In episode 13, the Network Collective hosts go it alone and take an introspective look at the engineering community, warts and all. We dig into topics relating to ego, hero mentality, overconfidence, short memories, and the negative side of the hype cycle.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 13 – A Look In The Mirror appeared first on Network Collective.
In episode 13, the Network Collective hosts go it alone and take an introspective look at the engineering community, warts and all. We dig into topics relating to ego, hero mentality, overconfidence, short memories, and the negative side of the hype cycle.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 13 – A Look In The Mirror appeared first on Network Collective.
It puts a firewall at the edge of the network or it gets the hose again. Think that’s still how security works? I don’t think so, my friend.
On the Solarwinds Thwack Geek Speak blog I look at how security architectures have changed from when our Mama used to create them, and I even take a moment to mention Greg Ferro (because, well, why not). Please do take a trip to Thwack and check out my post, “Not Your Mama’s Security Architecture“.
Please see my Disclosures page for more information about my role as a Solarwinds Ambassador.
If you liked this post, please do click through to the source at Not Your Mama’s Security Architecture (Thwack) and give me a share/like. Thank you!
Below is the CCDE Practical/Lab exam dates for 2018. As you might know there are four exam yearly. You can attend maximum four times. You don’t have to pass any exam other than CCDE Written Qualification exam to be able to attend CCDE Practical/Lab exam. For the cost, registration process , refund and […]
The post CCDE Practical Exam Dates 2018 appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Amy Arnold talks about her networking career and offers advice to aspiring networking pros.
One of my friends sent me this design challenge:
Assume you’re migrating from another WAN transport technology to MPLS. The existing network has 3000 routes but the MPLS carrier is limiting you to 1000 routes. How could you solve this with MPLS?
Personally, I think MPLS is a red herring.
A better question would be “how do you reduce the number of routes transported across your WAN network” or “how do you reduce the routing interaction with your MPLS service providers” (particularly intriguing if you use more than one of them).
As always, there are several options and it’s impossible to recommend the best one:
Over the last several years I’ve made a couple of efforts to become better at Python. As it stands now – I’d consider myself comfortable with Python but more in terms of scripting rather than actual Python development. What does Python Development mean? To me – at this point – it’s means writing more than a single Python file that does one thing. So why have my previous efforts failed? I think there have been a few reasons I never progressed much past scripting…
Are you from the United States or Canada? If so, there is a big chance you had sensitive personal information stolen in the biggest data breach of the summer. Equifax, a major consumer credit agency in North America, experienced a data breach resulting in the loss of the personal information of over 140 million individuals, which puts its victims at increased risk of identity theft and other forms of fraud. The Equifax breach is on a massive scale, but it is only the latest in a very long list of reported data breaches in recent years. According to Gemalto, over nine billion individual records have been lost or stolen in reported data breaches since 2013 – and the vast majority of breaches go unreported. Data handlers of all types continue to act irresponsibly, failing to protect the data of their users or to even attempt to apply basic data protection procedures.
How data handlers protect the privacy of user data isn’t working.
The dominant approach to data handling, based around the concepts of risk and compliance, is over 35-years-old. With this approach, data handlers try to adhere to regulatory requirements and minimize the risk to themselves – not necessarily Continue reading
Extreme will purchase Brocade's networking assets directly from Brocade.
New public cloud networking, compute, and storage features stomp on AWS, the company claims.