Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
How to check for high network utilization
Learn why high utilization issues in the network arise, how to detect them, and two ways to grapple with the problem to keep network latency low and application performance high. Continue Reading
Network data analysis boosts crucial monitoring tasks
The latest network analytics tools are adding new brain power to the old workhorse of network monitoring. Just be careful you don’t drown in the data. Continue Reading
How to set up network analytics tools for successful monitoring
Learn which analytics tools help monitor the network and what systems and processes you should work out in advance to make them as effective as possible. Continue Reading
-
Will network management functions as a service arrive soon?
Network management as a service isn't widespread, at least not yet. But if past history is any indication, its popularity is bound to grow, once certain hurdles are overcome. Continue Reading
Should IT share data analysis from network management consoles?
By making data analysis available from a network management console, IT groups could offer their lines of business better insights into end-user productivity. Continue Reading
New generation of network analytics software starting to emerge
Some of the newest network analytics tools can learn how a network is supposed to operate, warn managers of potential problems and offer ways to solve issues.Continue Reading
Four ways to improve network security for modern networks
The green padlock on websites doesn't improve network security, so our expert addresses four ways to secure the modern network that move beyond the castle-wall analogy.Continue Reading
Network security issues top the list of enterprise priorities
A network manager's list of concerns is always long. But given the rise of deadly threats, security tops the list, followed by SDN, IoT and edge computing.Continue Reading
Network engineering skills should include software fluency
Network engineers need to rethink their network engineering skills and embrace software fluency training to meet business needs for modern network infrastructure.Continue Reading
The importance of staying up to date with Wi-Fi training
Wireless networking is changing at breakneck speeds, but Wi-Fi training isn't keeping up. Find out why firms must pay more attention to ensuring engineers are properly trained.Continue Reading
-
How data center interconnect technologies shape WAN performance
Latency, congestion and sluggish TCP stacks can plague application performance, but understanding data center interconnect technologies is key.Continue Reading
Network data analysis driving business intelligence
According to a study from Enterprise Management Associates, network data analysis tools are now being used by enterprises to deliver valuable information to business units.Continue Reading
How to plan for network disaggregation with APIs
Network disaggregation is a lot of work for engineers, and it's fraught with potential hurdles posed by sourcing hardware, a control plane, network operating system and how you manage necessary APIs.Continue Reading
Can cable be reused when upgrading 802.11ac wireless LAN?
Is it better to repurpose legacy cabling when planning an 802.11ac wireless LAN upgrade, or does it make sense to buy new? Like many things networking, it depends.Continue Reading
What security is needed for digital assistant devices?
How should cybersecurity-enforcement efforts adapt as digital assistant devices become more pervasive in business enterprise networking to safeguard corporate data?Continue Reading
How can IT asset management tools aid in virtualization era?
IT asset management tools allow businesses to track resources effectively. Platform organization is increasingly necessary in a virtualized enterprise.Continue Reading
Three-step network strategy sells big changes as more doable
A three-pronged network strategy takes an evolutionary approach to selling revolutionary technology changes internally, with a bigger chance of success.Continue Reading
How your SD-WAN appliance can consolidate the branch stack
The latest SD-WAN appliance technology promises expanded and accelerated consolidation of branch stacks. Learn how it works and how to make it work for you.Continue Reading
How can cloud management apps organize data across clouds?
