Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
A network compliance checklist for remote work
This network compliance checklist for remote work provides best practices on establishing remote policies and procedures, help desk support and data backup, among other steps. Continue Reading
NetSecOps best practices for network engineers
Network engineers increasingly need to align their duties with security, such as implementing continuous monitoring, deploying threat intelligence and collaborating with security. Continue Reading
How to close the networking skills gap
The networking skills gap stems from tech shifts, generational turnover and hiring complexities. Bridge the gap with skills gained through study, training and employer support. Continue Reading
-
Effective soft skills for network engineers
Soft skills such as empathy, active listening and problem-solving can be valuable assets to network engineers who interact with nontechnical business stakeholders. Continue Reading
What's the difference between Wi-Fi and the internet?
The internet connects users to the outside world. Wi-Fi connects devices within a business, which then connect to other network devices and out to the internet. Continue Reading
5 techniques to debug network issues in Linux and Windows
Debugging a network issue should start with basic troubleshooting. If that doesn't fix it, admins should check, verify and configure connections to the client, server and network.Continue Reading
3 ways to troubleshoot using Wireshark and tcpdump
Protocol analyzer tools, such as Wireshark and tcpdump, can help network administrators identify protocols in the network, analyze network performance and discover network devices.Continue Reading
5 common SD-WAN challenges and how to prepare for them
SD-WAN technology has its fair share of risk factors, some of which include cost reduction and management. Find out how your IT team can prepare for these challenges.Continue Reading
Beyond metrics, network SLAs should measure business ops
Enterprises need to ensure network service-level agreements provide a comprehensive view of network service performance to support business operations.Continue Reading
4 ways to reduce network power consumption
A heavy reliance on the network can increase energy use across businesses. Here are some best practices network teams can follow to reduce power consumption.Continue Reading
-
16 PowerShell commands for network troubleshooting
These 16 Windows PowerShell cmdlets, including Get-NetIPAddress and Test-Connection, help network administrators troubleshoot their network environments.Continue Reading
Troubleshoot wireless network connection problems in 10 steps
When troubleshooting wireless network issues, several scenarios can emerge. But valuable end-user insights can help network administrators root out problems.Continue Reading
How to perform VLAN troubleshooting
Common VLAN issues include physical connectivity problems, duplex mismatches, forwarding loops, unicast flooding and Layer 3 configuration errors. These troubleshooting steps can help.Continue Reading
How AI and ML in Open RAN alleviates network complexity
Incorporating AI and ML into Open RAN networks could help MNOs simplify operations and deliver 5G enhanced capabilities of high bandwidth, low latency and quality of service.Continue Reading
DNS server troubleshooting for Linux and Windows
Steps in DNS server troubleshooting include checking the DNS status, looking at zone configurations and evaluating logs. Follow these best practices for Windows and Linux servers.Continue Reading
Why modern networks require AIOps
Distributed IT environments increasingly require automated networks, and AIOps can provide the answer for network operations teams dealing with increased complexity, starting now.Continue Reading
Troubleshoot name resolution on Windows, Linux and macOS
Network administrators can troubleshoot name resolution using a variety of methods, including ping, nslookup and PowerShell cmdlets. Here are some troubleshooting best practices.Continue Reading
Challenges, best practices for network operations management
Traditional network operations teams are struggling with several aspects of network management. Experts weigh in on why, and what to do to simplify operations.Continue Reading
5 network virtualization challenges and how to solve them
The challenges of network virtualization include an overhaul of network architecture, thorough staff training and breaking down knowledge silos among IT departments.Continue Reading
Network management tool sprawl plagues IT organizations
More network management tools often lead to manual errors and network trouble. Instead, consider tool integration and how existing tools can fix new problems.Continue Reading
9 most common network issues and how to solve them
Slow network speeds, weak Wi-Fi signals and damaged cabling are just some of the most common network connection issues that IT departments need to troubleshoot.Continue Reading
How IT can provide home Wi-Fi help for remote workers
When assisting home-based workers with their Wi-Fi woes, be sure to assess their internet connectivity and even consider deploying access points to their homes.Continue Reading
7 tips for network pros navigating the global chip shortage
With a global chip shortage raging, lead times on switches, routers, firewalls and access points have ballooned. These seven strategies can help network pros weather the crisis.Continue Reading
Troubleshooting a DHCP server failure
DHCP errors often result from DHCP server failure, a lack of available IP addresses and network failure. But troubleshooting steps vary depending on the error symptoms and causes.Continue Reading
How enterprises can close 5 major SASE gaps
Despite five major gaps that hamper SASE implementation, Gartner recommended enterprises should plan their migration timeline and aim to consolidate to a single vendor.Continue Reading
How to use two VPN connections at the same time
Network managers and users might opt to set up two VPN connections at the same time, from the same remote device. But that might not be possible -- or safe.Continue Reading
8 remote access security risks and how to prevent them
Enterprises face myriad remote access security concerns, but training and clear communication can help them bolster their security programs for the long term.Continue Reading
Sometimes I get a message, 'specified port already open.' What does it mean?
