Network management and monitoring
Network management and monitoring are vital components of modern IT operations that help businesses run effectively and efficiently. Network observability also provides added visibility into the end-user experience. Find out how innovations such as AI, machine learning, network analytics and network automation are shaping the future of network management and monitoring.
Top Stories
- Tip 08 May 2025
12 remote access security risks and how to prevent them
Enterprises face myriad remote access security concerns, but training and clear communication can help bolster security programs for the long term. Continue Reading
- Tip 30 Apr 2025
How to use Cilium Hubble for network observability
Cilium's Hubble tool provides network observability while working in Kubernetes. This guide explains how Hubble works and how to set it up in a Kubernetes cluster. Continue Reading
- Definition 30 Apr 2025
What is network telemetry?
network telemetry is a real-time data collection service in which network devices, such as routers, switches and firewalls, continuously push data related to the network's health to a centralized location. Continue Reading
By- Andrew Froehlich, West Gate Networks
- News 29 Apr 2025
HPE Aruba deepens network security and OpsRamp visibility
A new 'digital circuit breaker' capability for HPE Private Clouds, increased visibility of third-party hardware with OpsRamp and new SASE capabilities arrive for HPE Aruba. Continue Reading
By- Tim McCarthy, News Writer
- Definition 23 Apr 2025
What is network availability?
Network availability is how long a network system is in uptime over a specific time interval. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Definition 23 Apr 2025
What is NFV MANO (network functions virtualization management and orchestration)?
NFV MANO (network functions virtualization management and orchestration), or just MANO, is an architectural framework used to manage and orchestrate virtual network functions (VNFs) and other software components. Continue Reading
By- Jennifer English, Editorial Director
- Definition 22 Apr 2025
What is traffic shaping (packet shaping)?
Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Definition 14 Apr 2025
What is open networking?
Open networking describes a network that uses open standards and commodity hardware. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Definition 14 Apr 2025
What is troubleshooting and why is it important?
Troubleshooting is a systematic approach to problem-solving often used to find and correct issues with complex machines, electronics, computers and software systems. Continue Reading
- Tip 02 Apr 2025
How to set up a VLAN for enterprise networks
Network administrators configure VLANs to enhance network security and performance. Learn how to set up a VLAN, from configuration steps and best practices to troubleshooting tips. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Definition 01 Apr 2025
What is synthetic monitoring?
Synthetic monitoring is a proactive monitoring approach that uses scripted simulations of user interactions to assess the performance and availability of websites, applications and services. Continue Reading
By- Kinza Yasar, Technical Writer
- Chris Tozzi
- Definition 31 Mar 2025
What is a programmable network (network programmability)?
A programmable network is one in which software that operates independently of network hardware handles the behavior of network devices and flow control. Continue Reading
- Tip 26 Mar 2025
How multi-cloud networking can ensure reliability
Networking services enhance multi-cloud network reliability by reducing configuration errors, adding redundancy and ensuring seamless connectivity across cloud environments. Continue Reading
By- John Burke, Nemertes Research
- Tip 25 Mar 2025
12 network automation ideas to implement in your network
What's your path to network automation? Here are 12 automation ideas that span different levels of expertise to help network teams get comfortable with network automation. Continue Reading
By- Terry Slattery, NetCraftsmen
- Tip 24 Mar 2025
How to ensure network performance and reliability
Network reliability is critical to network performance. Network administrators should follow reliability best practices to understand how to build and maintain reliable networks. Continue Reading
- Definition 21 Mar 2025
What is network topology?
A network topology is the physical and logical arrangement of nodes and connections in a network. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Tom Nolle, Andover Intel
- Tip 19 Mar 2025
How to avoid duplicate IP addresses in a network
Duplicate IP addresses can cause serious network issues. Learn how to avoid duplicate IP addresses with effective IP tracking, DHCP management and network mapping techniques. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Definition 13 Mar 2025
What are managed network services?
Managed network services are networking applications, functions and services that a managed service provider (MSP) remotely operates, monitors and maintains for an enterprise. Continue Reading
By- Jennifer English, Editorial Director
- Tip 12 Mar 2025
8 IT process automation platforms to explore in 2025
Selecting an IT process automation platform requires organizations to evaluate processes, skill level and integration issues. These popular products are good options. Continue Reading
- Definition 07 Mar 2025
What is Telnet?
Telnet is a network protocol used to remotely access a computer for a text-based communication channel between two machines. Continue Reading
- Definition 06 Mar 2025
What is promiscuous mode in networking?
