Quantcast
Channel: Auvik
Browsing all 721 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Careers at a Crossroad: Staying Technical vs. Heading into Management

There’s a point in every IT professionals’ career where they inevitably ask themselves,“do I want to stay technical, or get into management networking jobs?” Sometimes this point occurs when they find...

View Article


Image may be NSFW.
Clik here to view.

SNMPv2 vs. SNMPv3: An SNMP Versions Comparison Table

By 2024 there’ll be an estimated 83 billion connected devices on our networks. All these devices, made by a wide variety of vendors, use different types of software, making everything more complicated...

View Article


Image may be NSFW.
Clik here to view.

The What and The Why of TLS Inspection

Connecting to nearly any web page today, you’re more often to see a URL that begins with “https://” instead of “http://”. Wondered what the “S” is for? It stands for “secure”, but more importantly, it...

View Article

Image may be NSFW.
Clik here to view.

What is Network Optimization? 8 Reliable Techniques

What is network optimization? Network optimization is a set of tools and techniques used to improve network performance and reliability. As such, it’s not a “one and done” operation but an ongoing...

View Article

Image may be NSFW.
Clik here to view.

3 Ways to Use Auvik APIs for External Reporting

Every IT team has its own strategies, goals and objectives to help move themselves and their company forward as a whole. As part of this, management relies on the metrics and data reports from their...

View Article


Image may be NSFW.
Clik here to view.

What is Network Visualization?

Network visualization is the practice of creating and displaying graphical representations of network devices, network metrics, and data flows. In plain speak, it’s the visual side of network...

View Article

Image may be NSFW.
Clik here to view.

Classic Tech in 2021: Going Online Like it’s 1979

My first love was an Atari 800. First released in 1979, with staggering 48k of memory and a 1.79MHz 6502C processor, it was, for the time, a beast. I received my Atari 800 in 1982 as a rather generous...

View Article

Observability vs. Monitoring: What’s the Difference?

People often conflate monitoring and observability, and I can’t blame them. Marketers often use the terms interchangeably. However, monitoring and observability are two fundamentally different but...

View Article


Image may be NSFW.
Clik here to view.

It’s Here! The Wave of Nostalgia: Summer Treat Wave 2021

Every year, for about 10 days in July, we show our support for the incredible community of IT pros by co-hosting the coolest of sweepstakes: Summer Treat Wave! This year, we wanted to do more…...

View Article


Image may be NSFW.
Clik here to view.

Dealing with Rogue DHCP Servers

You’ve probably happened across this little conundrum at least once or twice—troubleshooting a network issue where users are connecting to the network, but they aren’t able to access any resources or...

View Article

Image may be NSFW.
Clik here to view.

What is Hierarchical Network Design?

A network must align with the existing requirements of an organization, but it must also be flexible enough to easily integrate new technologies, which is where hierarchical network design comes in....

View Article

Image may be NSFW.
Clik here to view.

Classful and Classless Addressing Explained

If you’ve ever been in charge of IP address assignment, you’ve come across the terms classful and classless addressing. If you haven’t, the main difference between classful and classless addressing is...

View Article

Image may be NSFW.
Clik here to view.

Preventing Firmware Attacks

Attacks on your network come in many forms. From common denial of service attacks to more complex man-in-middle hijacks, malicious actors are constantly trying to find vulnerabilities in your network...

View Article


Your Guide to IP Address Management

IP address management (IPAM) has always been an essential component to ensuring the effective operation of any network. And with the proliferation of connected devices, many making their way into and...

View Article

Image may be NSFW.
Clik here to view.

Using DNS Filtering to your Advantage

In early July, I had quite the adventure. The personal watercraft I was on broke down and started taking on water, so I bailed and swam to shore. The good news is that I made it, and the person I was...

View Article


Image may be NSFW.
Clik here to view.

The Auvik Guide to Figuring Out What’s Hogging Your Bandwidth

Bandwidth usage issues can be one of those exasperating problems that don’t always reveal themselves right away. Because what’s hogging your bandwidth might not be apparent just by looking at basic...

View Article

Image may be NSFW.
Clik here to view.

Auvik is Doomed

If an Atari 800 is what got me into computers, then it was DOOM that got me into networking. Sounds strange right? But prior to DOOM (1993), I had no interest in adding any network cards to my MS-DOS...

View Article


Image may be NSFW.
Clik here to view.

The Auvik Guide to Basic Switch Configuration

Though I’m a big believer in the importance of network configuration management, even I’ll admit that network switch configuration from a command-line interface (CLI) is still one of the most...

View Article

Image may be NSFW.
Clik here to view.

What’s in a Name? “Network Specialist” vs. “Network Engineer”

The meanings behind job titles can be an elusive thing in that they might only make sense to the people actually in the roles. Take networking jobs. It’s pretty common for people to think some titles...

View Article

Image may be NSFW.
Clik here to view.

The 95th Percentile: How to Manage Capacity Before You Run Out

One of the largest challenges with network bandwidth metering is the way traffic flows. Traffic comes in bursts. It’s never a constant, predictable stream of data you can measure once, spec hardware...

View Article
Browsing all 721 articles
Browse latest View live