Found 1783 results
in "All Categories"

Transformations
CSV to JSON
This Pre-Built Transformation enables users to convert comma separated data (csv data) into JSON by the first line of the csv data as keys and all following lines as values.
Blog
What Gartner’s 2025 Market Guide Means for Network Leaders & Why It’s Time to Rethink Your Automation Strategy
Network automation has reached an inflection point. According to the newly released Gartner® 2025 Market Guide for Network Automation Platforms, enterprise IT and network teams are facing mounting pressure to scale automation — but most are falling short due to tool sprawl, siloed workflows, and manual processes that continue to dominate operations. This year’s Market
Blog
How to Orchestrate Unique SD-WAN Configs Across Thousands of Branches
Deploying SD-WAN at scale sounds doable — modern controllers allow you to push config to many routers at once, and almost every SD-WAN vendor out there offers some automation capabilities. But reality isn’t so clean. For most teams, they’re faced with complex, multi-vendor environments, and a challenge that’s difficult to solve: unique configurations. Many routers
Blog
The Future of Network Configuration: Moving from Reactive Changes to Proactive Validation
In today’s fast-evolving IT landscape, the traditional approach of reactive, manual network changes is no longer sustainable. And to tell the truth, even fully automated changes without oversight carry risks. As networks grow in complexity — spanning multi-cloud environments, hybrid infrastructures, and a vast array of connected devices — it’s only becoming more critical to
Blog
Why Network Automation Is No Longer Optional (& How Itential Makes It Stupid Easy)
It’s true — getting started in network automation can feel intimidating as hell. You hear people talk about it like you need to have a PhD in Python just to get started. Meanwhile, you’re out here juggling VLAN and interface changes, troubleshooting the same issue for the third time this week, and wondering if you’ll
Blog
Struggling with DORA Compliance? Network Orchestration Can Make the Difference for E.U. Financial Institutions
As of January 17th this year, the Digital Operational Resilience Act (DORA) is in effect for financial institutions and third-party ICT partners operating in the EU. The DORA rules aren’t just a compliance checkbox — they’re a mandate to rethink operational resilience in an era of rising cyber threats and complex networks. Failing to comply risks
Blog
The Future of NetOps: Delivering Network Services Like the Rest of IT
For years, networking has operated separately from the rest of IT infrastructure. While compute, storage, and applications moved toward cloud-first, API-driven models, networking has remained mostly manual and ticket-driven. That’s no longer sustainable. In my recent TNOps Podcast conversation with Scott Robohn and Ethan Banks, we explored how networking must evolve — not just by
Blog
Automation at Scale: Powering ISP Success for BEAD Broadband Rollout
The Broadband Equity, Access, and Deployment Program (BEAD) is a $42.45 billion push to bring high-speed internet to every corner of the United States, targeting unserved and underserved communities. For internet service providers (ISPs), this means rolling out complex broadband networks, activating new services, and ensuring all services can be properly billed across rural counties and
Blog
The Automation Paradox: Why More Scripts ≠ More Control
Let’s start with a truth every NetEng pro knows: scripts are awesome — until they’re not. You write one to drop a VLAN. It works. You feel like a rockstar. Then you write 50 more, and suddenly you’re drowning in a mess of dependencies, version mismatches, and operators pinging you while you’re watching the game
Blog
Customer Spotlight: How a Major FinTech Is Delivering Secure, Consistent, & Compliant Network Operations
When your network underpins sensitive financial transactions, every misconfiguration, delay, or security gap can introduce risks that impact customers and compliance. For the network team at a major FinTech company, ensuring security across their vast, complex infrastructure had become an uphill battle. Despite their skills and best efforts, they struggled to keep up with security
Showing Page 9 of 179