The Case of the Missing Phone

The executives pile into the conference room and notice that something is missing.  “Where’s the pho...
Read More

The Heroes of System Administrator Appreciation Day

For System Administrator Appreciation Day, we asked our customers and many other SysAdmins to submit...
Read More

Why Is Troubleshooting Packet Loss So Hard?

Most network monitoring systems don’t dig deep enough into the network to see all of the error count...
Read More

What Do Telecom Engineers Think About at Lunchtime (Jitter Buffers)

Maybe it is just because lunch is a big deal in my town (Silicon Valley), but I like to think about ...
Read More

IoT Device Security and Monitoring

Who Is Talking to Whom Using IoT Devices? Where Is Your Data Going? You may have many IoT devices on...
Read More

Network OUI Squatters and IoT Devices

The American Heritage Dictionary defines a squatter as one who settles on unoccupied land without le...
Read More

The Vulnerable Underbelly of Your Network

What do you really know about the vulnerabilities of your network equipment? An equipment manufactur...
Read More

Total Network Security™

As network engineers, we occasionally empty our favorite adult beverage and discuss "what’s missing ...
Read More

How Do You Find a Cable Fault?

If you had a bad cable causing problems in your network, would you know it? How fast could you find ...
Read More

The Dark Ages of Network Monitoring Need to Come to an End: Networks Should Be Invisible

The history of technology is replete with stories of continuous improvements that aim to make the te...
Read More

Jumbo Frames and VoIP/UC

Getting stuck at a railroad crossing with a super-long freight train can test anyone’s patience. In ...
Read More

share this:  

Subscribe to our blog!

Recent Posts