If you need to pull together different data sets, cloud management apps can track information workloads across multiple clouds and present the data in a simplified way.Continue Reading
Take network configuration management tools to the next level
Script management systems and intent-based networking are driving the future of network configuration management tools, shifting the paradigm of how networking systems are managed.Continue Reading
NFV disaggregates firewall appliance to increase scalability
A traditional firewall appliance can incorporate many services, but NFV can virtualize firewalls to offer individual services that scale for application requirements.Continue Reading
Automated networks mean clearing some key hurdles first
Obstacles facing IT adoption of automation in the network including training and trust. Now's the time to clear these hurdles and reap the benefits of an automated future.Continue Reading
How to select the best network monitoring tool
Learn the criteria for choosing the best network monitoring tool for your enterprise.Continue Reading
Need help making Wi-Fi secure? Consider some 'classic' approaches
Keeping your Wi-Fi secure is a challenge, to say the least. Security hasn't kept up with Wi-Fi advances, but there are steps you can take to keep your Wi-Fi network protected.Continue Reading
Users want hybrid cloud networking to be simple
As more services move to the cloud and become more mobile, if the network is invisible and performs well, IT pros are doing their jobs in users' eyes.Continue Reading
Why some Wi-Fi jobs are best for WLAN professionals to avoid
Some Wi-Fi jobs can become nearly impossible to complete. When engineers contend with inflated expectations or bad designs, it may be best to walk away.Continue Reading
New options for managed network service providers benefit enterprises
SDN, NFV and SD-WAN are creating a new set of software-based offerings that managed network service providers can roll out to enterprises faster and at lower cost.Continue Reading
How to cut false security, malware alerts in hybrid cloud
The bad news: IT teams are deluged by false security and malware alerts with their hybrid clouds. The good news: New tools are here to help.Continue Reading
Open source network software matures, but needs incentives for use
Open source network software is maturing, but the networking industry needs to create compelling economic incentives for large suppliers and buyers to contribute, as well.Continue Reading
Managing wireless networks: How to address the key challenges
One challenge in managing wireless networks is that the tools and tech are changing rapidly. Here’s what network pros need to know now.Continue Reading
How types of noise in data communication systems affect the network
Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and shot noise -- and how they can affect your network.Continue Reading
Managed enterprise network services gain traction
As network demands become increasingly complex, many enterprises are turning to managed network services, outsourcing maintenance to third-party providers.Continue Reading
Cloud security tips to consider when mulling external data centers
The old security rules don't apply when moving workloads to the cloud. These cloud security tips will help you make the right decision.Continue Reading
New telecom transformation goals require service automation
Restarting a telecom transformation means putting business goals first and technology choices second, and making the service process more efficient through automation.Continue Reading
Mobile edge computing promises wide variety of uses
Mobile edge computing can bring applications and data closer to the end user, resulting in lower latency and better data analytics for network virtualization and IoT.Continue Reading
Network engineering tools changing as cloud shift pressures profession
As more companies examine the cloud, network engineering tools are changing, requiring engineers to rethink and recraft their job descriptions.Continue Reading
Networked cloud emerges to meet evolving infrastructure needs
Some enterprise network managers are beginning to move networking out to the cloud, as they sort out how to best meet their organizations' evolving infrastructure needs.Continue Reading
Intent-driven networking reshaping network service delivery
When configuring a network, engineers often focus on individual tasks to enable network service delivery. Intent-driven networking transfers the focus to the overall network.Continue Reading
Amidst complex infrastructures, network visualization is needed
Today's networks are increasingly complex. An overhaul in network visualization is needed to help parse and diagnose modern networks.Continue Reading
Automation key element in network monitoring best practices
The fundamentals underpinning network monitoring might be simple, but it doesn't mean keeping tabs on your network is easy. What can you do to improve your monitoring tool framework?Continue Reading
IP subnetting: How to calculate subnet masks
Check out IP subnetting shortcuts on how to do subnet mask calculations and break down IP address classes to route traffic within your network.Continue Reading
What do I need to do to create successful hybrid WANs?
