But power companies can be challenging tech partners.
Networking vendor says it's focused on simplifying multi-cloud management.
In this Community Roundtable episode, returning guests Russ White and Nick Russo start our three part deep dive into the Border Gateway Protocol, or BGP, with a look at terminology, how peer relationships form, the differences between internal and external BGP, and scaling techniques.
Show Links
https://tools.ietf.org/html/rfc4271
https://www.ietf.org/rfc/rfc1771.txt
Show Notes
Overview
Terminology

It is now commonly accepted as fact that web performance is critical for business. Slower sites can affect conversion rates on e-commerce stores, they can affect your sign-up rate on your SaaS service and lower the readership of your content.
In the run-up to Thanksgiving and Black Friday, e-commerce sites turned to services like Cloudflare to help optimise their performance and withstand the traffic spikes of the shopping season.

In preparation, an e-commerce customer joined Cloudflare on the 9th November, a few weeks before the shopping season. Instead of joining via our Enterprise plan, they were a self-serve customer who signed-up by subscribing to our Business plan online and switching their nameservers over to us.
Their site was running Magento, a notably slow e-commerce platform - filled with lots of interesting PHP, with a considerable amount of soft code in XML. Running version 1.9, the platform was somewhat outdated (Magento was totally rewritten in version 2.0 and subsequent releases).
Despite the somewhat dated technology, the e-commerce site was "good enough" for this customer and had done it's job for many years.
They were the first to notice an interesting technical issue surrounding how performance and security can often Continue reading

It is now commonly accepted as fact that web performance is critical for business. Slower sites can affect conversion rates on e-commerce stores, they can affect your sign-up rate on your SaaS service and lower the readership of your content.
In the run-up to Thanksgiving and Black Friday, e-commerce sites turned to services like Cloudflare to help optimise their performance and withstand the traffic spikes of the shopping season.

In preparation, an e-commerce customer joined Cloudflare on the 9th November, a few weeks before the shopping season. Instead of joining via our Enterprise plan, they were a self-serve customer who signed-up by subscribing to our Business plan online and switching their nameservers over to us.
Their site was running Magento, a notably slow e-commerce platform - filled with lots of interesting PHP, with a considerable amount of soft code in XML. Running version 1.9, the platform was somewhat outdated (Magento was totally rewritten in version 2.0 and subsequent releases).
Despite the somewhat dated technology, the e-commerce site was "good enough" for this customer and had done it's job for many years.
They were the first to notice an interesting technical issue surrounding how performance and security can often Continue reading
These IT certs can help you demonstrate your understanding of the latest technology.
Two weeks ago, a small delegation from the Internet Society was in Delhi for a series of meetings. (See yesterday’s post about GCCS and GFCE.) In this post, I’ll pick up with the Global Commission on the Stability of Cyberspace (GCSC).
The international community has been trying to develop cybernorms for international behaviour for over a decade. This has been happening through UN processes, through the GCCS, through international law discourse, and other fora. And, some progress has been made. For instance, the Tallin manuals provide some insights on how international law applies to cyber war and cyber operations, while the UN GGE, among others, recognized the applicability of international law on the digital space and has provided some protection to cybersecurity incident response teams (CIRTs) and critical infrastructure.
However, these processes are slow, and certainly not without roadblocks. The 5th UN Group of Governmental Experts on Information Security (GGE), for example, failed to reach consensus on whether certain aspects of international law, in particular the right to self-defence, apply to cyberspace as well as issues related to attribution. During a panel at GCCS, five participants in the 5th UN GGE shared their perspectives. To me Continue reading
A while ago I created an Ansible playbook that creates network diagrams from LLDP information. Ben Roberts, a student in my Building Network Automation Solutions online course used those ideas to create an awesome solution: he’s graphing multicast trees.
Here’s how he described his solution:
Read more ...Many of the best things that have happened in my life weren’t planned.
Becoming a “Solutions Architect” is one of those things. I didn’t plan it. I’ve been in CPOC (Customer Proof of Concept) for almost 17 years now.
Why? Cause truthfully, having fun and enjoying my job is exceedingly important to me. And I’ve never seen a job (in Cisco or outside) that would be more of an absolute perfect fit for me and what I consider “fun”.
But like I said…. Many of the best things that have happened in my life weren’t planned. 
For those of you who know how very much I totally love CPOC… you might be wondering “Fish, what happened that made you decide to look for another job?”. Uh… nothing. Like I said… it wasn’t planned. In fact, i didn’t even interview or apply for the job.
The new job is actually
Teehee… well the team literally just came Continue reading
Many of the best things that have happened in my life weren’t planned.
Becoming a “Solutions Architect” is one of those things. I didn’t plan it. I’ve been in CPOC (Customer Proof of Concept) for almost 17 years now.
Why? Cause truthfully, having fun and enjoying my job is exceedingly important to me. And I’ve never seen a job (in Cisco or outside) that would be more of an absolute perfect fit for me and what I consider “fun”.
But like I said…. Many of the best things that have happened in my life weren’t planned. 
For those of you who know how very much I totally love CPOC… you might be wondering “Fish, what happened that made you decide to look for another job?”. Uh… nothing. Like I said… it wasn’t planned. In fact, i didn’t even interview or apply for the job.
The new job is actually
Teehee… well the team literally just came Continue reading
Those looking to upgrade might want to check the fine print.
The updates include technology acquired from security startup Cyphort.
Detractors earlier called OpenContrail ‘faux-pen source.’
Lanner’s unique position with SD-WAN services sealed the partnership.
Juniper also announced Contrail as a platform for enterprise multi-cloud management.