Processing...
All posts in: "Product"

Monitoring DNS in China

Posted by on March 27, 2017

In our previous post, Monitoring Application Delivery in China, we discussed a myriad of issues that can affect the performance of applications delivered to users in China. Of these issues, difficulties with DNS in China is a topic that deserves its own post — when the packets of a critical service like DNS routinely go missing, the impacts on the delivery of important applications can be enormous.… Read More »

Monitoring Application Delivery in China

Posted by on March 14, 2017

As we discussed in our first post about benchmarking network performance in China, half of the battle of monitoring applications in China is setting new expectations for what performance should normally look like; often metrics like packet loss and latency will be significantly higher than outside the Great Firewall.… Read More »

Benchmarking Network Performance in China

Posted by on February 22, 2017

As businesses expand their operations to rapidly developing new markets like China, we are excited to announce that we too are expanding our horizons at ThousandEyes. We have increased our set of monitoring points to include nine new Cloud Agent locations in China: Foshan, Jinan, Nanjing, Shenyang, Shijiazhuang, Wenzhou, Wuxi, Xi’an and Zhuhai.… Read More »

How Virtual Private Networks Impact Performance

Posted by on February 14, 2017

If you’ve ever had to connect to a corporate network while working remotely, chances are you are familiar with the concept of Virtual Private Networks (VPNs). VPNs establish a secure connection from your device to any other part of the network by wrapping an additional layer of security and privacy to your online activity. VPNs are an indispensable part of… Read More »

Tune Your Network Monitoring with Instant Tests

Posted by on January 18, 2017

This week we released a redesign of Instant Tests, the feature that allows you to quickly validate test settings and configuration. Instant Tests provide results from a single iteration of an application or network layer test and serve as a preview platform for troubleshooting and error detection.… Read More »

Three Types of DDoS Attacks

Posted by on November 15, 2016

Distributed Denial of Service (DDoS) attacks have been a popular topic of discussion in the past few months. We have seen a flurry of prominent DDoS attacks, such as the attacks on DNS root servers and the Dyn DNS outage, with widespread impact and the potential to disrupt communications worldwide.… Read More »

A Guide to DNS Record Types

Posted by on November 10, 2016

The domain name system (DNS) is a directory service that allows Internet-connected devices to lookup information for resources on the Internet. The information provided includes IP addresses, which are used to route Internet traffic. DNS uses a combination of record types to ultimately guide users to the right address for the Internet resource they’re looking for. We’ll cover the major… Read More »

Monitoring SaaS Performance from the End User

Posted by on November 1, 2016

When folks talk about end user or ‘real user’ monitoring, they usually mean injecting code (often Javascript) into an application to measure user behavior and timing. This can be great to complement an application monitoring strategy. But this sort of method doesn’t work when the application in question isn’t yours (as in the case of Software-as-a-Service apps). This method also fails to provide a detailed understanding of connectivity.… Read More »

Monitoring VoIP and RTP in an Enterprise WAN

Posted by on October 10, 2016

IP Telephony or VoIP has been built upon two foundational blocks – the telephone and the Internet. It has taken over 40 years for both the telecommunication industry and the computing industry to develop for VoIP service. In the recent times, VoIP has been brought to the forefront of communications by the freedom and flexibility of the Internet. While VoIP is cost effective, maintaining service assurance and troubleshooting a VoIP service is extremely challenging.… Read More »

Comprehensive Alerting for Route Leaks and Hijackings

Posted by on September 20, 2016

In past blogs, we’ve explored a specific BGP issue that can have far-reaching, large-scale impacts on networks across the Internet: route leaks and hijackings. In this post, we’ll discuss alerting for leaks and hijacks, which is the first step in the process of detecting, diagnosing and ultimately mitigating these notoriously difficult-to-troubleshoot events.… Read More »