Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Building networks for AI workloads
Conventional and high-performance computing networks cannot adequately support AI workloads, so network engineers must build specialized networks to accommodate their massive size. Continue Reading
The effects of network downtime and ways to fix it
Causes of network downtime include human error, misconfigurations and security threats. Experts weigh in on the consequences of network downtime, as well as ways to fix it. Continue Reading
How to handle environmental regulations and green networking
Green networking is achievable if network managers ensure devices and supporting systems are energy-efficient and comply with established environmental regulations. Continue Reading
-
How cloud drives changes to network licensing
The cloud's effect on application management and licensing is expected to shift from end-user applications to SDN concepts. Say goodbye to perpetual licensing. Continue Reading
How to avoid internet black holes for the network
Black holes in the network disrupt connectivity and compromise data integrity. Network monitoring, team collaboration and routing optimization help minimize the negative effects. Continue Reading
How to ensure optimal network workload placement
Network and cybersecurity requirements are the most important considerations when designing how to deploy new network workloads across the enterprise.Continue Reading
Using microservices and containers in network automation
Networking can benefit from the modularity of containers. This guide helps network teams navigate the integration of microservices and containers into network automation workflows.Continue Reading
SASE drives network and security team collaboration
Successful SASE implementation requires network and security team collaboration. Research from EMA reveals shared responsibilities and multivendor strategies enhance teamwork.Continue Reading
How NetOps supports digital transformation
NetOps uses automation and intent-based networking tools to streamline digital transformation and ensure accurate and flexible network services.Continue Reading
A network compliance checklist for remote work
This network compliance checklist for remote work provides best practices on establishing remote policies and procedures, help desk support and data backup, among other steps.Continue Reading
-
NetSecOps best practices for network engineers
Network engineers increasingly need to align their duties with security, such as implementing continuous monitoring, deploying threat intelligence and collaborating with security.Continue Reading
How ZTNA protects against internal network threats
ZTNA has grown in popularity as a method to enable remote access and mitigate security risks, but businesses can also use ZTNA to protect against internal threats inside a network.Continue Reading
How to close the networking skills gap
The networking skills gap stems from tech shifts, generational turnover and hiring complexities. Bridge the gap with skills gained through study, training and employer support.Continue Reading
Effective soft skills for network engineers
Soft skills such as empathy, active listening and problem-solving can be valuable assets to network engineers who interact with nontechnical business stakeholders.Continue Reading
Best practices to install network hardware
Network practitioners might get tangled in the confusion of wires, switches and other hardware components. A networking expert offers best practices for network hardware.Continue Reading
8 network tasks administrators can do quicker from the CLI
Admins can use the command-line interface to manage network tasks. Learn how to streamline automation, troubleshoot networks and manage services on Linux, macOS and Windows.Continue Reading
5 phases to build a network automation architecture
The implementation of a network automation architecture involves several elements, including a core orchestration engine, assorted databases and proper network testing.Continue Reading
5G Advanced features include accurate timing, AI support
5G Advanced is the latest 5G specification, aiming to deliver enhanced massive MIMO, 5G integration with AI and accurate location positioning. Here's more about recent developments.Continue Reading
How to simplify network operations
Network challenges include visibility, scalability and security. NetOps teams should follow management best practices and consider cloud networking to simplify operations.Continue Reading
5 network requirements for cloud computing
Network and cloud teams should consider factors such as bandwidth and latency optimization, security, network redundancy, QoS and network automation in their cloud strategies.Continue Reading
APIs integral to a successful DDI strategy
Research showed DDI success correlated with successful APIs, but few organizations feel satisfied with their API quality. Learn how to mitigate the challenges of DDI APIs.Continue Reading
What to know about UDP vulnerabilities and security
UDP is a simple protocol, but it has inherent vulnerabilities that make it prone to attacks, such as limited packet verification, IP spoofing and DDoS attacks.Continue Reading
Use cURL and Wget to download network files from CLI
Web browsers aren't the only tools that use HTTP to download files. Command-line tools, such as cURL and Wget, can download resources like VM images, configuration files and updates.Continue Reading
How a DDI platform supports IP-based network management
A DDI platform simplifies IP network management in the cloud networking era. But collaboration among networking and other IT teams is crucial amid ongoing challenges.Continue Reading
Building data center networks for GenAI fabric enablement