In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC) or an adapter on a host system, can intercept and read in its entirety each network packet that arrives instead of just the packets addressed to the host. Continue Reading
- Tip 04 Mar 2025
How to troubleshoot common routing errors
It's important to troubleshoot routing errors to minimize network disruptions. Common errors rooted in BGP and OSPF include misconfigurations and various unmet neigr requirements. Continue Reading
By- Suresh Vina, LMAX Group
- Definition 03 Mar 2025
What is east-west traffic?
East-west traffic refers to the transfer of data packets that move from server to server within a network's data center. Continue Reading
By- Jennifer English, Editorial Director
- Russ White
- Definition 28 Feb 2025
What is FCAPS (fault, configuration, accounting, performance and security)?
FCAPS (fault, configuration, accounting, performance and security) is a network management framework and model created by the International Organization for Standardization (ISO). Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Andrew Zola
- Tip 28 Feb 2025
4 phases to build a network automation architecture
The implementation of a network automation architecture involves several elements, including a core orchestration engine, assorted databases and proper network testing. Continue Reading
By- Charles Uneze
- Terry Slattery, NetCraftsmen
- Feature 27 Feb 2025
15 common network protocols and their functions explained
Networking makes the internet work, but it needs several key protocols. These common network protocols make communication and connection across the internet possible. Continue Reading
By- Kinza Yasar, Technical Writer
- Michaela Goss, Senior Site Editor
- Definition 27 Feb 2025
What is network analytics?
Network analytics is the application of big data principles and tools to the data used to manage and secure data networks. Continue Reading
By- Rahul Awati
- John Burke, Nemertes Research
- Definition 20 Feb 2025
What is network visibility?
Network visibility is an awareness of the components and data within an enterprise computer network. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Ben Lutkevich, Site Editor
- Guest Post 20 Feb 2025
Zero-trust strategies leave networks open to lateral threats
Zero trust assumes a network is already compromised. However, new EMA research shows enterprises are more concerned with securing remote access than internal lateral threats. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
- Definition 20 Feb 2025
What is Transport Layer Security (TLS)?
Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications. Continue Reading
By- Scott Robinson, New Era Technology
- Andrew Froehlich, West Gate Networks
- Kevin Beaver, Principle Logic, LLC
- Definition 20 Feb 2025
What is Simple Network Management Protocol (SNMP)?
Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network or wide area network. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Jessica Scarpati
- Tutorial 19 Feb 2025
How to troubleshoot IP settings with Windows ipconfig
Ipconfig is a vital tool for network troubleshooting. It displays key network information to help administrators diagnose and fix connectivity issues efficiently. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Definition 10 Feb 2025
What is network configuration management (NCM)?
Network configuration management (NCM) is the process of organizing and maintaining information about all the components in a computer network. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
- Definition 31 Jan 2025
What is network monitoring?
Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance. Continue Reading
By- Kinza Yasar, Technical Writer
- Terry Slattery, NetCraftsmen
- Alexander S. Gillis, Technical Writer and Editor
- Tip 31 Jan 2025
How to troubleshoot DHCP issues
DHCP server troubleshooting steps vary depending on the DHCP error. Some of the most common errors include DHCP server failure, lack of available IP addresses and network failures. Continue Reading
By- Terry Slattery, NetCraftsmen
- Damon Garn, Cogspinner Coaction
- Definition 24 Jan 2025
What is network automation?
Network automation is a process that uses intelligent software to automate the management, configuration, deployment, testing and operation of both physical and virtual devices. Continue Reading
By- Kinza Yasar, Technical Writer
- Andrew Froehlich, West Gate Networks
- Jessica Scarpati
- Answer 24 Jan 2025
Cloud networking vs. cloud computing: What's the difference?
Businesses might see cloud computing and cloud networking as interchangeable due to similarities, but the two strategies dictate different processes and fulfill different goals. Continue Reading
By- John Burke, Nemertes Research
- Tip 10 Jan 2025
Evaluate 7 cloud monitoring tools for networks
Organizations use cloud monitoring tools to manage on-premises, hybrid and cloud networks. Discover the features of seven cloud monitoring tools that can enhance performance. Continue Reading
By- David Jacobs, The Jacobs Group
- Deanna Darah, Site Editor
- Tip 10 Jan 2025
The steps and benefits of DNS service audits
Network administrators should perform DNS audits periodically and after major network changes. Routine checks can help teams to plan for future upgrades. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Tip 10 Jan 2025
How to configure networks using CI/CD pipelines
The CLI is the common tool for many network engineers who manage network devices. But DevOps is changing the landscape, and network pros should understand network CI/CD deployment. Continue Reading
By- Suresh Vina, LMAX Group
- Opinion 09 Jan 2025
5 resolutions for enterprise networking in 2025
Had your fill of “best-of” and “top ten” 2024 lists? Instead of looking back or predicting the future, blend what you know with what to prioritize going forward. Continue Reading
By- Jim Frey, Principal Analyst
- Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
- Tip 07 Jan 2025
The role of container networking in DevOps
Containerization isn't just for DevOps teams. Network engineers often set up container networks, ensure connectivity between containers and work with container networking tools. Continue Reading
- Definition 02 Jan 2025
What is network management?
