I realised just now that I didn’t share the names of the people who used my CCDE resources and got their CCDE numbers recently. I know all of them, their capabilities, technical strength. I am happy to see that they are CCDE now. Congrats to Ken Young , Jaroslaw Dobkowski , Malcolm Booden …
Continue reading "4 people passed CCDE Lab with my CCDE training recently"
The post 4 people passed CCDE Lab with my CCDE training recently appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
I realised just now that I didn’t share the names of the people who used my CCDE resources and got their CCDE numbers recently. I know all of them, their capabilities, technical strength. I am happy to see that they are CCDE now. Congrats to Ken Young , Jaroslaw Dobkowski , Malcolm Booden …
Continue reading "4 people passed CCDE Lab with my CCDE training recently"
The post 4 people passed CCDE Lab with my CCDE training recently appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Make before break and break before make. I shared many posts so far which was covering the terms used in different field of networking. This one is one of them. Also I will introduce, probably to many of you, a new terminology ‘ Break before make ‘ If you are from the IP/MPLS background […]
The post Make before break and Break before make appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Make before break and break before make. I shared many posts so far which was covering the terms used in different field of networking. This one is one of them. Also I will introduce, probably to many of you, a new terminology ‘ Break before make ‘ If you are from the IP/MPLS background …
Continue reading "Make before break and Break before make"
The post Make before break and Break before make appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Make before break and break before make. I shared many posts so far which was covering the terms used in different field of networking. This one is one of them. Also I will introduce, probably to many of you, a new terminology ‘ Break before make ‘ If you are from the IP/MPLS background …
Continue reading "Make before break and Break before make"
The post Make before break and Break before make appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
The complexity of modern problems often precludes any one person from fully understanding them. Factors contributing to rising obesity levels, for example, include transportation systems and infrastructure, media, convenience foods, changing social norms, human biology and psychological factors. Designing an aircraft carrier, to take another example, requires knowledge of nuclear engineering, naval architecture, metallurgy, hydrodynamics, […]In a previous post my colleague, Stijn, discussed the enhancements to how NSX for vSphere 6.4 handles Remote Desktop Session Host, RDSH, systems with the Identity-based Firewall and Context-Aware Micro-segmentation.
Remote Desktop Services is an underlying technology from Microsoft that many vendors take advantage of to provide overlay management and application deployment technologies for. In this post, we’re going to discuss how NSX for vSphere 6.4 allows customers to run RDS hosts with granular security for VMware Horizon systems.
VMware Horizon can provide multiple users the ability to connect to a single system to access their applications using the RDSH technology. These users can be of the same type, for example all HR users, or of multiple types, HR and Engineering users. In previous versions of NSX, it was not possible to individually secure user sessions and create Distributed Firewall (DFW) rule sets according to the user session logged into an RDSH server. This meant less flexibility in controlling what users could access data center application servers without isolating one set of users to one RDSH server. This model created a very rigid architecture for Horizon customers to follow.
Horizon allows customers Continue reading
Learn how to maximize your existing data storage investments.
I always encourage the students attending the Building Network Automation Solutions online course to create solutions for problems they’re facing in their networks instead of wasting time with vanilla hands-on assignments.
Francois Herbet took the advice literally and decided to create a solution that would configure PE-routers and create full-blown device configurations for CE-routers.
Read more ...
Bufferbloat is responsible for much of the poor performance seen in the Internet today and causes latency (called “lag” by gamers), triggered even by your own routine web browsing and video playing.
But bufferbloat’s causes and solutions remind me of the old parable:
It was six men of Indostan, to learning much inclined,
who went to see the elephant (Though all of them were blind),
that each by observation, might satisfy his mind.
……. (six stanzas elided)
And so these men of Indostan, disputed loud and long,
each in his own opinion, exceeding stiff and strong,
Though each was partly in the right, and all were in the wrong!
So, oft in theologic wars, the disputants, I ween,
tread on in utter ignorance, of what each other mean,
and prate about the elephant, not one of them has seen!
John Godfrey Saxe
Most technologists are not truly wise: we are usually like the blind men of Indostan. The TCP experts, network operators, telecom operators, router makers, Internet service operators, router vendors and users have all had a grip *only* on their piece of the elephant.
The TCP experts look at TCP and think “if only TCP were Continue reading