Archive

Category Archives for "Networking"

Got my number!

After a week of waiting (why this is taking so long? this wasn’t a particularly pleasant week), I finally got my number.

Brand new JNCIE-DC #31 !!!

The main note about the lab – time management is the most important thing on the exam. Don’t rush to the keyboard, read and understand all the tasks and it’s interdependencies. Have a plan regarding order of tasks – not all tasks can be completed in order in which they written. Don’t be affraid to skip some tasks if it takes a long time.

I am quite pleased with the level of my preparation for the lab – there were no unexpected or incomprehensible tasks. General feeling about JNCIE-DC lab – this is interesting, pretty complex but fair exam. Lot of tasks on various themes, I think all themes from blueprint are covered in the lab in some ways.

As the proctor told me, the main difficulty of this exam is that it’s something new, and people are afraid of a new and unexpected. I want to tell you – don’t be afraid! If you’re interested in learning a Juniper way of building Data Center networks, and also want to earn one more pretty Continue reading

Automating Documentation

Tedium is the enemy of productivity. The fastest way for a task to not be done is to make it long, boring, and somewhat complicated. People who feel that something is tedious or repetitive are the ones more likely to marginalize a task. And I think I speak for the entire industry when I say that there is no task more tedious and boring than documentation. So how can we fix it?

Tell Me What You Did

I’m not a huge fan of documentation. When I decide on a plan of action, I rarely write it down step-by-step unless I’m trying to train someone. Even then, it looks more like notes with keywords instead of a narrative to follow. It’s a habit that has been borne out of years of firefighting in networks and calls to “do it faster”. The essential items of a task are refined and reduced until all that remains is the work and none of the ancillary items, like documentation.

Based on my previous life as a network engineer, I can honestly say that I’m not alone in this either. My old company made lots of money doing network discovery engagements. Sometimes these came because the Continue reading

Microsoft acquires cloud-based HPC developer

Microsoft pulled off a big get with its acquisition of Cycle Computing, the developer of a suite of high-performance computing (HPC) services called CycleCloud for cloud orchestration, provisioning and data management in the cloud.You may not know its name but Cycle Computing is actually a major player. In 2012, it helped Amazon create the first massive cloud-based supercomputer, spanning 51,000 cores. For just one hour of run time, the bill was $5,000.+ Also on Network World: Azure Stack: Microsoft’s private-cloud platform and what IT pros need to know about it + In 2013, Cycle Computing hit its biggest cloud run, creating a cluster of 156,314 cores with a theoretical peak speed of 1.21 petaflops that ran for 18 hours and spanned Amazon data centers around the world. The bill for that monstrosity was $33,000. To read this article in full or to leave a comment, please click here

Microsoft acquires cloud-based HPC developer

Microsoft pulled off a big get with its acquisition of Cycle Computing, the developer of a suite of high-performance computing (HPC) services called CycleCloud for cloud orchestration, provisioning and data management in the cloud.You may not know its name but Cycle Computing is actually a major player. In 2012, it helped Amazon create the first massive cloud-based supercomputer, spanning 51,000 cores. For just one hour of run time, the bill was $5,000.+ Also on Network World: Azure Stack: Microsoft’s private-cloud platform and what IT pros need to know about it + In 2013, Cycle Computing hit its biggest cloud run, creating a cluster of 156,314 cores with a theoretical peak speed of 1.21 petaflops that ran for 18 hours and spanned Amazon data centers around the world. The bill for that monstrosity was $33,000. To read this article in full or to leave a comment, please click here

Microsoft acquires cloud-based HPC developer

Microsoft pulled off a big get with its acquisition of Cycle Computing, the developer of a suite of high-performance computing (HPC) services called CycleCloud for cloud orchestration, provisioning and data management in the cloud.You may not know its name but Cycle Computing is actually a major player. In 2012, it helped Amazon create the first massive cloud-based supercomputer, spanning 51,000 cores. For just one hour of run time, the bill was $5,000.+ Also on Network World: Azure Stack: Microsoft’s private-cloud platform and what IT pros need to know about it + In 2013, Cycle Computing hit its biggest cloud run, creating a cluster of 156,314 cores with a theoretical peak speed of 1.21 petaflops that ran for 18 hours and spanned Amazon data centers around the world. The bill for that monstrosity was $33,000. To read this article in full or to leave a comment, please click here

