Problem to Solve: With the popularity of the video streaming of the NCAA Basketball tournament, how can I be sure that our network does not collapse under the load?
Under the definition of irony, would be a picture of me .. writing a blog showing how the NCAA tournament adversely affects your network utilization. I LOVE NCAA BASKETBALL. So this hurts me to my very core. 😳
However, with the multitude of video streaming media options available for watching the tournament (on phones, tablets, computers, etc), the effect of the video pumping across your network infrastructure is undeniable. The old notion of “shoving a basketball through a straw” comes to mind.
NCAA Streaming Video
Additionally, think of all of the critical and relevant services that run across your company’s Internet pipe. The streaming NCAA Video content although hugely entertaining, directly affects business services. Anything ranging from your company’s:
- Cloud access
- Company home page
- VPN Remote Users
- Office365 access
- B2B links
This all being said, one of my colleagues, Mr. Kevin Morton created a very nice configuration document that we are making available as a public service on the topic. The PDF document contains the streaming media servers, content engines, etc, relevant to any solution that you would choose to monitor the traffic. Here is the link to view Kevin’s document.
Kevin Morton March Madness 2017 (updated)
I hope that you find this a helpful document, and a thank you to Kevin for sharing.
Problem to Solve – We have an ERP system that is critical to our business. Service degradations and outages are extremely visible to executive management and costly to our bottom line. What is the best approach to monitor this deployment? … Continue reading
Problem to Solve: How can we integrate our Cybersecurity SIEM with data from our Application and Network Performance Management solutions? For those of us with a little “gray in our hair” will remember the end of the ORIGINAL Batman series … Continue reading
In my last article, I spoke of seeking advice and almost portrayed a level of caution when approaching cloud. The reality of the matter is, we all want what the cloud promises, an easier and more profitable platform for delivering services at … Continue reading
I absolutely love my job, and obviously have no qualms about telling people about it! On a daily basis, I help people solve complex business problems. Sometimes those business problems are rooted in human nature, not technology. When human nature … Continue reading
Problem to Solve: How can I use my APM NPM solution to better detect Unknown Anomaly conditions related to Cyber and/or Hacktivism? “You have to learn the rules of the game. And then you have to play better than … Continue reading
Problem to Solve: What can we do to protect our Virtualized Server Infrastructure and Application Services against Hacktivism? OK, I don’t know exactly what Homer Simpson thinks about virtualized servers, but do have a guess on his reaction. 🙂 So the … Continue reading
Problem to Solve: What can we do to protect our organization from Hacktivism, specifically in the area of protecting our Critical Application Services? Have your business critical application services ever become “unavailable”? We have all had this happen at one … Continue reading
In this last blog post of the PCPM series we are going to address several steps to ensure the success of your APM/NPM deployment in your patient care environment. 99.9% of these steps can be utilized by other business verticals as … Continue reading
Working in the greater Philadelphia area now for nearly 17 years has given me the opportunity to work with many of the large pharmaceutical companies located in this area. And one thing you learn quickly is how heavily regulated they … Continue reading