My name is Jason Alberino and I am a senior engineer in our professional services group and a first-time blogger here on the Network Monitor. I interact with a good number of Ipswitch WhatsUp Gold customers every month and you may see me here from time to time offering advice to those of you using our network monitoring products.
Unfortunately, no one template can guarantee 100-percent system stability. There are, however, guidelines any sysadmin can follow to define policies and procedures that proactively ensure your network doesn't have a random fire drill.
When it comes to network performance, the 5 “Ps” rule helps guarantee uptime and speed: Proper Preparation Prevents Poor Performance. In today’s non-stop world, IT pros are tasked with the increasingly difficult job of keeping their organization’s network running effectively and efficiently. In support, we’ve identified three critical focus areas and solutions to ensure poor network performance doesn’t have you playing the blues in your server closet.
Many health care IT organizations create service-level agreements (SLAs) for new applications and infrastructure projects. It's important to collect metrics related to SLA line items and review your metrics on a regular basis.
Who among us can argue that automated network monitoring isn't necessary when you consider how much the role of IT has expanded in recent years? Uptime on workstations and servers has been relegated to a secondary role and is considered the norm. While enhancing business processes and functions has become more of a primary focus.
The IT department of the Freehold Regional High School District (FRHSD) provides network management and support services to six different high schools located in New Jersey. Its network spans across over 200 square miles and is trusted to aid in the education of more than 11,000 students.
Until a few years ago, most people thought of hackers as bright but maladjusted teenagers who mainly broke into networks for the fun of it. But now that hacking has gone big time, you're more likely to associate hacking with organized crime groups or "state actors."
In my opinion, geolocation or location-based data (call it what you will) is the most frustrating aspect of mobile device usage. Although I was unable to obtain prompt expert insights to aid story credibility, surely I can't be the only one that thinks in this manner?
The Delta Airlines power outage that grounded thousands of flights across the country was attributed to their legacy systems. What could they have done to prevent it? A network monitoring tool would have pinpointed the source of the problem possibly before the outage happened or even in just minutes instead of the reported 30 minutes. It would have allowed Delta's IT team to be nimbler while they remediated the issue.
The world is getting ready to watch the opening ceremonies of the 2016 Summer Olympics in Rio. IT teams may find themselves behind the game, though. They might be spending some time over the next 16 days dealing with the consequences that the event will have on network bandwidth and application performance.
One of the biggest headaches for IT is dealing with intermittent network performance problems. These are the kinds of issues that boldly appear but soon vanish before the source can be pinpointed. Only to happen again and again, frustrating and random each time. In most cases, these network performance problems look like they could be rooted in a certain area when, in fact, they lie somewhere completely different.
I’ve been to many IT conferences over the years, some have been underwhelming, and some have been more than worth the trip. Cisco Live US 2016 last week in Las Vegas definitely falls into the latter category. And it’s certainly justified, grown men playing Pokémon Go aside. Our booth was “standing room only” from beginning to end and our conversations with our fellow IT brethren were very interesting and enlightening. Even Diglett stopped by to say hello.
Over the years IT pros have had to get used to less autonomy in terms of what touches their networks. Back in the day, IT loved RIM’s BlackBerrys because they were built for security. They never liked Apple iPhones. They were built for consumers, not IT security pros.
You have the right to
request deletion of your Personal Information at any time.
You can also ask us not to pass your
Personal Information to third parties here: Do Not Sell My Info
We see that you have already chosen to receive marketing materials from us. If you wish to change this at any time you may do so by clicking here.
Thank you for your continued interest in Progress. Based on either your previous activity on our websites or our ongoing relationship, we will keep you updated on our products, solutions, services, company news and events. If you decide that you want to be removed from our mailing lists at any time, you can change your contact preferences by clicking here.