When Network Performance Management Needs Alchemists, Not IT
To the non-technical, network performance management may seem like the activities of a secret society.
What's Up, What's Down and What's Trending
To the non-technical, network performance management may seem like the activities of a secret society.
Picture this: Someone in your office decided to buy a new app. Maybe they told you about it ahead of time, maybe not. While you may rightfully assume this is a responsibility of an application development team, app monitoring often falls to sysadmins or network admins. Either way, if you develop an informal application footprint, you can save yourself headaches later. The seven tips below can get you started in developing a footprint for the application. They'll make you a smarter user of your network monitoring tool if the app ever strays into rogue territory.
Having a large number of network monitoring tools that only provide a partial view of your end-to-end environment is like five people with in the dark trying to describe an elephant by touching only a single body part.
Have you ever received alerts from WhatsUp Gold in the middle of the night that a service has gone 'down', only to login and check to see everything is apparently good and happy? Then, just as you're about to logoff, WhatsUp Gold labels the device as 'up' again?
The importance of port management (and every other aspect of network infrastructure) has grown exponentially as our dependence on connectivity has increased. Additionally, with the advent of mainstream IoT technology, port management's role in both IT management and security becomes even more critical.
Sometimes scripting takes the Ninja kind of patience.
Last month we polled more than 1300 IT pros from around the world about their challenges with IT complexity. What we heard loud and clear is that there is far too much to get done, but not enough time to do it. Not to mention the time IT spends chasing down problems without full network visibility to find them fast enough.
Data archiving is an odd practice at times. When big data is focused on every last bit of information, the idea of relegating any amount of it to outdated media can seem like a waste of resources. Add the cloud and you begin to see how out of place this concept can be.
More complexity, fewer results. This is the general consensus among IT teams everywhere. IT infrastructures have evolved into a Frankenstein of servers, access points, applications, and mobile devices. To throw another wrench in there (pun intended), the tools we implement to control complex business networks end up increasing complexity due to the lack of integration between all of these tools. What you get is a tangled mess of solutions that only complicate matters.
If you do any security monitoring, it's easy to get overwhelmed by the amount of events you need to track. You can start by doing longer hours, but eventually you'll end up in a swamp — sucked in to the point that workflow comes to a standstill.
Data transfer has come a long way. From 110-baud modems from the late 1950s to 56-kbps technology used at the turn of the century — and finally more familiar broadband and Wi-Fi — one thing is clear: Speed is an obsession. And while Wi-Fi has enjoyed significant adoption even as telecom companies fight for top spot in the mobile device market, there's still a drive to find newer, faster ways to move data and increase connectivity.
Most IT teams don’t have the budget or resources to satisfy the growing demands of their users. The demand comes in many forms, such as bandwidth consumption, Wi-Fi access, power utilization, and storage capacity; just to name a few.
The future of IT will be molded not just by technology, but also by changing expectations and attitudes toward support's role within the organization.
IT pros know all too well the old "have you tried turning it off and on?" trick - but there are some help desk stories that are stranger than fiction.
Human error is responsible for more than half of all security breaches as of last year, making employees the biggest cyber threat of all. Shadow IT, on the other hand, is the deliberate installation of software that is not authorized by IT. The reasons for it? They vary, but generally include tools to make your tickets easier — which should already be available in a centralized company repository.
What's on your IT wish list?
The plotline for a data center's Big Data story is still being written, and already there is no lack of twists and turns. The Internet of Things (IoT) is just the latest in a multi-episode drama that'll spawn as many shark-jumping forecasts as processes.
IT is a pretty thankless job; long hours to deploy technology that's often invisible to the average user isn't exactly an ego boost as you leave work every night. But for every moment of sheer frustration — and they are many — there's a much lighter side to support, affectionately called "information technology humor." Cue canned laughter.
The Super Bowl is over and hockey playoffs are still weeks away, but many Americans will still get their interim fix during March Madness. The prelims went underway on March 15th, and a huge cross-section of the American workforce faces a challenge: making sure they don't miss a single foul shot, even during business hours.
As Isocrates once said, “It’s important to know where you’re going than to get there quickly.” If you’d like to integrate WhatsUpGold network reporting software with Google Maps, here’s how you get there. And it hopefully shouldn’t take you long to do it.
Get our latest blog posts delivered in a monthly email.