Quantcast
Channel: Auvik
Browsing all 721 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to Draw Effective Network Diagrams (Infographic)

Good network diagrams aren’t hard to make, but they can be distressingly rare. Even network engineers with years of experience often make diagrams that are jumbled and hard to understand. To help,...

View Article


Image may be NSFW.
Clik here to view.

Is it Time to Retire Your VPN?

VPNs: not just sponsors of YouTube tech videos! If you think of Virtual Private Networks (VPNs) as data privacy tools or a way to access geographically restricted content, then the idea they’re dying...

View Article


Top 5 tips for interviewing at Auvik

Hi there! I’m Dan, a Talent Acquisition Specialist at Auvik, and I joined the team in January 2022. If you’re interviewing for a role, you’ll likely hear from me! Interviewing at Auvik is a two-way...

View Article

Image may be NSFW.
Clik here to view.

What is ITAM? Guide to IT Asset Management

In the business world, information technology (IT) is everything. Without it, companies would struggle to keep track of their data and operations. However, managing all of a company’s IT assets can be...

View Article

Image may be NSFW.
Clik here to view.

Meet Our International Engineering Team

Being part of an internationally-distributed team always comes with unique challenges—things like coordinating across time zones, staying connected, and navigating cross-cultural differences. It takes...

View Article


Image may be NSFW.
Clik here to view.

Meet Our International Engineering Team

Being part of an internationally-distributed team always comes with unique challenges—things like coordinating across time zones, staying connected, and navigating cross-cultural differences. It takes...

View Article

Image may be NSFW.
Clik here to view.

When End Users Attack: Tips for Fixing a Hostile Work Environment

Hostile work environments are a real problem in tech and can be a significant driver of IT job stress. This is particularly true for IT helpdesk and support roles. Helpdesk agents often complain of...

View Article

Embracing Shadow IT (Video)

The post Embracing Shadow IT (Video) appeared first on Auvik Networks Inc..

View Article


Image may be NSFW.
Clik here to view.

Build Your Tech Sales Career at Auvik

I’ve been a sales leader for longer than I want to admit, with three of those years here at Auvik where I’m the VP of Sales and Business Development. The most important aspect of my time at Auvik is...

View Article


Image may be NSFW.
Clik here to view.

Network Basics: Spanning Tree Protocol

For new networkers, Spanning Tree Protocol (STP) can be an intimidating topic. Many old-timers speak of spanning-tree in ominous tones, recounting the time when a “spanning-tree loop” brought down the...

View Article

Image may be NSFW.
Clik here to view.

Network Configuration Management: The Benefits & Importance

Configuration management is one of those network management topics people often neglect. It’s not very exciting—but it’s incredibly important. Administrators rely on network configuration management in...

View Article

Image may be NSFW.
Clik here to view.

The Auvik Network Device Buyer’s Guide

Buying the right network devices is an essential part of network design, and can have an impact throughout the network lifecycle. Get it right, and your network is high-performing, easy to...

View Article

Image may be NSFW.
Clik here to view.

Network Basics: What Is SNMP and How Does It Work?

What is Simple Network Management Protocol (SNMP)? Simple Network Management Protocol (SNMP) is a way for different devices on a network to share information with one another. It allows devices to...

View Article


Image may be NSFW.
Clik here to view.

Regex 101 for Network Admins

What is Regex? Regex—short for regular expressions—is a way to describe a search pattern. They can be used to find a text pattern or string (character sequence) within a larger body of text, such as a...

View Article

Our Engineering Tech Stack and How it Evolves

I’m a Technical Director at Auvik, and as an engineering leader, I see my job as helping make developers’ lives easier. I want to set my team up for success and create a supportive environment to...

View Article


Embracing Shadow IT (Video)

Shadow IT. Many IT pros shudder at the term. For those who may not be familiar, shadow IT refers to the devices, systems, and applications on your network that are not under your direct...

View Article

Network Redundancy and Why It Matters

What is network redundancy? Network redundancy is process of providing multiple paths for traffic, so that data can keep flowing even in the event of a failure. Put simply: more redundancy equals more...

View Article


Image may be NSFW.
Clik here to view.

Proactive Healthcare Network Monitoring: The Importance of Early Detection

Healthcare IT is simultaneously one of the most complex and sensitive networking systems there are. Aside from the wealth of confidential data they process and store, these networks must be highly...

View Article

Image may be NSFW.
Clik here to view.

Going Online Like it’s 1989: Using an Atari Portfolio as a Terminal Emulator

Oops! You messed up. Big time. You’re working on a network device, making some major configuration changes. As soon as you hit enter, you lose communication with the device. You need to console in, but...

View Article

Image may be NSFW.
Clik here to view.

Agent vs Agentless Monitoring: Which is Best?

Agent-based and agentless monitoring are the two main approaches network monitoring tools use to capture and report data from network devices. As the names suggest, the difference between the two is...

View Article
Browsing all 721 articles
Browse latest View live