packed with actionable insights, humor, and real-world examples. Leon's hard-won advice might just transform your approach to alerting and optimizing your monitoring systems.

Mobile Proxies Explained: How They Enhance Your Mobile Internet Experience?

The speed at which the internet developed is mind-bending. Only forty years have passed since the TCP/IP protocol was implemented. Now, we can access the internet without wires, even in the most remote places, at speeds that would have been unthinkable a decade ago. But with all the improvements, many risks have emerged too. Constant tracking, ads, and geo-targeting limitations have made it harder for people to reap the full benefits of the internet. It's essential to keep up with the newest trends to enhance your Internet experience. That's where proxies come in.

A Guide to Effective Network Load Testing & Load Balancing

When it comes to network management, there are two challenges that are ever-present; ensuring optimal network performance and maintaining uninterrupted network connectivity. Network admins are the unsung heroes, diligently managing the digital highways that connect the modern world. To maintain the delicate balance between seamless user experience and network reliability, two crucial practices come to the forefront: Network Load Testing and Load Balancing.

Digging into the Optus Outage

Last week a major internet outage took out one of Australia’s biggest telecoms. In a statement out yesterday, Optus blames the hours-long outage, which left millions of Aussies without telephone and internet, on a route leak from a sibling company. In this post, we discuss the outage and how it compares to the historic outage suffered by Canadian telecom Rogers in July 2022.

Netplan brings consistent network configuration across Desktop, Server, Cloud and IoT

We released Ubuntu 23.10 ‘Mantic Minotaur’ on 12 October 2023, shipping its proven and trusted network stack based on Netplan. Netplan is the default tool to configure Linux networking on Ubuntu since 2016. In the past, it was primarily used to control the Server and Cloud variants of Ubuntu, while on Desktop systems it would hand over control to NetworkManager.

4 Reasons Why NOCs Need Incident Response Automation

Incident response in a Network Operations Center (NOC) is cumbersome and time-consuming. There are many steps, many sources where incidents come from, and a long, long list of complexities involved. For instance, for incident response with a NOC, there’s the initial monitoring – Tier 1 functions of “eyes on glass” work of looking at alerts coming in and what they’re for, such as a security breach, performance issue, a hardware failure, among others.

2023 ONUG Fall Panel Discussion: Building Integrated Solutions for Network and Security

Full-Stack Analytics explores the essence of implementing cross-layer, multi-domain analytics, emphasizing the need for an integrated platform that combines endpoint and network security telemetry for holistic threat detection. In this session, we explore the transformative role of AI and machine learning in bolstering real-time intelligence across multiple layers and domains, enhancing predictive analytics and anomaly detection.

KubeCon NA 2023: Celebrating Innovation and the K8s Community

The sun has officially set on KubeCon North America 2023, but the CNCF's flagship event has left a lasting impression on us. Roughly 9,000 Kubernetes enthusiasts descended on Chicago's McCormick Place West to see the K8s community's latest innovations. DevOps professionals, engineers, and architects alike were eager to share and boost their K8s knowledge. Overall, HAProxy joined over 250 other sponsor organizations to celebrate open-source, cloud-native technologies over four activity-packed days.

Making the most of bandwidth on-demand: What is flex bandwidth?

One of Console Connect's most powerful features is the ability to quickly configure and immediately provision Layer 2 interconnections between Console Connect endpoints at the bandwidth capacity you need. But what if your bandwidth needs evolve or you need to respond to a temporary surge in demand? You might encounter scenarios where you need more flexibility, such as.

2023 ONUG Fall Keynote - Learn How To Expand Visibility Beyond the Network Edge & Triage Faster

In this 2023 ONUG Fall Keynote session, you will learn how successful enterprises trust Broadcom to help them gain visibility into the error domain beyond their network edge to immediately reveal their operational innocence and triage faster. broadcom.com/netops.

Why Implementing App Security Can Lead To Spiraling Costs

Robust app security is non-negotiable, but the spiraling costs that can come with it are. In the context of application delivery, security plays a pivotal role in maintaining business continuity, protecting sensitive data, and upholding a solid reputation. However, the journey to build a formidable defense at the load balancing and reverse proxy layer can quickly become costly with a few wrong turns. Security is important, but buyers don’t have to break the bank to implement it.

Router Monitoring with Grafana

Routers are essential for connecting devices. Routers decide where the internet goes and how fast it should be. Because they play such a crucial role, it's vital to keep an eye on them and make sure they're doing their job well. This act of keeping an eye on routers is what we call "router monitoring." Monitoring routers isn't just about checking how the routers are doing; it's about making sure the whole network works well.

