Implementing a Bring Your Own Device Policy In Your Organization
Bring your own device (BYOD) policies are more important than ever since smartphones became pervasive. I’d argue that even if you don’t want to allow personal user devices to access corporate data or...
View ArticleThe No Sweat Guide to Effective Switch Management
An on-site switch plays a critical role in a network: that of connecting your users to the rest of the IT infrastructure. Don’t think of that jack in the wall or under the cubicle as a simple Ethernet...
View Article6 Essential First Steps When Managing a New Network
In a perfect world, managing a new network would be a breeze. On your first day, you’d find tons of documentation on the IT infrastructure awaiting you. Login credentials would be securely recorded and...
View ArticleGetting Started With Syslog in Auvik
When something goes wrong in your network, you often don’t find out about it until your users are affected, and you’re left scrambling to identify the issue and understand its root cause. The faster...
View ArticleHow to Use the Triple-A Framework to Optimize Your IT Services
Marketing teams have the 4 Ps (product, price, place, and promotion). Sales teams have ABC (Always Be Closing). As far as frameworks go, there are a lot of great examples out there for how we can...
View ArticleAn Introduction to Subnetting
Subnetting isn’t hard but I often see even experienced network engineers looking for subnet calculators or trying to count in binary on their fingers. So how about a quick primer? To understand...
View Article5 Great Reasons to Store and Analyze Centralized Logs
Whether you’re trying to troubleshoot a problem, defend against attacks, or simply optimize your environment, event logs are your best source of information. More than that, not logging or ignoring...
View ArticleSpecial IP Address Ranges and When to Use Them
By even casual observation, you’ll likely have noticed that there are several IP address ranges that are special, including: 10.0.0.0/8 (10.0.0.0 – 10.255.255.255) 172.16.0.0/12 (172.16.0.0 –...
View ArticleThe Employee Offboarding Checklist for IT Pros
Network hardware failures. Internet outages. DDoS attacks. These are the types of disruptions you probably spend your time preparing to handle. But there’s another potential source of trouble that most...
View ArticlePlanning for a Post-Pandemic World as an IT Leader
As COVID-19 cases began to rise around the world in March 2020, governments and businesses had no choice but to take extraordinary measures to flatten the curve. As an IT leader, you were likely tasked...
View ArticleReducing Mean Time to Resolution With Auvik
When something goes wrong in your network, you often don’t find out about it until your users are affected. By then, you’re on the receiving end of an angry phone call and you’re left scrambling to...
View ArticleWhat Is Multicast Networking and How Does It Work?
Multicast networking is based on the simple concept that a single packet can be sent by a server and it will be received by many receivers. Multicast is different from broadcast because it’s more...
View Article5 Reasons to Add Network Monitoring to Your 2021 IT Budget
For many companies, the beginning of October is also the beginning of the fourth and final quarter of the fiscal year. In IT, it’s a time to prepare for the new year by defining our priorities and...
View ArticleThe Big -aaS List of As-a-Service Offerings
The cloud is here—and so are its acronyms. Since software as a service (SaaS) hit the world in 2001, the ‘as a service’ model has been extended to just about everything you can think of. Along the way,...
View ArticleConfiguring and Troubleshooting Multicast Protocols
There are two important protocols required to get your network to forward multicast packets: IGMP and PIM. In this article, I’ll show you how to set up these protocols on your network and how to...
View Article3 Key Trends from the 2020 Network Vendor Diversity Report
In the inaugural Network Vendor Diversity report, Auvik discovered high diversity in the network devices IT teams and MSPs were managing. In 2019, the data showed complexity continuing to rise as all...
View ArticleAre Network Blind Spots Endangering Your Business?
Network blind spots are the things you can’t see and don’t know about. They’re dangerous. Just like the blind spots on your car, network blind spots can set you up for deadly crashes. Problems will...
View ArticleNifty Gifty 2020 Is Back to Bring Some Holiday Cheer
In just 31 short days, 2020 will officially be over and—whew!—what an interesting and unexpected year of twists and turns it’s been. But the year’s not over yet and, in the spirit of 2020, we’ve...
View ArticleA Beginner’s Guide to Microsoft Power BI & Network Reports
As a network admin or a network manager, you’re likely using a ton of software and tools—from network monitoring tools like Auvik to ITSMs like ServiceNow to communications apps like Microsoft Teams....
View ArticleHow COVID-19 Changed Our Internet Habits in 2020
First off, I’m going to make an assumption: I’m going to assume you—like me—have spent a lot more time online in 2020 than you ever have before. Thanks to COVID-19, we were all at home with nowhere to...
View Article