The most recent content from our members.
As network engineers, administrators, architects, and enthusiasts we are seeing a trend of relatively complicated devices that all strive to provide unparalleled visibility into the inner workings of applications or security. Inherent in these solutions is a level of complexity that challenges network monitoring tools, it…
Hey Everyone! My name is Ryan Booth and I’ve been given the opportunity to post as an Ambassador focusing in on the Network Management section of Thwack. I'm excited to get the opportunity to bounce my thoughts and ideas off everyone and look forward to the conversations. The overall theme for my posts will be the growing…
This is my last post as an ambassador. I've had a ton of fun and appreciate everyone’s feedback and opinion. Now let’s talk about some network diagrams! No network should be without a good visual representation of the overall design and layout. When push comes to shove any documentation is better than no documentation. For…
Network Management doesn’t have to be overly complex, but a clear understanding of what needs to be accomplished is important. In a previous blog series I had talked about the need for a tools team to help in this process, a cross functional team may be critical in defining these criteria. * Determine What is…
I am a big fan of data and metrics (.. that is data that we can turn into knowledge and Commander Data from Star Trek). In IT we tend to collect a lot of it, especially as it relates to our infrastructure and reporting it within to our business folks is sometimes a challenge. For one, we tend to report in terms we…
Mobile computing is pervasive, with more and more work done on mobile devices. Folks may access your website through a mobile browser or native mobile application, does this change the entire web performance monitoring stack or can we use the same applications to monitor mobile and web apps? There seems to be a lot of…
In my last blog, I introduced some of the basics of network security and why enforcing traffic on the standard source port isn't enough to determine what’s in a payload. I've talked mostly about port 80 and HTTP, but the ports associated with DNS (UDP 53) are also often abused. In the context of firewalls, Deep Packet…
Eric Wright (Discoprosse) talk on this topic from a server/orchestrations side in his February post Server Build Processes, Monitoring, Orchestration and Server Lifecycle Management but I wanted to circle back around and add networking into the mix. There is a ton of information and views on the topic of network automation…
What are your expectations or your thoughts when it comes to having a discussion about user device tracking technology? This was the opening question that I presented to spark a dialog about the topic of user device tracking. In my first post, I wanted to center the conversation on what the expectations should be with…
Welcome to my fourth and last installment in the discussion about the expectations of user and device tracking. I would like to take a little time up front to thank you all for taking the time to read my post and a real big shout out to the ones that have made comments about the posts. With that said, I want to make this…
It looks like you're new here. Sign in or register to get started.