Resolving VPN Issues Without Manual Intervention: Qualcomm Incorporated and Nexthink Flow

VPN issues are easily some of the most common digital workplace problems to plague end user computing (EUC) teams. When the VPN crashes or falls out of compliance, it can have a disproportionate impact on employee experience. Monitoring and managing VPN performance is a top priority for many of our customers – including Qualcomm Incorporated. Qualcomm had a known VPN issue taking place in their environment impacting 90% of their workforce.

ITIM and the Public Sector: How Network Monitoring Rises to the Challenge

Government agencies and public sector organizations are a tantalizing hacker target. Cybercriminals go after public sector organizations because they hold confidential, often classified, information – the exact data state-sponsored and other criminal groups salivate over. The Cybersecurity and Infrastructure Security Agency, or CISA, along with the United States Computer Emergency Readiness Team, or CERT, have warned public sector IT of key threats.

Troubleshooting Container Network Latency in Kubernetes with Kentik Kube

Kentik Kube brings network observability to Kubernetes. In this Kentik Kube product demo, we navigate a real-time scenario of troubleshooting high latency within a Kubernetes cluster. The Kentik Kube map offers a visualization of our environments, complete with automated alerts and the ability to correlate performance metrics directly to affected pods.

Custom Container Network Monitoring and Alerting in Kubernetes with Kentik Kube

Discover the power of proactive network monitoring in Kubernetes with Kentik Kube. This demo highlights the critical importance of custom dashboards and alerts in maintaining optimal container performance and service availability. We take you through creating a tailored alert for a checkout service within Kentik Kube. From selecting services to diving deep into performance metrics via the Kentik Data Explorer, we show you how Kentik Kube makes it easy to set up policies that monitor and alert you to Kubernetes network issues as they arise.

The pivotal role of network automation software in your network environment

Today, automation has shifted from being a luxury to an absolute necessity, especially within the realm of networks. This shift is driven by the rapid evolution of network technologies, compliance standards, and evolving business needs, placing an increasingly daunting burden on network administrators to manage these tasks manually.

Troubleshooting Kubernetes Network Performance Issues with Kentik Kube

Discover the power of Kentik Kube, the solution for unparalleled network insight into Kubernetes workloads. In this video, Phil Gervasi walks us through Kentik Kube’s ability to track and visualize container traffic across data centers, public clouds, and the internet. Using the interactive Kube map, Phil demonstrates how to troubleshoot a network latency issue affecting an online shopping application, highlighting the tool's capacity for in-depth analysis of pod performance and node-to-node traffic. Learn how to create custom dashboards for custom oversight, set up proactive alerts for performance issues, and enforce security and compliance across your Kubernetes infrastructure.

Cilium + eBPF Community Unveils Thrilling Developments at KubeCon NA 2023 - Civo TV

In this interview, Bill Mulligan from Isovalent shares the latest and most exciting developments within the Cilium + eBPF community. Join us as we explore groundbreaking innovations and what they mean for the future of Kubernetes networking and security!

Level 1 NOC WiFi/LAN/WAN Correlation and Triage

The latest release of Network Management 23.3 from Broadcom, the solution extends assurance to cloud-based Wi-Fi architectures with global correlation to your LAN and WAN infrastructure for a complete view of network health across vendors, protocols and user experiences. Today, most NOCs still monitor Wi-Fi as if it is a wired service with no comprehension of its radio integrity or user movements. As a continuation of the "Unified NetOps" capability, v23.3 will enable any NOC to monitor wireless networks using the standard workflows for alarm management, ticketing, and triage, but with the added Level 2 NOC awareness of radio frequency metrics, noise level, interference, and wireless user demographics and movements.

Demystifying Network Availability: What It Is & How to Improve It

In the high-stakes world of network admins, where the flow of data and communication is the lifeblood of modern organizations, the concept of network availability stands as a pillar of paramount importance. For network administrators, it's not just a buzzword; it's a critical measure that directly impacts the success and efficiency of the networks they manage.

9 Tips for a Successful Transition to Cloud-Based ITSM

Today, organizations of all sizes heavily depend on Information Technology Service Management (ITSM) solutions to elevate operational efficiency and customer satisfaction. The advent of cloud technology has presented a jaw-dropping opportunity for numerous businesses, given the benefits that cloud-based ITSM solutions provide.

Achieve Optimal Performance with Nginx and Micro-Caching

The word "cache" is used in many different contexts. Typically, a cache is a small chunk of data stored locally for quick access. In this case, it’s about computer caches, i.e., the data stored in memory. Micro-caching is a technique where a programmer uses this cached data to do some quick computations, which can lead to some amazing solutions. In micro caching, dynamically generated content is cached for only a brief period rather than full-page caching.

