IoT may play a role in how Cisco melds AppDynamics' technology into the rest of its business.
The edge intelligence and industrial IoT company is backed by GE, Saudi Aramco, Intel Capital, Bosch, Dell, and more.
![]() |
Fig 1.1- Cisco Meraki MX Security Appliances |
In a return to our routing protocol series, Russ White and Nick Russo join Network Collective to talk about some of the intricacies of the IS-IS routing protocol. While not usually found in enterprises, Service Providers have used IS-IS as the underlay to their MPLS networks and it is starting to make an appearance as the underlay to several newer enterprise technologies. If you’ve been curious about how it works, and how it is different than what you use today, this show is for you.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 14 – Digging Deep into the IS-IS Routing Protocol appeared first on Network Collective.
In a return to our routing protocol series, Russ White and Nick Russo join Network Collective to talk about some of the intricacies of the IS-IS routing protocol. While not usually found in enterprises, Service Providers have used IS-IS as the underlay to their MPLS networks and it is starting to make an appearance as the underlay to several newer enterprise technologies. If you’ve been curious about how it works, and how it is different than what you use today, this show is for you.
Show Links
https://www.iso.org/standard/30932.html
https://tools.ietf.org/html/rfc1142
https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm
Show Notes
A new Enea white paper discusses how the proliferation of cloud-based business applications is driving a need for a next-level NFV.
Docker claims to have migrated an app developed in 2005 to Azure.
The post Worth Reading: Responsible Encryption Fallacies appeared first on rule 11 reader.
We’re pleased to announce that after a year of intensive work by IPv6 experts around the world, supported by the Deploy360 team, the RIPE community has reached consensus on the Best Current Operational Practices (BCOP) for IPv6 prefix assignment for end-users – persistent vs non persistent and what size to choose. These were officially published as RIPE-690 this week.
RIPE-690 outlines best current operational practices for the assignment of IPv6 prefixes (i.e. a block of IPv6 addresses) for end-users, as making wrong choices when designing an IPv6 network will eventually have negative implications for deployment and require further effort such as renumbering when the network is already in operation. In particular, assigning IPv6 prefixes longer than /56 to residential customers is strong discouraged, with /48 recommended for business customers. This will allow plenty of space for future expansion and sub-netting without the need for renumbering, whilst persistent prefixes (i.e. static) should be highly preferred for simplicity, stability and cost reasons.
The target audience of RIPE-690 is technical staff working in ISPs and other network operators who currently provide or intend to provide IPv6 services to residential or business end-users. Up until now, there have been no clear Continue reading
Learn about the fast-growing technology that's reshaping enterprise storage.
Learn about the fast-growing technology that's reshaping enterprise storage.
David Gee (whom I finally met in person during recent ipSpace.net Summit) published a fantastic series of articles on what someone bringing together networking, development and automation should know and do.
Read more ...