Network scalability, throughput and orchestration are some of the key elements that enterprises need to consider as they build out generative AI data centers.Continue Reading
Network considerations for cloud migration to data center
Performance, security concerns and high costs are factors that prompt organizations to migrate workloads from cloud to data centers. Here's what to consider.Continue Reading
Best practices for network automation with Python
Python libraries, version control, documentation and object-oriented programming provide helpful best practices for network engineers tackling network automation with Python.Continue Reading
How enterprises can migrate from IPv4 to IPv6
Both IPv4 and IPv6 are suitable for enterprise networks, but organizations that want to switch over to the latest IP address format can follow a few methods to make the transition.Continue Reading
How to use NAPALM for efficient network management
NAPALM is a flexible Python library that can integrate with Ansible modules, support multivendor environments, and ease network management and automation strategies.Continue Reading
How to modernize networks with sustainability in mind
A network modernization project is a good time to consider sustainability initiatives, such as using energy-efficient devices and renewable energy sources.Continue Reading
How to capture and analyze traffic with tcpdump
Network administrators use tcpdump to analyze traffic in Linux systems. Learn how to install and use tcpdump, as well as examine the results of captured traffic.Continue Reading
Types of Nmap scans and best practices
Nmap scanning helps network teams with network reconnaissance and vulnerability discovery. Common types of scans include TCP SYN, OS detection, vulnerability and version detection.Continue Reading
Automation, orchestration software fuel network modernization
In some ways, network modernization means cutting manual configuration errors and relying on automation and orchestration to achieve unified network management.Continue Reading
SmartNICs and the need for evolving network infrastructure
SmartNICs can meet the increasing demand for high performance, low latency and secure data transfer. But the implementation of smartNICs requires reliable network infrastructure.Continue Reading
How to interact with network APIs using cURL, Postman tools
Network engineers can use cURL and Postman tools to work with network APIs. Use cases include getting interface information and manipulating device configuration data.Continue Reading
9 ways to make network modernization work
More cloud computing, container networking and network capacity are some of the ways businesses could modernize their networks. AI and automation can help, too.Continue Reading
7 factors to consider in network redundancy design
Network pros should consider multiple factors when adding redundancy to network design, including network equipment, protocols, backup, processing and subnet connections.Continue Reading
6 steps for rapid geographic network segmentation
When segmenting network operations in certain parts of the world, modular network design and geographic domain definition are two vital elements to consider.Continue Reading
A deep dive into SD-WAN troubleshooting and monitoring
Whether in the throes of SD-WAN issues or preparing for the future, network teams should have practical steps to follow when troubleshooting SD-WAN environments.Continue Reading
5 steps to migrate from MPLS to SD-WAN
To migrate from MPLS to SD-WAN, you need a plan. Use these five steps as a guideline to avoid MPLS contract disasters, unexpected costs and delayed installation.Continue Reading
Follow these 9 steps for SD-WAN testing before deployment
Before an SD-WAN implementation, you'll want to run the system through a battery of tests to check for things like failover, packet delivery and traffic segregation.Continue Reading
Network security management best practices and challenges
The rise of distributed networks, mobile devices and cyber threats has spurred the ongoing convergence of network management and network security processes.Continue Reading
Unify NetOps and DevOps to improve load-balancing strategy
Research showed that many enterprises struggle with their load-balancing strategies. Unifying NetOps and DevOps teams might help simplify some of this complexity.Continue Reading
3 important SD-WAN security considerations and features
Device onboarding, control plane security and data plane security are three crucial SD-WAN security considerations enterprises should research when choosing an SD-WAN vendor.Continue Reading
How cloud-managed Wi-Fi simplifies policy and AP controls
Cloud-managed Wi-Fi provides IT groups with several benefits, including policy enforcement, network management and consistent AP configuration across multiple sites.Continue Reading
The benefits of network asset management software
Network asset management software helps network teams keep track of network devices and software, ensuring timely upgrades, accurate inventory and updated documentation.Continue Reading
Wireless network capacity planning and requirements
When planning wireless network capacity needs, tally your total endpoints, monitor application bandwidth usage and consider future growth.Continue Reading
Ensure network resilience in a network disaster recovery plan
A network disaster recovery plan doesn't always mean network resilience. Learn how factors like funding, identifying potential risks and constant updates make a difference.Continue Reading
Best practices for enterprise CBRS deployment
Enterprises can use CBRS spectrum to deploy private cellular networks that offer reliable and predictable coverage. Learn about installation, AP mounting and device compatibility.Continue Reading