Find out what error messages 'the specified port is already open' or 'the specified port is already in use' mean, and learn how to troubleshoot and fix them.Continue Reading
Common network vulnerabilities and how to prevent them
It's not possible to eliminate all network vulnerabilities, but network teams can implement best practices to limit potential attacks and protect their networks.Continue Reading
How the SolarWinds vulnerability affects networking
The SolarWinds attack resulted in a bevy of network vulnerabilities, like masked traffic and backdoor access. Network teams should take the time to review their security strategies.Continue Reading
10 network security tips in response to the SolarWinds hack
From perimeter protection to persistent patching, enterprises should regularly review, update and test their network security plans, especially in response to the SolarWinds hack.Continue Reading
SASE challenges include network security roles, product choice
Secure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges.Continue Reading
Network performance issues are IT pain point amid COVID-19
Network performance is a top issue among IT teams and remote workers amid the pandemic and can correlate with other technical issues, such as cybersecurity and hardware problems.Continue Reading
How and why to implement Wi-Fi QoS
Quality of service, as network pros know, prioritizes apps as they cross the network. But Wi-Fi QoS needs to be considered, too, in relation to the overall network.Continue Reading
Edge computing challenges and ways to address them
Edge computing can reduce processing times and improve application performance, but the architecture has its issues. Here are eight challenges edge computing creates for the network.Continue Reading
3 ways to prevent DDoS attacks on networks
DDoS attacks on networks can result in devastating and expensive damage for organizations. Learn three ways to prevent and respond to DDoS attacks to keep company networks secure.Continue Reading
3 DDoS mitigation strategies for enterprise networks
Enterprises can choose from three major approaches to mitigate DDoS attacks on their networks: Buy from an ISP, do it themselves or use a CDN service.Continue Reading
How to secure a home network for remote workforces
Remote workers rarely achieve the same network security at home that offices provide. Yet, with the right tools, remote workers can efficiently learn how to secure a home network.Continue Reading
What are the risks of third-party VPN services?
IP address leaks, DNS service leaks and WebRTC transmissions could expose your online activities if you use certain unreliable third-party VPN services.Continue Reading
The true cost of network downtime for your business
Network brownouts could be the biggest under-the-radar threat to your network. Calculate the potential costs of downtime to save your organization's productivity and money.Continue Reading
ISPs rely on capacity for COVID-19 internet traffic spikes
As COVID-19 causes surges in internet traffic, internet and network providers have responded by increasing capacity and installing more fiber. So far, it's worked.Continue Reading
5 needed product features to fix network management issues
Virtualization and public cloud monitoring are among five top network management issues facing companies as they assess tools designed to oversee increasingly complex networks.Continue Reading
Dental group slashes downtime by 99% with Meraki SD-WAN
In this SD-WAN case study, a dental group with chronic network outages deployed Cisco Meraki to eliminate downtime. Learn more about the software-defined win.Continue Reading
How ISPs and operators ensure network quality in a pandemic
COVID-19 has caused a spike in remote workers, increased internet usage and traffic surges. Here's how ISPs and telecom operators plan for continuity and quality during the pandemic.Continue Reading
Evolution of cellular 5G backhaul architecture faces challenges
Backhaul has become trendy again and for good reason. 5G backhaul architecture means network architects will have to reconsider how their networks can handle 1 Gbps speeds.Continue Reading
Zoom, Netflix discuss remote network management challenges
COVID-19 forces IT teams to manage company networks remotely. Here are common issues IT teams of all sizes -- like those at Zoom and Netflix -- face and ways to solve them.Continue Reading
How Wi-Fi experts can help during times of crisis management
When faced with disaster response, wireless network professionals can volunteer their Wi-Fi skills and advise friends and family about home network security.Continue Reading
How free Wi-Fi hotspots help in emergency response situations
Emergency and disaster response require teamwork among businesses, governments and community groups. In these times, free Wi-Fi hotspots help people feel connected.Continue Reading
How supporting a remote workforce stresses the network
Make sure your network can support a remote workforce by analyzing 12 potential issues that can cause stress on your network, including VPN concentrator capacity and traffic routing.Continue Reading
How to handle vendor code bugs in enterprise Wi-Fi networking
Too many features in Wi-Fi devices can breed some serious code bugs. One coping mechanism is to seek help from fellow customers and network integrators.Continue Reading
How to monitor network traffic in 7 steps
Effective network monitoring is an ongoing process that requires constant vigilance by IT groups. This step-by-step plan can fine-tune network monitoring strategies.Continue Reading
3 challenges of edge computing, IoT network adoption
While edge computing and IoT devices can spark networking innovations, these technologies can also create challenges and pitfalls organizations aren't yet equipped to deal with.Continue Reading
What's the difference between half-duplex and full-duplex?