The market for hybrid network services is growing, and with it comes the challenge of successfully creating hybrid WANs.Continue Reading
Infinite options tempt, but cutting proprietary management even better
Are the bad old days of control interface proliferation back again? Patrick Hubbard says it's time for network administrators to put their foot down.Continue Reading
Wireless management in the cloud heralds transformation
Placing wireless management in the cloud is gaining traction among enterprises as companies examine more efficient ways to oversee their networks. It's part of a shift that's affecting network infrastructure.Continue Reading
Managing apps requires holistic, reactive approach
Managing apps' performance must be planned holistically with an eye to reactive management and proactive management.Continue Reading
Network automation scripts: Separating myth from reality
Network automation can make work easier, but be careful which processes you automate. Done wrong, automation can break more things than it fixes.Continue Reading
IPv6 connectivity: Ignore at your own peril
Gathering knowledge on IPv6 connectivity and implementation is critical to success in modern IP networking.Continue Reading
My MPLS service contract expires soon -- should I renew?
The rise of SD-WAN has many asking: Do we really need MPLS connectivity? Expert John Burke explains what factors to consider before renewing your existing contract.Continue Reading
Are you ready for an SDN deployment?
The principal motivation behind SDN deployments is the need for a responsive and nimble IT organization. While the network architecture is definitely in the future, not all are ready for it.Continue Reading
Persuading management to support the IT buying process
What steps should you take to get your network buying needs approved by top management? One piece of advice: Learn what your manager needs.Continue Reading
What's the best way to handle end-of-sale devices on your network?
A majority of organizations have end-of-sale and end-of-life devices on their networks. What's the best way to ensure your equipment is up to date?Continue Reading
Time to erase IT friction between InfoSec, NetOps
IT friction between your security and network operations personnel sap productivity. Maybe it's time for everyone to work together.Continue Reading
WAN optimization techniques pace IT investment
TechTarget's most recent Networking Purchasing Intentions survey reveals IT's priority to invest in WAN optimization techniques in the next 12 months.Continue Reading
NIA: Saisei's FlowCommand SDN appliance secures network flows
Saisei, our latest Network Innovation Award winner, uses its FlowCommand virtual SDN appliance to control network flows and prevent individual users from hogging bandwidth.Continue Reading
SDN monitoring means new transitions for engineers
SDN network management means tools are transforming from listening mode to active mode.Continue Reading
Facing network breach threats, visibility is key
In this Q&A, an IT pro at Penn Mutual shares how his dual strategy of user education and Layer 7 visibility helps prevent network breaches.Continue Reading
With MPLS-TP and SDN, a simpler dynamic control plane
MPLS-TP transforms carrier networks for packet switching, but SDN could take it a step further. Combining the technologies, engineers could reduce complexity in the dynamic control plane and gain flexible service creation.Continue Reading
Umpqua Bank employs NSX, micro-segmentation for enterprise security
Umpqua Bank's Sam Guidice tells how the organization deployed VMware's NSX as part of its effort to utilize micro-segmentation for enterprise security.Continue Reading
Network programming skills from scripting to DevOps: What to learn
Networking pros don't need to become code monkeys, but a little network programming can go a long way toward advancing their careers.Continue Reading
Identify this network convergence nomenclature: You could be a winner
As the admin and platform owner of a project, Patrick Hubbard has to monitor everything, and he coined a new term that describes that responsibility.Continue Reading
Boost your network productivity for free with 'lost things'
Like Tinker Bell, network engineers can work magic by sprinkling fairy dust on formerly dormant equipment. And it doesn't cost a cent.Continue Reading
Hyper-V networking: The three virtual switches that fuel connectivity
In this Hyper-V networking primer, learn about the three virtual switches behind Microsoft virtualization connectivity.Continue Reading
Subnet basics: Must you set up Wi-Fi subnets in a single building?
Expert Mike Jude discusses the rationale of creating distinct Wi-Fi subnets in a single building.Continue Reading
"Network management news, advice and technical information" RSS feed is moving!
As of July 1, the "Network management news, advice and technical information" RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://...Continue Reading
Centralized vs. decentralized SDN architecture: Which works for you?
Two SDN architecture models -- centralized and decentralized -- have much in common, but key differences center on the use of the OpenFlow protocol.Continue Reading
How do I disable VPN passthrough? What are the pros and cons to disabling it?
