Careers at a Crossroad: Staying Technical vs. Heading into Management
There’s a point in every IT professionals’ career where they inevitably ask themselves,“do I want to stay technical, or get into management networking jobs?” Sometimes this point occurs when they find...
View ArticleSNMPv2 vs. SNMPv3: An SNMP Versions Comparison Table
By 2024 there’ll be an estimated 83 billion connected devices on our networks. All these devices, made by a wide variety of vendors, use different types of software, making everything more complicated...
View ArticleThe What and The Why of TLS Inspection
Connecting to nearly any web page today, you’re more often to see a URL that begins with “https://” instead of “http://”. Wondered what the “S” is for? It stands for “secure”, but more importantly, it...
View ArticleWhat is Network Optimization? 8 Reliable Techniques
What is network optimization? Network optimization is a set of tools and techniques used to improve network performance and reliability. As such, it’s not a “one and done” operation but an ongoing...
View Article3 Ways to Use Auvik APIs for External Reporting
Every IT team has its own strategies, goals and objectives to help move themselves and their company forward as a whole. As part of this, management relies on the metrics and data reports from their...
View ArticleWhat is Network Visualization?
Network visualization is the practice of creating and displaying graphical representations of network devices, network metrics, and data flows. In plain speak, it’s the visual side of network...
View ArticleClassic Tech in 2021: Going Online Like it’s 1979
My first love was an Atari 800. First released in 1979, with staggering 48k of memory and a 1.79MHz 6502C processor, it was, for the time, a beast. I received my Atari 800 in 1982 as a rather generous...
View ArticleObservability vs. Monitoring: What’s the Difference?
People often conflate monitoring and observability, and I can’t blame them. Marketers often use the terms interchangeably. However, monitoring and observability are two fundamentally different but...
View ArticleIt’s Here! The Wave of Nostalgia: Summer Treat Wave 2021
Every year, for about 10 days in July, we show our support for the incredible community of IT pros by co-hosting the coolest of sweepstakes: Summer Treat Wave! This year, we wanted to do more…...
View ArticleDealing with Rogue DHCP Servers
You’ve probably happened across this little conundrum at least once or twice—troubleshooting a network issue where users are connecting to the network, but they aren’t able to access any resources or...
View ArticleWhat is Hierarchical Network Design?
A network must align with the existing requirements of an organization, but it must also be flexible enough to easily integrate new technologies, which is where hierarchical network design comes in....
View ArticleClassful and Classless Addressing Explained
If you’ve ever been in charge of IP address assignment, you’ve come across the terms classful and classless addressing. If you haven’t, the main difference between classful and classless addressing is...
View ArticlePreventing Firmware Attacks
Attacks on your network come in many forms. From common denial of service attacks to more complex man-in-middle hijacks, malicious actors are constantly trying to find vulnerabilities in your network...
View ArticleYour Guide to IP Address Management
IP address management (IPAM) has always been an essential component to ensuring the effective operation of any network. And with the proliferation of connected devices, many making their way into and...
View ArticleUsing DNS Filtering to your Advantage
In early July, I had quite the adventure. The personal watercraft I was on broke down and started taking on water, so I bailed and swam to shore. The good news is that I made it, and the person I was...
View ArticleThe Auvik Guide to Figuring Out What’s Hogging Your Bandwidth
Bandwidth usage issues can be one of those exasperating problems that don’t always reveal themselves right away. Because what’s hogging your bandwidth might not be apparent just by looking at basic...
View ArticleAuvik is Doomed
If an Atari 800 is what got me into computers, then it was DOOM that got me into networking. Sounds strange right? But prior to DOOM (1993), I had no interest in adding any network cards to my MS-DOS...
View ArticleThe Auvik Guide to Basic Switch Configuration
Though I’m a big believer in the importance of network configuration management, even I’ll admit that network switch configuration from a command-line interface (CLI) is still one of the most...
View ArticleWhat’s in a Name? “Network Specialist” vs. “Network Engineer”
The meanings behind job titles can be an elusive thing in that they might only make sense to the people actually in the roles. Take networking jobs. It’s pretty common for people to think some titles...
View ArticleThe 95th Percentile: How to Manage Capacity Before You Run Out
One of the largest challenges with network bandwidth metering is the way traffic flows. Traffic comes in bursts. It’s never a constant, predictable stream of data you can measure once, spec hardware...
View Article