Quantcast
Channel: Auvik
Browsing all 721 articles
Browse latest View live

Implementing a Bring Your Own Device Policy In Your Organization

Bring your own device (BYOD) policies are more important than ever since smartphones became pervasive. I’d argue that even if you don’t want to allow personal user devices to access corporate data or...

View Article


Image may be NSFW.
Clik here to view.

The No Sweat Guide to Effective Switch Management

An on-site switch plays a critical role in a network: that of connecting your users to the rest of the IT infrastructure. Don’t think of that jack in the wall or under the cubicle as a simple Ethernet...

View Article


Image may be NSFW.
Clik here to view.

6 Essential First Steps When Managing a New Network

In a perfect world, managing a new network would be a breeze. On your first day, you’d find tons of documentation on the IT infrastructure awaiting you. Login credentials would be securely recorded and...

View Article

Image may be NSFW.
Clik here to view.

Getting Started With Syslog in Auvik

When something goes wrong in your network, you often don’t find out about it until your users are affected, and you’re left scrambling to identify the issue and understand its root cause. The faster...

View Article

How to Use the Triple-A Framework to Optimize Your IT Services

Marketing teams have the 4 Ps (product, price, place, and promotion). Sales teams have ABC (Always Be Closing). As far as frameworks go, there are a lot of great examples out there for how we can...

View Article


An Introduction to Subnetting

Subnetting isn’t hard but I often see even experienced network engineers looking for subnet calculators or trying to count in binary on their fingers. So how about a quick primer? To understand...

View Article

5 Great Reasons to Store and Analyze Centralized Logs

Whether you’re trying to troubleshoot a problem, defend against attacks, or simply optimize your environment, event logs are your best source of information. More than that, not logging or ignoring...

View Article

Special IP Address Ranges and When to Use Them

By even casual observation, you’ll likely have noticed that there are several IP address ranges that are special, including: 10.0.0.0/8 (10.0.0.0 – 10.255.255.255) 172.16.0.0/12 (172.16.0.0 –...

View Article


The Employee Offboarding Checklist for IT Pros

Network hardware failures. Internet outages. DDoS attacks. These are the types of disruptions you probably spend your time preparing to handle. But there’s another potential source of trouble that most...

View Article


Image may be NSFW.
Clik here to view.

Planning for a Post-Pandemic World as an IT Leader

As COVID-19 cases began to rise around the world in March 2020, governments and businesses had no choice but to take extraordinary measures to flatten the curve. As an IT leader, you were likely tasked...

View Article

Image may be NSFW.
Clik here to view.

Reducing Mean Time to Resolution With Auvik

When something goes wrong in your network, you often don’t find out about it until your users are affected. By then, you’re on the receiving end of an angry phone call and you’re left scrambling to...

View Article

Image may be NSFW.
Clik here to view.

What Is Multicast Networking and How Does It Work?

Multicast networking is based on the simple concept that a single packet can be sent by a server and it will be received by many receivers. Multicast is different from broadcast because it’s more...

View Article

5 Reasons to Add Network Monitoring to Your 2021 IT Budget

For many companies, the beginning of October is also the beginning of the fourth and final quarter of the fiscal year. In IT, it’s a time to prepare for the new year by defining our priorities and...

View Article


Image may be NSFW.
Clik here to view.

The Big -aaS List of As-a-Service Offerings

The cloud is here—and so are its acronyms. Since software as a service (SaaS) hit the world in 2001, the ‘as a service’ model has been extended to just about everything you can think of. Along the way,...

View Article

Image may be NSFW.
Clik here to view.

Configuring and Troubleshooting Multicast Protocols

There are two important protocols required to get your network to forward multicast packets: IGMP and PIM. In this article, I’ll show you how to set up these protocols on your network and how to...

View Article


Image may be NSFW.
Clik here to view.

3 Key Trends from the 2020 Network Vendor Diversity Report

In the inaugural Network Vendor Diversity report, Auvik discovered high diversity in the network devices IT teams and MSPs were managing. In 2019, the data showed complexity continuing to rise as all...

View Article

Image may be NSFW.
Clik here to view.

Are Network Blind Spots Endangering Your Business?

Network blind spots are the things you can’t see and don’t know about. They’re dangerous. Just like the blind spots on your car, network blind spots can set you up for deadly crashes. Problems will...

View Article


Image may be NSFW.
Clik here to view.

Nifty Gifty 2020 Is Back to Bring Some Holiday Cheer

In just 31 short days, 2020 will officially be over and—whew!—what an interesting and unexpected year of twists and turns it’s been. But the year’s not over yet and, in the spirit of 2020, we’ve...

View Article

Image may be NSFW.
Clik here to view.

A Beginner’s Guide to Microsoft Power BI & Network Reports

As a network admin or a network manager, you’re likely using a ton of software and tools—from network monitoring tools like Auvik to ITSMs like ServiceNow to communications apps like Microsoft Teams....

View Article

Image may be NSFW.
Clik here to view.

How COVID-19 Changed Our Internet Habits in 2020

First off, I’m going to make an assumption: I’m going to assume you—like me—have spent a lot more time online in 2020 than you ever have before. Thanks to COVID-19, we were all at home with nowhere to...

View Article
Browsing all 721 articles
Browse latest View live