In this Ask the Expert response, Rainer Enders explains how to disable VPN passthrough and what the benefits and drawbacks are.Continue Reading
Mobile network management applications offer monitoring on the go
As smartphone and tablet devices in the enterprise grow, vendors are developing mobile network management apps for iOS and Android, offering accessible views into the network.Continue Reading
Mobile network management apps: Monitoring on the go
Troubleshooting remote scripting using Network Monitor 3.0 -- Managing Windows networks using script
Learn how to use Network Monitor 3.0 for troubleshooting a remote scripting error in this tip originally published on WindowsNetworking.com.Continue Reading
baseboard management controller (BMC)
A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent ...Continue Reading
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community...Continue Reading
How IPsec provides secure communications
IPsec provides secure site-to-site VPNs, remote access and host-to-host communication. In this tip, we peek inside the tunnel and examine how IPsec works.Continue Reading
Network test plan: Checklist for architecture changes
For every change you make to your network architecture, you should have a test plan and a backout plan. In this tip, learn how to build a test plan and review a sample checklist of things to include.Continue Reading
CCNA exam preparation guide
A learning guide for CCNA exam preparation with book chapters, expert advice and quiz.Continue Reading
How SSL and TLS secure network transactions
SSL and TLS are protocols that were developed primarily to protect Web transactions, but they can be used to protect any type of network traffic that utilizes TCP at the transport layer, including the popular SSL VPN. In this tip, learn how SSL and ...Continue Reading
How round-trip time and limiting data rate impact network performance
This tip reviews how network parameters such as round-trip time and limiting data rate affect network performance.Continue Reading
OpenNMS, an introduction: Affordable network management
Open source expert Maria Winslow brings network managers up to speed about the free open source enterprise-grade network-management system OpenNMS.Continue Reading
Best practices for network management in the non-profit world
Discover how the Washington, D.C.-based National Parks Conservation Association developed their network management solution to ensure network uptime and availability.Continue Reading
Implementing software restriction policies
This tip explains how you can use software restriction policies to keep your workstations in pristine shape and cut down on help desk calls at the same time.Continue Reading
The importance of IP address management
IP addresses are an integral part of any corporate network, and companies large and small are consuming them faster with more applications and devices than ever before. Overlooking the importance of getting a handle on IP addresses can prove ...Continue Reading
802.11 Learning Guide
802.11 is perhaps the fastest-changing network protocol around. We've gathered a wealth of information to get you up-to-speed quickly on the various specifications. Learn about all the 802.11 wireless LAN (WLAN) specifications in this learning guide.Continue Reading
Guide to network performance management
This guide introduces you to network management best practices and pitfalls to avoid, and provides troubleshooting help and advice for monitoring and maintaining your network for best performance.Continue Reading
Secure WLAN best practices and topology
Expert Michael Martin provides a list of wireless security "dos and don'ts" and a sample topology for a secure WLAN.Continue Reading
What is the difference between a managed and an unmanaged switch?
Can you explain the ICMP ping test?
Network administrator security policies
Some security policy elements that are specific to network administrators.Continue Reading
How do I connect my managed switch to a patch panel?
Routing First-Step: Classless Internet addressing
Routing and Internet addressing are two important concepts involved in networking. Routing First-Step covers the basics of routing in clear, easy-to-understand language.Continue Reading
Routing First-Step: IP header format
Routing and Internet addressing are two important concepts involved in networking. Routing First-Step covers the basics of routing in clear, easy-to-understand language.Continue Reading
What are the main challenges facing DNS management today?
What are the main challenges facing DNS management today?Continue Reading
Five critical planning steps for wireless LANs, Step 5: Manageability -- Switching to WLAN switches
This article explains how WLAN switches will help to alleviate manageability issues.Continue Reading
Networking hardware, Lesson 2: Switches and bridges
Explanation of how switches and bridges work.Continue Reading
LearnIT: Virtual LANs
What is a virtual LAN? This guide explains the basics in one easy to read format.Continue Reading