Network management is a multifaceted discipline that provides network administrators with the tools, protocols and processes to maintain and optimize network operations. Continue Reading
By- Jennifer English, Editorial Director
- Sean Michael Kerner
- Definition 26 Dec 2024
What is network downtime?
Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of both. Continue Reading
By- Kinza Yasar, Technical Writer
- Andy Patrizio
- Feature 23 Dec 2024
Compare 7 network automation tools and their capabilities
Network automation tools automate repetitive tasks, provision devices and manage configurations. Evaluate seven tools to discover the benefits each option provides for efficiency. Continue Reading
By- Kerry Doyle
- Deanna Darah, Site Editor
- Feature 12 Dec 2024
Free network disaster recovery plan template and guide
Proper network disaster recovery planning can mean the difference between a brief disruption and extensive downtime. Download our free template to get started building a plan. Continue Reading
- Feature 10 Dec 2024
The business case for AI-driven network orchestration
Organizations that are considering AI-driven network orchestration will find it has many business cases -- chief among them are reduced Opex and efficient resource use. Continue Reading
- Answer 09 Dec 2024
What are the 5 types of network management?
Despite the changes in how organizations optimize network performance, the five foundational elements of network management -- also known as FCAPS -- remain the same. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Tip 03 Dec 2024
The purpose of route poisoning in networking
Route poisoning is an effective way of stopping routers from sending data packets across bad links and stop routing loops. This limits delays and creates a more stable network. Continue Reading
- Tip 03 Dec 2024
How to monitor network traffic in 7 steps
Effective network monitoring is an ongoing process that requires the right tool set to gain visibility into infrastructure service quality. These steps can help network teams fine-tune network monitoring strategies. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- News 03 Dec 2024
Arista simplifies switching to its campus network
Arista says companies can switch to its campus network while holding on to legacy stacked switches. Continue Reading
By- Antone Gonsalves, Editor at Large
- Answer 22 Nov 2024
How to test packet loss on Windows, macOS and Linux
Network admins should know how to identify and test for packet loss. Diagnosing this issue doesn't require specialized tools or expensive software, but these four tools can help. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Answer 21 Nov 2024
Compare network management vs. network monitoring
Network monitoring is a vital part of network management. Both are essential to help network operations teams streamline operations and address potential issues. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Definition 18 Nov 2024
What is Cisco Performance Routing (PfR)?
Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Answer 18 Nov 2024
Network security management challenges and best practices
A comprehensive and scalable network security management plan is more important than ever in the face of ever-rising threats and attacks orchestrated by bad actors. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Definition 18 Nov 2024
What is acceptable use policy (AUP)?
An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to or use of a corporate network, the internet or other computing resources. Continue Reading
- Tip 12 Nov 2024
5 principles of change management in networking
Network change management includes five principles, including risk analysis and peer review. These best practices can help network teams reduce failed network changes and outages. Continue Reading
By- Terry Slattery, NetCraftsmen
- Feature 06 Nov 2024
AI skills for network professionals
Networking professionals must develop basic networking skills and AI to thrive in a complex landscape. Learn how AI's integration into network management will change the field. Continue Reading
By- Deanna Darah, Site Editor
- Tip 05 Nov 2024
Top 6 network monitoring best practices
Benchmark metrics, customizable dasards and automation are all best practices in network monitoring. Network admins can use them to optimize performance and minimize threats. Continue Reading
- Feature 04 Nov 2024
How AI in the NOC will transform network operations
AI can improve network operations through automation and troubleshooting. Experts at ONUG emphasized phased adoption and methods that enhance NOC monitoring and support. Continue Reading
By- Deanna Darah, Site Editor
- Feature 01 Nov 2024
4 ways to improve the network monitoring experience
The network transition from data centers to hybrid and multi-cloud environments makes the network delivery path difficult to find. Here are four ways to make that process easier. Continue Reading
By- Nicole Viera, Assistant Site Editor
- Tip 28 Oct 2024
Is cloud-based network management right for your business?
Many enterprises use on-premises network management, but some are transitioning to cloud-based management. Enterprises should evaluate both options before deciding which to use. Continue Reading
- Tip 25 Oct 2024
Logical vs. physical topology: What's the difference?