A half-duplex transmission could be considered a one-way street between sender and receiver. Full-duplex, on the other hand, enables two-way traffic at the same time.Continue Reading
4 enterprise WAN challenges that 5G service could resolve
With 5G, organizations could ease or resolve common WAN challenges around deployment, business expansion, monthly pricing models and adoption of new technologies.Continue Reading
How Python addresses security, network traffic analysis concerns
Python can benefit key areas of an organization's network, including network security and traffic analysis. Glean critical expert advice from an author of various Python textbooks.Continue Reading
What are SFP ports on a Gigabit switch and what are they used for?
SFP ports enable Gigabit switches to connect to a wide variety of fiber and Ethernet cables in order to extend switching functionality throughout the network.Continue Reading
3 potential multi-cloud challenges that could go unnoticed
Disaster recovery, vendor lock-in and cost are major factors as organizations evaluate multi-cloud strategies. However, these pros can become cons if teams aren't careful.Continue Reading
Top 3 network security threats and how to protect against them
Enterprise networks are seemingly always under attack. Learn about the most common network security threats and what protections you should have in place.Continue Reading
Educate users when troubleshooting a network connection
In this roundup of industry blogs, engineers discuss why it's helpful to teach users the basics of troubleshooting a network connection and why it's hard to simulate a network.Continue Reading
Understanding why IPv6 renumbering problems occur
IPv6 renumbering can be a challenge, especially if a host using SLAAC obtains stale prefixes. But there are steps you can take to reduce your vulnerability.Continue Reading
How SD-WAN security can boost your network security strategy
Many organizations say security is a top priority for their business, but most lack the necessary resources to thoroughly secure their networks and cloud services. SD-WAN could help.Continue Reading
What is the difference between TCP/IP model vs. OSI model?
Use this expert advice to learn the differences between the TCP/IP model vs. the OSI model, and explore how they relate to each other in network communications.Continue Reading
Network teams spend more time than ever on network security issues
The workloads of network teams have evolved from their original objectives because of network security threats. Yet teams are still expected to maintain their initial goals.Continue Reading
What steps should I take in the event of a network failure?
Don't panic when the network goes down. Instead, use this checklist to go through five factors that could cause network failure, and follow tips on how to plan for them in advance.Continue Reading
Can you integrate legacy network monitoring and analytics?
Legacy network monitoring and new analytics tools don't often mix. One workaround is APIs, but a better option is to upgrade older management software.Continue Reading
What roles are included in a network engineer job description?
What is a network engineer? The role can encompass several disciplines, especially as new technologies emerge. Software knowledge, in particular, is in high demand.Continue Reading
School adopts Wi-Fi 6 in early Wi-Fi upgrade case study
High-capacity wireless can help close the gap between urban and rural schools. Here's how an aggressive Wi-Fi upgrade strategy helped one district meet its community's needs.Continue Reading
What's the difference between a router, switch and hub?
Although a router, switch and hub all help direct network traffic, the devices transmit packets in different ways. Discover the differences among these network devices.Continue Reading
Wi-Fi 6 and IoT could threaten the network
New advances in Wi-Fi technology -- like Wi-Fi 6 -- and IoT can create bottlenecks in legacy campus LANs due to increased throughput consumption and slower uplink speeds.Continue Reading
Understand limitations when monitoring cloud performance
When monitoring cloud performance, organizations need to recognize the limitations that come with SaaS, PaaS and IaaS models, as well as public and private cloud architectures.Continue Reading
What tools can reinforce network edge security?
Firewalls, intrusion prevention systems and cloud-based threat intelligence are just a few of the many ways that organizations can bolster network edge security.Continue Reading
3 types of configuration tools for network change management
From openly available scripting tools to vendor-supplied services, network change management and configuration tools generally fit into three main categories.Continue Reading
What does a zero-trust model mean for network security?
A zero-trust model limits access and permissions according to a defined set of parameters that enterprises specify for each application. Learn what this means for network security.Continue Reading
What 5 items should be on your network monitoring checklist?
Device monitoring, visual performance tools and a deep understanding of network data are just a few of the items that should be on your network monitoring checklist.Continue Reading
5 steps to troubleshoot a virtual machine problem in Azure
If you're wrestling with a virtual machine problem, like a faulty connection issue, be sure to check the domain name system and network traffic routing.Continue Reading
Do you know how to troubleshoot wireless connection problems?