Microsoft acquires cloud-based HPC developer

Microsoft pulled off a big get with its acquisition of Cycle Computing, the developer of a suite of high-performance computing (HPC) services called CycleCloud for cloud orchestration, provisioning and data management in the cloud.You may not know its name but Cycle Computing is actually a major player. In 2012, it helped Amazon create the first massive cloud-based supercomputer, spanning 51,000 cores. For just one hour of run time, the bill was $5,000.+ Also on Network World: Azure Stack: Microsoft’s private-cloud platform and what IT pros need to know about it + In 2013, Cycle Computing hit its biggest cloud run, creating a cluster of 156,314 cores with a theoretical peak speed of 1.21 petaflops that ran for 18 hours and spanned Amazon data centers around the world. The bill for that monstrosity was $33,000. To read this article in full or to leave a comment, please click here

63% off Anker SoundCore 2 Bluetooth Speaker with 24-Hour Playtime – Deal Alert

SoundCore 2 From Anker produces outstanding audio from an astonishingly compact speaker. Upgraded 2x 6W drivers blast out rich, clear sound. IPX5 water-resistant rating and dustproof engineering mean you can bring your beats anywhere - from the garden, to the beach. Upgraded materials provide smooth touch, and better grip. Listen for up to 66ft with latest Bluetooth 4.2 technology, while an in-built microphone makes hands-free calling a breeze. If you find yourself without BlueTooth, an aux port allows you to plug in and play. And a 24-hour / 500-song playtime means you can listen all day. The SoundCore 2 from Anker's typical list price has been reduced 63% to just $33.59. See this deal on Amazon.To read this article in full or to leave a comment, please click here

63% off Anker SoundCore 2 Bluetooth Speaker with 24-Hour Playtime – Deal Alert

SoundCore 2 From Anker produces outstanding audio from an astonishingly compact speaker. Upgraded 2x 6W drivers blast out rich, clear sound. IPX5 water-resistant rating and dustproof engineering mean you can bring your beats anywhere - from the garden, to the beach. Upgraded materials provide smooth touch, and better grip. Listen for up to 66ft with latest Bluetooth 4.2 technology, while an in-built microphone makes hands-free calling a breeze. If you find yourself without BlueTooth, an aux port allows you to plug in and play. And a 24-hour / 500-song playtime means you can listen all day. The SoundCore 2 from Anker's typical list price has been reduced 63% to just $33.59. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Network Interconnections Video by Orhan Ergun

Network Interconnections is one of the most important topics for the operator network as it directly related with the cost of the sending traffic out from their networks.   I published a network interconnection video on my Facebook page. I explain the peering types, settlement free peering , paid peering , remote peering , IP […]

The post Network Interconnections Video by Orhan Ergun appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IDG Contributor Network: Can the US Senate secure the Internet Of Things?

As a free and open internet continues to come under assault by the FCC’s proposal to effectively end net neutrality, investors, programmers, and internet-users of all stripes have vociferously voiced their support of the Internet of Things and the open web that enables it. It appears those voices have been heard, as the US Senate may be taking steps to secure the Internet of Things’ future.So what exactly is the senate up to, and how might its actions impact the health of the Internet of Things? What are the specifics of the bill in question, and how might its text impact American’s everyday lives as they make use of the IoT?A hopeful bill A new bipartisan bill published Tuesday by Sen. Mark Warner and Sen. Cory Gardner, the Internet of Things Cybersecurity Improvement Act of 2017, hopes to beef up America’s internet security. The bill highlights the enormous complexity of the IoT and the huge benefits it provides to the American economy, but also notes the fragility and vulnerability of the system to outside attacks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can the U.S. Senate secure the Internet of Things?

As a free and open internet continues to come under assault by the FCC’s proposal to effectively end net neutrality, investors, programmers, and internet users of all stripes have vociferously voiced their support of the Internet of Things (IoT) and the open web that enables it. It appears those voices have been heard, as the U.S. Senate may be taking steps to secure the IoT's future.So, what exactly is the U.S. Senate up to, and how might its actions impact the health of the IoT? What are the specifics of the bill in question, and how might its text impact American’s everyday lives as they make use of the IoT?A hopeful IoT security bill A new bipartisan bill published Tuesday by Sen. Mark Warner (D-Va.) and Sen. Cory Gardner (R-Colo.), the Internet of Things Cybersecurity Improvement Act of 2017, hopes to beef up America’s internet security. The bill highlights the enormous complexity of the IoT and the huge benefits it provides to the American economy, but it also notes the fragility and vulnerability of the system to outside attacks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can the U.S. Senate secure the Internet of Things?