A complete network topology is a network map that provides a look into the network's hardware components and data flow using physical and logical topologies. Continue Reading
- Answer 24 Oct 2024
9 common network issues and how to fix them
Slow network speeds, weak Wi-Fi signals and damaged cabling are just some of the most common network connection issues that IT departments need to troubleshoot. Continue Reading
By- David Jacobs, The Jacobs Group
- Answer 21 Oct 2024
Telemetry vs. SNMP: Which is better for network management?
Now that networks have become more complex, network management has become a challenge of its own. Enterprises can compare telemetry vs. SNMP to see which better suits their needs. Continue Reading
By- Terry Slattery, NetCraftsmen
- Tip 21 Oct 2024
Basic network management interview questions and answers
Job interviews should be a two-way conversation. Hiring managers and job applicants should review common network management interview questions before an interview. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Tip 21 Oct 2024
A guide to network lifecycle management
Network pros should use a network lifecycle management process to monitor, manage and implement changes in their network, regardless of if they use PPIDOO or another framework. Continue Reading
By- Terry Slattery, NetCraftsmen
- Tip 16 Oct 2024
Overview of network management tasks and best practices
Network management encompasses a range of tasks and processes. Explore 10 crucial tasks and accompanying best practices to ensure a resilient and functional network. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Tip 15 Oct 2024
The benefits of network asset management software
Network asset management software helps network teams keep track of network devices and software to ensure timely upgrades, accurate inventory and updated documentation. Continue Reading
By- David Jacobs, The Jacobs Group
- Tip 30 Sep 2024
The role of network sandboxing and testing
Network sandboxing provides network teams with a risk-free environment to test changes and run potential threat scenarios. This helps prevent outages and other unexpected issues. Continue Reading
- News 27 Sep 2024
HPE Aruba, Arista update network management consoles
Arista highlights its consolidation of network management tools within CloudVision, while HPE extends Aruba Central to include Cisco and other third-party network devices. Continue Reading
By- Antone Gonsalves, Editor at Large
- Tip 27 Sep 2024
How to tackle network automation challenges and risks
Automation makes networks more efficient, but engineers must first mitigate the risks. With planning and training, enterprises can take advantage of automation's capabilities. Continue Reading
By- Charles Uneze
- Terry Slattery, NetCraftsmen
- Definition 26 Sep 2024
What is ICMP (Internet Control Message Protocol)?
ICMP (Internet Control Message Protocol) is a network layer error-reporting protocol that's used to communicate data transmission problems. Continue Reading
By- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
- Answer 25 Sep 2024
Network automation vs. orchestration: What's the difference?
Automation and orchestration take different approaches to achieve network efficiency. However, network engineers can use them together to create an efficient, centralized network. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Answer 24 Sep 2024
Recursive vs. iterative DNS queries: What's the difference?
Name resolution translates human-readable hostnames to IP addresses for device configuration. DNS uses recursive or iterative methods to translate names into IP addresses. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Answer 11 Sep 2024
HTTP vs. HTTPS: What's the difference?
HTTP and HTTPS are web communication protocols. HTTP lacks security, while HTTPS encrypts data to adhere to the security standards of ity, integrity and authenticity. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Tip 10 Sep 2024
How to implement CI/CD in network automation
CI/CD processes help deploy code changes to networks. Integrating a CI/CD pipeline into automation makes networks more reliable, reducing configuration errors and downtime. Continue Reading
- Tip 09 Sep 2024
How does predictive analytics help network operations?
