Effective January 23, 2018 Cisco will be incorporating a new version of its CCIE Collaboration exam blueprint into both the written and lab exams. Those who are scheduled to take the CCIE Collaboration exam prior to this date will not be affected by the blueprint change.
For those who are scheduled to take the CCIE Collaboration exam on or after July 23, 2018 here are the major changes you can expect to see:
The v2.0 CCIE Collaboration exam will be split into 8 domains unifying the written and lab exam topics. What this means is that instead of having 9 domains in the written exam and 7 in the lab exam, candidates will be tested on topics in only 8 domains total across both exams. In version 2.0 of the CCIE Collaboration exam, instructions will explicitly state which domains pertain to which exam, and the relative weight of each domain.
Topics Added in v2.0:
The entire cloud native ecosystem has begun to address enterprise needs.
In advance of Data Privacy & Protection Day, the Online Trust Alliance, an Internet Society initiative, just released the Cyber Incident & Breach Trends Report (press release here), a look back at the cyber incident trends in 2017 and what can be done to address them. This report marks the tenth year OTA has provided guidance in this area, and while the specifics have certainly changed over time, the core principles have not.
Originally we just looked at the number of reported breaches, but last year we broadened the definition to “cyber incidents,” which includes ransomware infections, business email compromise (BEC), distributed denial-of-service (DDoS) attacks and infiltrations caused by connected devices. This broader definition paints a more realistic picture of the threats and associated impact facing organizations today.
This year we found that the number of cyber incidents nearly doubled to 159,700 globally, and given that most incidents are not reported, this number could easily exceed 350,000. This is more than 30 times the number of breaches alone, so provides a very different perspective on the threat landscape. As in previous years we also assessed the “avoidability” of breaches by analyzing their cause and found that 93% were avoidable, Continue reading
ThousandEyes presented at Network Field Day 17 on Internet visibility, monitoring customer experience, and improving mean time to innocence for the network.
The post BiB 25: ThousandEyes At NFD17 – Expanding Into User Experience appeared first on Packet Pushers.
The update also gives customers a choice between two hypervisors.
Follow this guidance to ensure the best user experience with AWS.
EVPN is one of the major reasons we’re seeing BGP used in small- and mid-sized data center fabrics. In theory, EVPN is just a BGP address family and shouldn’t have an impact on your BGP design. In practice, suboptimal implementations might invalidate that assumption.
I've described a few EVPN-related BGP gotchas in BGP in EVPN-Based Data Center Fabrics, a section of Using BGP in Data Center Leaf-and-Spine Fabrics article.
Alex raised a number of valid points in his comments to this blog post. While they don't fundamentally change my view on the subject, they do warrant a more nuanced description. Expect an updated version of this part of the article when I return from Cisco Live Europe
Juniper brings OpenContrail into the Linux Foundation & expands the commercial Contrail for security and multi-cloud. Recorded live at Network Field Day 17.
The post BiB 24: Juniper OpenContrail At NFD17 – One Fabric To Bind Them appeared first on Packet Pushers.
It sounds as if Cisco won't be using Skyport's hardware.