9 steps for wireless network planning and design
Wireless network planning may appear daunting. But IT teams can tackle this task in nine key phases, which include capacity, redundancy and site surveys.Continue Reading
How to set up a VPN for enterprise use
VPNs are nearly ubiquitous, but does your organization know how to deploy one? Learn about use cases, requirements, deployment options and best practices for VPN deployment.Continue Reading
Best practices for network documentation and auditing
Network documentation helps enterprises resolve problems more quickly and create more reliable networks. But documentation needs to include various components to be effective.Continue Reading
What to include in a network disaster recovery plan checklist
A network disaster recovery plan should include components like documentation, emergency contacts, step-by-step procedures, provider and vendor details, backup info and more.Continue Reading
4 tips for network capacity planning and provisioning
To avoid network overprovisioning, teams should review baselines and roadmaps, assess limitations and consider business strategy changes when focusing on network capacity planning.Continue Reading
Techniques to get started with green networking
'Emerging Green Technologies' details how technology is a flexible tool organizations can use to make business operations more sustainable. Here's how to make your network green.Continue Reading
8 tips to optimize network bandwidth and performance
Despite bandwidth calculations and capacity planning, networks often fail to consume bandwidth efficiently. Here are some tips to optimize bandwidth usage in enterprise networks.Continue Reading
20 systemctl commands for system and service management
System and service management are vital to ensure customer satisfaction and service delivery. These systemctl commands can help ease those management tasks for admins.Continue Reading
How enterprise networks use WAN virtualization
SD-WAN is the most common form of WAN virtualization. But virtual WAN strategies are evolving to include software-defined perimeter and cloud concepts.Continue Reading
How to secure NetOps initiatives using Agile methodology
As more NetOps teams implement Agile methods, network and security testing must be part of a holistic approach that involves developers, networking and security teams working together.Continue Reading
Business benefits of an Agile networking approach
Enterprises that embed an Agile approach in their networking strategies could see benefits like better network performance, enhanced data security and faster rollouts of network services.Continue Reading
7 steps of an SD-WAN implementation
Organizations interested in implementing SD-WAN need to collect site profiles and requirements, analyze their options, perform tests and evaluate the results.Continue Reading
Hybrid work requires enterprise Wi-Fi for the home
Many offices are still closed, and employees continue to work in home environments. Wi-Fi 6 supports this model of work more so than any previous standard of wireless.Continue Reading
Integrating zero-trust practices into private 5G networks
One of the first steps in deploying a technology is protecting it from potential security threats. Learn how to secure a private 5G network with zero-trust security practices.Continue Reading
How to implement network segmentation for better security
For a network segmentation strategy to be effective and improve security, network teams need to create detailed security policies, identify each resource and use allowlists.Continue Reading
Explore 9 essential elements of network security
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.Continue Reading
Enable automation with a network digital twin
Digital twin technology is a hot topic in IoT systems, but IT teams can also invest in digital twins to improve network visibility, plan for changes and enable automation.Continue Reading
Cable management software enhances documentation, visibility
Even a timeworn networking discipline like cabling can undergo a renaissance. See how cable management software helps organizations visualize network connectivity.Continue Reading
4 ideas for network cable management best practices
When organizing cable clutter, network engineers should follow some common best practices, including the use of cable labels, cable ties and proper documentation.Continue Reading
4 categories of network monitoring
Network teams should routinely monitor the states of their networks. The type of network monitoring strategy used depends on the needs of the organization.Continue Reading
6 Wi-Fi design best practices for enterprise networks
Designing Wi-Fi networks doesn't need to be overly complicated. Site surveys and walks around the environment are simple steps teams can take to assess coverage requirements.Continue Reading
Automate network validation for smoother changes
Teams can verify network state before and after network changes to ensure smooth deployment of the changes. Automating those pre- and post-change checks can reduce errors and outages.Continue Reading
AIOps network management requires vendor-buyer teamwork
Before buying AIOps tools, network managers should work closely with vendors to ensure they collect the correct network data and use relevant algorithms.Continue Reading
2021 networking trends for a post-pandemic enterprise
In 2020, the pandemic threw the best-laid IT plans into chaos. As enterprises find their footing again, here are four network trends defining the second half of 2021.Continue Reading
A guide to network lifecycle management
Network pros should follow a network lifecycle to monitor, manage and implement changes in their networks, regardless of whether it's a plan, build and manage framework or PPDIOO.Continue Reading
