How to Draw Effective Network Diagrams (Infographic)
Good network diagrams aren’t hard to make, but they can be distressingly rare. Even network engineers with years of experience often make diagrams that are jumbled and hard to understand. To help,...
View ArticleIs it Time to Retire Your VPN?
VPNs: not just sponsors of YouTube tech videos! If you think of Virtual Private Networks (VPNs) as data privacy tools or a way to access geographically restricted content, then the idea they’re dying...
View ArticleTop 5 tips for interviewing at Auvik
Hi there! I’m Dan, a Talent Acquisition Specialist at Auvik, and I joined the team in January 2022. If you’re interviewing for a role, you’ll likely hear from me! Interviewing at Auvik is a two-way...
View ArticleWhat is ITAM? Guide to IT Asset Management
In the business world, information technology (IT) is everything. Without it, companies would struggle to keep track of their data and operations. However, managing all of a company’s IT assets can be...
View ArticleMeet Our International Engineering Team
Being part of an internationally-distributed team always comes with unique challenges—things like coordinating across time zones, staying connected, and navigating cross-cultural differences. It takes...
View ArticleMeet Our International Engineering Team
Being part of an internationally-distributed team always comes with unique challenges—things like coordinating across time zones, staying connected, and navigating cross-cultural differences. It takes...
View ArticleWhen End Users Attack: Tips for Fixing a Hostile Work Environment
Hostile work environments are a real problem in tech and can be a significant driver of IT job stress. This is particularly true for IT helpdesk and support roles. Helpdesk agents often complain of...
View ArticleEmbracing Shadow IT (Video)
The post Embracing Shadow IT (Video) appeared first on Auvik Networks Inc..
View ArticleBuild Your Tech Sales Career at Auvik
I’ve been a sales leader for longer than I want to admit, with three of those years here at Auvik where I’m the VP of Sales and Business Development. The most important aspect of my time at Auvik is...
View ArticleNetwork Basics: Spanning Tree Protocol
For new networkers, Spanning Tree Protocol (STP) can be an intimidating topic. Many old-timers speak of spanning-tree in ominous tones, recounting the time when a “spanning-tree loop” brought down the...
View ArticleNetwork Configuration Management: The Benefits & Importance
Configuration management is one of those network management topics people often neglect. It’s not very exciting—but it’s incredibly important. Administrators rely on network configuration management in...
View ArticleThe Auvik Network Device Buyer’s Guide
Buying the right network devices is an essential part of network design, and can have an impact throughout the network lifecycle. Get it right, and your network is high-performing, easy to...
View ArticleNetwork Basics: What Is SNMP and How Does It Work?
What is Simple Network Management Protocol (SNMP)? Simple Network Management Protocol (SNMP) is a way for different devices on a network to share information with one another. It allows devices to...
View ArticleRegex 101 for Network Admins
What is Regex? Regex—short for regular expressions—is a way to describe a search pattern. They can be used to find a text pattern or string (character sequence) within a larger body of text, such as a...
View ArticleOur Engineering Tech Stack and How it Evolves
I’m a Technical Director at Auvik, and as an engineering leader, I see my job as helping make developers’ lives easier. I want to set my team up for success and create a supportive environment to...
View ArticleEmbracing Shadow IT (Video)
Shadow IT. Many IT pros shudder at the term. For those who may not be familiar, shadow IT refers to the devices, systems, and applications on your network that are not under your direct...
View ArticleNetwork Redundancy and Why It Matters
What is network redundancy? Network redundancy is process of providing multiple paths for traffic, so that data can keep flowing even in the event of a failure. Put simply: more redundancy equals more...
View ArticleProactive Healthcare Network Monitoring: The Importance of Early Detection
Healthcare IT is simultaneously one of the most complex and sensitive networking systems there are. Aside from the wealth of confidential data they process and store, these networks must be highly...
View ArticleGoing Online Like it’s 1989: Using an Atari Portfolio as a Terminal Emulator
Oops! You messed up. Big time. You’re working on a network device, making some major configuration changes. As soon as you hit enter, you lose communication with the device. You need to console in, but...
View ArticleAgent vs Agentless Monitoring: Which is Best?
Agent-based and agentless monitoring are the two main approaches network monitoring tools use to capture and report data from network devices. As the names suggest, the difference between the two is...
View Article