Wireless connection issues are common, but discovering where the problems reside can be difficult. This quiz covers 10 commonly overlooked troubleshooting best practices.Continue Reading
6 steps to troubleshoot Wi-Fi network issues
In a business setting, as you troubleshoot Wi-Fi network issues, these six steps provide a foundation to get you started and keep you grounded when wireless problems hit.Continue Reading
Data center interconnects rife with application challenges
Avoid pushing complexity into your network. This is especially true with data center interconnect design, Layer 2 mobility and application requirements.Continue Reading
Telecom trends 2019: Time for operator 5G and IoT decisions
Telecom trends in 2019 dictate that network operators have tough choices to make to compete with OTT players, increase revenue in terms of 5G and IoT, and consider the software-based fast-fail model.Continue Reading
11 common wireless security risks you don't have to take
Wi-Fi is a boon to productivity, but it can also create serious security issues. Learn how any company can uncover and fortify their wireless security setup.Continue Reading
How to perform packet loss tests and how they work
Network engineers have two standard systems utilities that help them check for packet loss. Learn how this is done and, should a problem prove persistent, the best next steps for troubleshooting packet loss.Continue Reading
What is a long-tail DoS threat, and how does it target web apps?
Fine-grained application monitoring can defend against a long-tail DoS threat. This new kind of vulnerability manipulates service queues within a web application.Continue Reading
Automated network testing tools actively identify network problems
If your organization is serious about application reliability, you'll want to adopt network testing tools so you'll know what will happen when network components fail.Continue Reading
Too many tools hobble network management design
'Measure twice, cut once' doesn't work for network management. It's time for the industry to consider a new way to coordinate network management design tools.Continue Reading
Find network security vulnerabilities by assessing risk
IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments.Continue Reading
How do I troubleshoot network performance with traffic monitoring?
When undertaking network performance troubleshooting, organizations can benefit from a mix of passive and active network traffic monitoring to identify issues.Continue Reading
How hackers use idle scans in port scan attacks
Hackers exploit port scan attacks to mask their identities before launching an attack. One of their favorites: the idle scan.Continue Reading
SR-IOV specification poses promise and pitfalls in virtualized networks
The SR-IOV specification gives network administrators another tool for workload optimization. While SR-IOV could offer many benefits, it does have its drawbacks.Continue Reading
Assessing performance bottlenecks in virtualized networking
Virtual or soft switches can add measurable overhead to network-intensive workloads, but implementing PCI devices offers one option to reduce excess overhead.Continue Reading
Don't forget SD-WAN during your next network infrastructure upgrade
SD-WAN can be a natural progression for enterprises facing a network infrastructure upgrade. But a refresh with SD-WAN deployment requires more than a 'hope for the best' attitude.Continue Reading
How to simplify your overly complex networking design
If you flood your networking design with extraneous features and don't have a firm understanding of the overall system, you might fall into a complexity wormhole.Continue Reading
Cradlepoint router boosts network flexibility for dance group
Connecting an audience to the motion and music of a dance production takes more than dance and musical skills. For one professor, it required network flexibility and the Cradlepoint AER2100 router.Continue Reading
Network edge switch upgrades hinge on WLAN deployments
Network edge switch upgrades depend on a variety of factors, but one of the most critical is taking a look at your future WLAN deployment strategies.Continue Reading
How can network analytics tools be used to improve performance?
With pressure and expectations for network and enterprise performance rising, IT professionals are turning to network analytics tools that use machine learning to remain ahead of the game.Continue Reading
How can I prevent a DDoS attack program?
DDoS programs overwhelm networks with a torrent of requests. How can you prevent a DDoS attack, and what are the steps you can take to keep your networking environment secure?Continue Reading
How IPv6 networks create DNS configuration problems
DNS data is among the most basic and crucial information required for network connectivity, but configuring DNS recursive servers in IPv6-only networks can pose challenges.Continue Reading
What's automation's role in network provisioning resources?
IT is embracing network automation, but complications with integration disrupt the process. Using automation for provisioning resources can improve efficiency, but reduce the need for IT personnel.Continue Reading
How can you use perfect forward secrecy for mobile security?
How can companies increase data protection in mobile communications environments and enhance perfect forward secrecy to safeguard user activity?Continue Reading
IBN: Enablement for a configuration management process?
How realistic are claims about intent-based networking helping organizations to enhance the network configuration management process?Continue Reading
Users want hybrid cloud networking to be simple
As more services move to the cloud and become more mobile, if the network is invisible and performs well, IT pros are doing their jobs in users' eyes.Continue Reading