
Today is the day that the CCIE changes. A little, at least. The news hit just a little while ago that there are some changes to the way the CCIE certification and recertification process happens. Some of these are positive. Some of these are going to cause some insightful discussion. Let’s take a quick look at what’s changing and how it affects you. Note that these changes are not taking effect until February 24, 2020, which is in about 8 months.
The first big change comes from the test that you take to get yourself ready for the lab. Historically, this has been a CCIE written exam. It’s a test of knowledge designed to make sure you’re ready to take the big lab. It’s also the test that has been used to recertify your CCIE status.
With the new change on Feb. 24th, the old CCIE written will go away. The test that is going to be used to qualify candidates to take the CCIE lab exam is the Core Technology exam from the CCNP track. The Core Technology exam in each CCNP track serves a dual purpose in the new Cisco certification program. If you’re Continue reading
The nearly $16-billion deal comes just days after Google acquired data analytics firm Looker for...
The Dell’Oro Group market report also found Dell is the No. 1 server vendor by revenue share...

Without access to standards bodies Huawei loses patent rights to a wide range of technology.
The post ◎ Standards Bodies, Patents, Huawei and Unexpected Consquences appeared first on EtherealMind.
5G rollouts are ramping up in Europe as Vodafone also announced commercial launches in Italy and...
The longer you work on one system or application, the deeper the attachment. For years you have been investing in it—adding new features, updating functionality, fixing bugs and corner cases, polishing, and refactoring. If the product serves a need, you likely reap satisfaction for a job well done (and maybe you even received some raises or promotions as a result of your great work).
Attachment is a two-edged sword—without some form of attachment, it seems there is no way to have pride in your work. On the other hand, attachment leads to poorly designed solutions. For instance, we all know the hyper-certified person who knows every in and out of a particular vendor’s solution, and hence solves every problem in terms of that vendor’s products. Or the person who knows a particular network automation system and, as a result, solves every problem through automation.
The most pernicious forms of attachment in the network engineering world are to a single technology or vendor. One of the cycles I have seen play out many times across the last Continue reading
On today's Network Break we dive into Google's self-inflicted outage, examine Apple's new HomeKit partnerships and Sign In, discuss the IEEE's reversal on Huawei, and parse other IT and tech news bits.
The post Network Break 238: Google Borks Itself; Apple Slices IoT Gadgets Into Security Zones appeared first on Packet Pushers.
High-speed jobs: A new study suggests that better broadband service lowers unemployment rates, Vice.com reports. Researchers from the University of Tennessee at Chattanooga and Oklahoma State University tracked broadband availability and unemployment rates in Tennessee and found that counties with access to high-speed broadband had a slightly lower unemployment rate than those with slower service.
More moderation: YouTube plans to remove white supremacist, hate speech and hoax videos, the Washington Post reports. The new policy will go farther than YouTube’s former prohibition on videos that promote violence or hatred against people based on their age, religious beliefs, gender, religion, immigration status and sexual orientation.
Encryption fight: Yandex, a provider of Internet-related services in Russia and the former Soviet Union, has reached an agreement with the Russian FSB security service on handing over encryption keys, Reuters reports. Details of the agreement weren’t immediately available. Yandex had originally resisted the FSB’s demand for encryption keys, Reuters says.
Bigger than the weather: U.S. residents believe fake news is a bigger problem than climate change or racism, according to a new survey detailed at Business Insider. Half of those surveyed said made-up news is a major problem, while just 46 said the Continue reading
The No Scripting Required to Start Your Automation Journey blog post generated lively discussions (and a bit of trolling from the anonymous peanut gallery). One of the threads focused on “how does automation work in real life IT department where it might be challenging to simplify operations before automating them due to many exceptions, legacy support…”
Here’s a great answer provided by another reader:
Read more ...Workflows vary from seriously simple to notoriously complex and as humans, we might not even consciously observe the subtleties of what a workflow comprises of. Workflows are the source of control semantics and comprise of many elements, some obvious some not so. This post is a primer to help you think about the kind of workflows you encounter drawn from my experiences. This post offers a view with conviction backed by experience.
To set the tone, workflows have logical flow, temporal behaviour, consume and transmit data, for processing triggers, acting on decision points and returning states. Since the 1970s, I believe we haven’t actually come that far from a workflow orchestration standpoint. Atomic units of code exist that do one thing well, a real win for the 1970s and good automation systems understand how to instantiate, feed these atomic blobs of logic data and grab their exit state and content. On a *nix system, it’s possible to use bash to create a single chain of tasks using the | operator. One blob of logic effectively feeds it’s output to the next blob of logic. Who needs an orchestrator? It’s sensible to include detection logic within each blob of code to Continue reading
Today's Heavy Networking examines packet analysis with sponsor ExtraHop. We drill into the company's marketing claims about deep analysis at line rate with Mike Ernst, VP of Sales Engineering. We also tackle how ExtraHop handles encrypted traffic, incuding TLS 1.3 and Perfect Forward Secrecy. Mike promises to keep his inner salesperson on mute for this conversation.
The post Heavy Networking 454: Analyzing Encrypted Traffic In The TLS 1.3 Era With ExtraHop (Sponsored) appeared first on Packet Pushers.
On the one hand, testing is all too often the roadblock that stands between highly accelerated Dev processes and highly automated ops-driven delivery processes. But on the other hand, testing is essential for ensuring that the release doesn’t place the business at risk — undermining the very “customer experience” Continue reading