Processing...

Monitoring the Pixel-Serving Architecture at Quantcast

featured-image-te-connect-quantcast
Posted by on November 30, 2016

We recently wrapped up the fall edition of ThousandEyes Connect San Francisco. Keeping up with tradition, we had some excellent speakers who shared some interesting stories about how they monitor their business critical infrastructure. As our first guest speaker we were thrilled to have Jim Morrison from Quantcast, a digital advertizing company focussing on audience measurement and real-time advertising.… Read More »

Three Types of DDoS Attacks

featured-image-types-of-ddos-attacks
Posted by on November 15, 2016

Distributed Denial of Service (DDoS) attacks have been a popular topic of discussion in the past few months. We have seen a flurry of prominent DDoS attacks, such as the attacks on DNS root servers and the Dyn DNS outage, with widespread impact and the potential to disrupt communications worldwide.… Read More »

A Guide to DNS Record Types

blog-featured-217x217
Posted by on November 10, 2016

The domain name system (DNS) is a directory service that allows Internet-connected devices to lookup information for resources on the Internet. The information provided includes IP addresses, which are used to route Internet traffic. DNS uses a combination of record types to ultimately guide users to the right address for the Internet resource they’re looking for. We’ll cover the major… Read More »

NANOG 68: Decoding Performance Data from Large-Scale Internet Outages

featured-image-nanog-68-decoding-performance-data-from-large-scale-internet-outages
Posted by on November 7, 2016

At NANOG 68 in Dallas, TX on October 18, 2016, ThousandEyes CEO Mohit Lad presented on recent outages that had large-scale effects on Internet infrastructure and availability. During his talk, Mohit discussed three recent, impactful events: the June 2016 DNS root server DDoS, the May 2016 Sea-Me-We-4 cable cut and the April 2016 AWS route leak. … Read More »

Monitoring SaaS Performance from the End User

featured-image-monitoring-saas-performance-from-the-end-user
Posted by on November 1, 2016

When folks talk about end user or ‘real user’ monitoring, they usually mean injecting code (often Javascript) into an application to measure user behavior and timing. This can be great to complement an application monitoring strategy. But this sort of method doesn’t work when the application in question isn’t yours (as in the case of Software-as-a-Service apps). This method also fails to provide a detailed understanding of connectivity.… Read More »

Connecting the Dots: Web Performance and 3rd-Party Scripts

featured-image
Posted by on October 26, 2016

As explained in our recent blog post, The DDoS Attack on Dyn’s DNS Infrastructure, a large-scale DDoS attack took down a good chunk of the Internet on the morning of Friday, October 21st. It was a very busy morning for anyone involved with website reliability and network operations in any of the hundreds of businesses that were, in one way or another, impacted by the outage.… Read More »

The DDoS Attack on Dyn’s DNS Infrastructure

featured-image-dyn-ddos
Posted by on October 25, 2016

On Friday, October 21st, a series of large-scale DDoS attacks were launched against Dyn, a managed DNS provider. Over the course of 18 hours, these attacks disrupted many critical services–including Spotify, Amazon and HBO Now–all of whom are customers of Dyn. At the height of the attack, approximately 75% of our global vantage points sent queries that went unanswered by Dyn’s servers.… Read More »

Monitoring VoIP and RTP in an Enterprise WAN

featured-image-monitoring-enterprise-voip-services
Posted by on October 10, 2016

IP Telephony or VoIP has been built upon two foundational blocks – the telephone and the Internet. It has taken over 40 years for both the telecommunication industry and the computing industry to develop for VoIP service. In the recent times, VoIP has been brought to the forefront of communications by the freedom and flexibility of the Internet. While VoIP is cost effective, maintaining service assurance and troubleshooting a VoIP service is extremely challenging.… Read More »

Comprehensive Alerting for Route Leaks and Hijackings

featured-image
Posted by on September 20, 2016

In past blogs, we’ve explored a specific BGP issue that can have far-reaching, large-scale impacts on networks across the Internet: route leaks and hijackings. In this post, we’ll discuss alerting for leaks and hijacks, which is the first step in the process of detecting, diagnosing and ultimately mitigating these notoriously difficult-to-troubleshoot events.… Read More »

Monitoring FTP Servers and File Transfer Performance

Featured-Image-Monitoring-FTP-Servers
Posted by on September 1, 2016

This week we added support for File Transfer Protocol (FTP) with a new web layer test, the FTP Server Test. This new tests helps network ops teams quickly visualize and troubleshoot file transfer performance, whether for an internal or external FTP server. We also pair the FTP Server Test with our standard TCP/IP metrics and views of network paths and routes to help streamline fault detection. You can validate both FTP server listings and content.… Read More »