Eric Eissler

I am a full-time DevOps Engineer and part-time writer. I enjoy writing about DevOps technologies, processes and procedures. I enjoy sharing my knowledge and helping others grow. I am interested in tech in banking and finance, cryptocurrency, and the healthcare industry. I love to travel and have been to almost every country in Europe!

Top LAN Monitoring Tools

Top 5 LAN Monitoring Tools

Keeping track of the status of all the devices and hardware connected to your local area network has become a large, never-ending task. Thus, LAN monitoring is the best way to manage and monitor all the devices connected to your network. Learn what a LAN monitoring tool is, the best features it should include, and the top 5 picks.

Network Segmentation Best Practices for Your Organization

Network Segmentation Best Practices for Your Organization

Your network is your company’s greatest strength. However, it can also be your company’s greatest weakness if you don’t protect it well. Networks have changed a lot since the days of simple switches, routers, and a flat network structure. Today, we have on-prem servers, devices with cloud services, and a distributed workforce. Learn the best practices for segmenting your company’s network.

What Is an L2TP VPN

What Is an L2TP VPN?

L2TP is a protocol that directs how VPNs should process data to encrypt and decrypt it. In this article, I’ll discuss what Layer 2 Tunneling Protocol (L2TP) is, how it works, and the pros and cons of this aging protocol. Finally we discuss if L2TP is relevant or not.

A Comprehensive SOC 2 Compliance Checklist

A Comprehensive SOC 2 Compliance Checklist

The SOC 2 certification is a great way to prove to your customers that you’re doing everything required to protect their data. That said, to successfully pass an audit, you’ll need to prepare for it. Learn more on how to prepare in this article.

Microsoft Faces GDPR Challenges in Europe over Off-Prem Data Storage

Microsoft Faces GDPR Challenges in Europe over Off-Prem Data Storage

The EU’s General Data Protection Regulation (GDPR) has created an issue between Germany and Microsoft because the latter is allegedly violating GDPR rules. This article will cover what these violations are, how the GDPR and CLOUD Act relate to these violations, and how they clash over some issues. I’ll also go over some potential workarounds you can apply to this problem in the meantime.

Speed Up Your Internet Connection with TCP Optimization

Speed Up Your Internet Connection with TCP Optimization

TCP is the protocol controlling the connection between two devices exchanging data. It regulates the process of breaking down application data into packets. TCP also sends and receives packets and manages the flow of the data packets. Learn more about TCP optimization in this article.

Scroll to Top