SolarWinds Kiwi Syslog Server Overview

SolarWinds® Kiwi Syslog® Server is an affordable on-premises solution designed to help you manage syslog messages, SNMP traps, and Windows event logs. It centralizes and simplifies log message management across network devices and servers. Kiwi Syslog Server lets you collect, filter, alert, react to, and forward syslog messages and SNMP traps, and it helps you adhere to regulatory compliance. Learn how to simplify syslog and SNMP trap management with SolarWinds Kiwi Syslog Server.

What is Application Performance Monitoring (APM)?

In today's digital landscape, where everything is moving at breakneck speed, the performance of your applications can either make or break your digital game. We've all been there – the frustration of a slow website or an unresponsive app. That's where Application Performance Monitoring, or APM, swoops in to save the day. APM is like your app's personal fitness trainer, helping you keep it in peak condition.

Streamlining configuration management: Unleashing the power of OpManager's module

Ensuring uninterrupted network availability is paramount for any organization relying on multiple network devices for their day-to-day operations. Two crucial metrics that govern network availability are performance and fault management. By implementing ManageEngine OpManager as your fault and performance monitoring tool, you gain invaluable insights into device health, CPU performance, and more.

6 Best Practices for Tuning Network Monitoring Alerts

Network monitoring and alerting provide the foundation for efficient IT operations and cyber resilience. By keeping track of the status and performance of network infrastructure and applications, network monitoring tools can automatically generate alerts when defined thresholds are exceeded or specific events occur. These network monitoring alerts allow IT teams to detect outages, performance degradation, and potential security incidents so they can respond swiftly to minimize disruption.

Understanding Cybersecurity Insurance Requirements and How Network Visibility Can Help

From supply chain cyber attacks to ransomware, there is plenty of risk facing modern digital businesses. Cyber insurance can help mitigate that risk, but the complexity of cybersecurity insurance requirements can often create a catch-22 for businesses.

Explore the Power of Link Monitoring for Seamless Network Performance! Infraon

Welcome to our latest video! If you're a network admin striving for flawless data flow within your systems, you've come to the right place. In this video, we delve deep into the world of Link Monitoring and its incredible potential to revolutionize your network's performance.

Analyzing the Traffic Patterns of Broadband Subscriber Behavior

Broadband subscriber behavior analysis is the process of collecting and analyzing data on how broadband subscribers use the internet. This data can be used to gain insights into subscriber needs and preferences, as well as to identify potential problems with the broadband service.

Network Security In an Age of Remote Work

While remote work and hybrid work have always been a thing, they've recently become more popular, and that’s created new challenges for network security. Some companies embrace remote work and/or hybrid work; some try to limit or reverse the trends. For some internal teams, remote work is easily achieved and often preferred. In other cases, in more hands-on and collaborative efforts, being physically onsite can be important.

The Role of Generative AI and Large Language Models in IT Operations

Artificial intelligence, particularly generative AI and large language models have changed how we approach IT operations, cybersecurity, and observability. And though we can point to measurable benefits and outcomes from applying LLMs to ITOps, there is also a lot of speculation to deal with. Phillip Gervasi, Director of Technical Evangelism at Kentik, and Christoph Pfister, Chief Product Officer at Kentik, discuss what generative AI and LLMs are, how they can be used to improve IT operations, and what the future might hold.

Experience seamless Meraki network monitoring with OpManager

According to a study by Zippia, 70% of the organizations already have a digital transformation policy in place or are currently working on one. This implies the growing significance of modernization in IT. With new-age techniques such as SD-WAN, organizations can deliver an enhanced end-user experience, ensure reliable QoS, enhance their network security, optimize their network performance, and reduce their overhead costs.

What is the Purpose of Syslog Monitoring in Enterprise Software Companies?

Baseball fans know about the various in-game statistics and actions requiring someone to keep them as records. From a player's overall performance at-bat to a game's final score at the bottom of the ninth, dozens (possibly hundreds) of different statistics are happening throughout a season. In Major League Baseball, these records are essential for the team owner, front office workers and coaches to figure out strategies on the diamond or how to distribute fair pay.

Ask Me Anything WhatsUp Gold and Flowmon Integration

Watch the Ask Me Anything: WhatsUp Gold and Flowmon Integration webinar where you will learn how to leverage Flowmon’s NPMD/NDR within WhatsUp Gold to view details about your traffic analysis through the same interface you use to monitor your infrastructure. We’ll discuss the benefits of the integration and how fewer tools means better MTTR, more efficiency, and better/faster diagnosis for your business.