Predictive analytics can project network traffic flows, predict future trends and reduce latency. However, tools continue to evolve, so teams should use caution in their selection. Continue Reading
By- John Burke, Nemertes Research
- Feature 29 Aug 2024
Best practices for Cisco pyATS test scripts
Test scripts are the heart of any job in pyATS. Best practices for test scripts include proper structure, API integration and the use of Python libraries to enhance testing. Continue Reading
By- Deanna Darah, Site Editor
- Tip 21 Aug 2024
How to create subnets in IPv4 and IPv6 networks
Network administrators subnet networks into segments for improved control and efficiency. IPv4 uses subnet masks, while IPv6 uses prefixes, and each has its own unique steps. Continue Reading
- Video 19 Aug 2024
MAC address vs. IP address explained
MAC and IP addresses serve different roles in data transmission, differing in location, format and use. Continue Reading
By- Jennifer English, Editorial Director
- Tutorial 07 Aug 2024
Examine a captured packet using Wireshark
Wireshark is a useful tool for capturing network traffic data. Network pros can make the most of the tool by analyzing captured packets to see what that data means for troubleshooting. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Video 06 Aug 2024
Benefits and methods of load balancing
Load balancing ensures smooth network performance by distributing traffic equitably, enhancing scalability and adapting to dynamic IT landscapes. Continue Reading
By- Kinza Yasar, Technical Writer
- Definition 29 Jul 2024
What is network scanning? How to, types and best practices
Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal to devices and await a response. Continue Reading
By- Paul Kirvan
- Tom Nolle, Andover Intel
- Feature 26 Jul 2024
The benefits and drawbacks of network as a service
NaaS, with its varied definitions and attributes, is hard to define. In a new EMA survey, enterprises laid out their expectations for NaaS, including its benefits and drawbacks. Continue Reading
By- Nicole Viera, Assistant Site Editor
- Definition 16 Jul 2024
remote terminal unit (RTU)
A remote terminal unit (RTU) is a microprocessor-based electronic device used in an industrial control system (ICS) to connect hardware to a distributed control system (DCS) or supervisory control and data acquisition (SCADA) system. Continue Reading
- Tip 15 Jul 2024
How network data models work with automation
Network data models can help network engineers with their automation strategies, thanks to the essential data they store about physical components, security and QoS. Continue Reading
- Answer 11 Jul 2024
CASB vs. SASE: What's the difference?
CASB and SASE enhance network and SaaS application security. CASB acts as a security layer for cloud services, while SASE integrates networking and security into one framework. Continue Reading
By- Evgeniy Kharam, EK Cyber and Media Consulting
- Dmitry Raidman, Cybeats & Security Architecture Podcast
- Tip 10 Jul 2024
A guide on how to learn network automation
Networks are always evolving, and network automation is the next step forward. From soft skills to AI, these skills are essential to understanding network automation. Continue Reading
By- Terry Slattery, NetCraftsmen
- Feature 01 Jul 2024
Compare 5 single-vendor SASE providers
SASE has broad enterprise appeal because it combines security and connectivity. With so many vendor options available, enterprises might need help narrowing the search. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Opinion 01 Jul 2024
HPE Discover 2024: Aruba Networking moves to center stage
HPE has made enterprise networking a critical part of its portfolio, with updates around AI, Aruba's networking tools, and the upcoming acquisition of Juniper. Continue Reading
By- Jim Frey, Principal Analyst
- Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
- Answer 26 Jun 2024
Wireshark vs. tcpdump: What's the difference?
Wireshark and tcpdump both aid network administrators in packet analysis. Wireshark's simple GUI contrasts with tcpdump's speed and scripting abilities, which enhances management. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Definition 20 Jun 2024
packet coalescing
Packet coalescing involves using a computer's network interface card (NIC) to reduce the number of generated receive interrupts the adapter issues. Continue Reading
- Definition 13 Jun 2024
CIDR (Classless Inter-Domain Routing or supernetting)
CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- John Burke, Nemertes Research
- Definition 13 Jun 2024
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between devices on a network. Continue Reading
By- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
- Tutorial 11 Jun 2024
Use advanced DHCP logging techniques for troubleshooting
This guide helps admins solve problems on the network by explaining how to work with recorded activity in logs and set up an archival system to examine older incidents. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Tip 10 Jun 2024
ARP vs. RARP: What's the difference?
Network devices use ARP to map IP addresses to MAC addresses. RARP, which is less common, accomplishes the reverse and enables network devices to map MAC addresses to IP addresses. Continue Reading
By- Damon Garn, Cogspinner Coaction
- Definition 07 Jun 2024
IT incident management
IT incident management is a component of IT service management (ITSM) that aims to rapidly restore services to normal following an incident while minimizing adverse effects on the business. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
- Feature 07 Jun 2024
How an improved network experience enhances business
At Cisco Live 2024, leaders discussed how AI can support business objectives. Companies like CSL Behring and Room & Board improved their network experience with ThousandEyes. Continue Reading
By- Deanna Darah, Site Editor
- News 07 Jun 2024
Cisco makes Splunk the center of observability
Cisco is integrating Splunk, AppDynamics and ThousandEyes to create a critical differentiator in the observability market. Networking integration will come later. Continue Reading
By- Antone Gonsalves, Editor at Large
- News 05 Jun 2024
Cisco commits to GenAI with HyperFabric, $1B fund
Cisco partners with Nvidia on HyperFabric as customers try to understand how generative AI will help them manage their network infrastructure. Continue Reading
By- Antone Gonsalves, Editor at Large
- Feature 03 Jun 2024
Subnet use cases and considerations for network performance
Network administrators create subnets to split networks and optimize performance. Other reasons for subnetting include traffic management, cloud optimization and security. Continue Reading