5 steps to achieve network infrastructure modernization
All networks may be different, but companies have similar goals when they look to upgrade their network infrastructures. Assessing current designs is just the first step.Continue Reading
Enterprise RF spectrum management best practices
Effective spectrum management requires coordination from company departments to follow certain policies before introducing wireless devices to the enterprise.Continue Reading
How to prepare networks for the return to office
Network teams should evaluate their UC strategies, VPN capacity and even air conditioning requirements as employees start to return to office environments.Continue Reading
Network capacity planning best practices for return to office
As workers grow comfortable enough to return to the office, network teams will need to plan in advance to make sure the network is ready and ensure proper performance.Continue Reading
Modern network infrastructure design taps security, flexibility
As workers return to office settings, organizations may have to update their on-premises network infrastructure design to improve scalability and connectivity.Continue Reading
How cloud-based network monitoring tools expand visibility
Organizations have become even more distributed and virtual in the wake of COVID-19. Cloud-based network monitoring is well suited to keep tabs on network performance.Continue Reading
Best practices for VPN traffic monitoring
VPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead.Continue Reading
5 basic steps for effective cloud network security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe.Continue Reading
Black network engineers juggle building networks, being seen
2020 didn't transform diversity and inclusion in companies, according to some Black network engineers. But diversity in their careers and networks goes beyond hiring practices.Continue Reading
Perform a network health check with network testing
Network engineers can use myriad network testing approaches to ensure their networks are efficient and reliable. The key is incorporating them into a regular maintenance cycle.Continue Reading
Pandemic pushes enterprise connectivity to take a new path
COVID-19 delivered a connectivity shock to businesses. But savvy network execs were primed -- and are now showing the way forward in 2021 with SD-WAN, 5G and Wi-Fi 6.Continue Reading
Key tasks in a network maintenance checklist
Network technologies and devices might change over time, but certain maintenance tasks, such as data backup and device inventory, will always be essential for network teams.Continue Reading
NOC performance metrics for optimal operation
NOC best practices include using standardized network designs and automation. But don't forget to identify performance metrics that help track and measure operational success.Continue Reading
7 steps for a network and IT security foundation
Enterprises should make it a habit to review their IT security systems, following steps that include network segmentation, multifactor authentication and security education.Continue Reading
A work-from-home reimbursement policy for network tech
A work-from-home reimbursement plan should drive better network and internet connectivity rates for remote workers and not just offset employees' existing bills.Continue Reading
How to secure remote access for WFH employees in 4 steps
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers.Continue Reading
Top tips to provide IT support for remote workers
To support employees working from home, network teams should carefully monitor VPN traffic, review firewall rules and rely on remote access support software.Continue Reading
Cloud networking complexity includes visibility and security
Enterprises are deploying more workloads in cloud environments. But the visibility, security and management required for those extensions of IT infrastructure can get complicated.Continue Reading
IT groups abandon DIY SD-WAN; prefer managed, hybrid model
Enterprises don't want DIY SD-WAN. Instead, they prefer managed SD-WAN, but they also don't want to outsource all SD-WAN operations to a service provider.Continue Reading
Considerations for SASE management and troubleshooting
SASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies.Continue Reading
Refreshing look at Wi-Fi 6 benefits, preparations
Wi-Fi 6's benefits are real, and most organizations will eventually upgrade to the latest and greatest standard. When and how they'll do so is more complicated.Continue Reading
Myths and realities of a Wi-Fi 6 upgrade
Despite the promise of high data rates, longer client battery life and more efficient radio techniques, enterprises need to weigh Wi-Fi 6's limitations.Continue Reading
Setting up and using a home VLAN to segment network traffic
Virtual LANs can help homeowners segment their network traffic for enhanced control and security. Network analyst John Fruehe takes you inside his home VLANs.Continue Reading
Ensure network resilience with redundancy and skills
Ensuring network resilience doesn't just mean building redundancy in network infrastructure. It should also include planning contingencies for people and skills.Continue Reading
Cloud automation use cases for managing and troubleshooting
Cloud automation use cases highlight the benefits these tools can provide to companies evaluating how best to manage and troubleshoot their cloud connections.Continue Reading
Implementing an SDP architecture for added network security
A key component of a software-defined perimeter requires client authentication before connection, while also making a network's internals invisible to outsiders.Continue Reading