As a free and open internet continues to come under assault by the FCC’s proposal to effectively end net neutrality, investors, programmers, and internet users of all stripes have vociferously voiced their support of the Internet of Things (IoT) and the open web that enables it. It appears those voices have been heard, as the U.S. Senate may be taking steps to secure the IoT's future.So, what exactly is the U.S. Senate up to, and how might its actions impact the health of the IoT? What are the specifics of the bill in question, and how might its text impact American’s everyday lives as they make use of the IoT?A hopeful IoT security bill A new bipartisan bill published Tuesday by Sen. Mark Warner (D-Va.) and Sen. Cory Gardner (R-Colo.), the Internet of Things Cybersecurity Improvement Act of 2017, hopes to beef up America’s internet security. The bill highlights the enormous complexity of the IoT and the huge benefits it provides to the American economy, but it also notes the fragility and vulnerability of the system to outside attacks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can the U.S. Senate secure the Internet of Things?

As a free and open internet continues to come under assault by the FCC’s proposal to effectively end net neutrality, investors, programmers, and internet users of all stripes have vociferously voiced their support of the Internet of Things (IoT) and the open web that enables it. It appears those voices have been heard, as the U.S. Senate may be taking steps to secure the IoT's future.So, what exactly is the U.S. Senate up to, and how might its actions impact the health of the IoT? What are the specifics of the bill in question, and how might its text impact American’s everyday lives as they make use of the IoT?A hopeful IoT security bill A new bipartisan bill published Tuesday by Sen. Mark Warner (D-Va.) and Sen. Cory Gardner (R-Colo.), the Internet of Things Cybersecurity Improvement Act of 2017, hopes to beef up America’s internet security. The bill highlights the enormous complexity of the IoT and the huge benefits it provides to the American economy, but it also notes the fragility and vulnerability of the system to outside attacks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can the U.S. Senate secure the Internet of Things?

As a free and open internet continues to come under assault by the FCC’s proposal to effectively end net neutrality, investors, programmers, and internet users of all stripes have vociferously voiced their support of the Internet of Things (IoT) and the open web that enables it. It appears those voices have been heard, as the U.S. Senate may be taking steps to secure the IoT's future.So, what exactly is the U.S. Senate up to, and how might its actions impact the health of the IoT? What are the specifics of the bill in question, and how might its text impact American’s everyday lives as they make use of the IoT?A hopeful IoT security bill A new bipartisan bill published Tuesday by Sen. Mark Warner (D-Va.) and Sen. Cory Gardner (R-Colo.), the Internet of Things Cybersecurity Improvement Act of 2017, hopes to beef up America’s internet security. The bill highlights the enormous complexity of the IoT and the huge benefits it provides to the American economy, but it also notes the fragility and vulnerability of the system to outside attacks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 ways developers can improve IoT security on their devices

The much-beloved Internet of Things has come to fundamentally reshape how firms in virtually every industry operate. Nonetheless, the 21st century phenomenon that’s connected us all has some significant downsides, chief among them its vulnerability to outside attacks.As consumers and producers of IoT gadgets alike are finding their privacy and security increasingly jeopardized, many don’t know where to turn to for advice. By following these three simple tips, you can enhance your IoT security without creating a needless hassle or paying too much.Ensure your gadgets are patchable A staggeringly large amount of everyday IoT gadgets sold on the market come equipped with pre-prepared passwords which are essentially impossible to change, or, even worse, are just entirely impossible to patch. In the ever-changing digital world of the 21st century, IoT devices need to be patchable so they can be updated to resist the latest trends in malware attacks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 ways developers can improve IoT security on their devices

The much-beloved Internet of Things has come to fundamentally reshape how firms in virtually every industry operate. Nonetheless, the 21st century phenomenon that’s connected us all has some significant downsides, chief among them its vulnerability to outside attacks.As consumers and producers of IoT gadgets alike are finding their privacy and security increasingly jeopardized, many don’t know where to turn to for advice. By following these three simple tips, you can enhance your IoT security without creating a needless hassle or paying too much.Ensure your gadgets are patchable A staggeringly large amount of everyday IoT gadgets sold on the market come equipped with pre-prepared passwords which are essentially impossible to change, or, even worse, are just entirely impossible to patch. In the ever-changing digital world of the 21st century, IoT devices need to be patchable so they can be updated to resist the latest trends in malware attacks.To read this article in full or to leave a comment, please click here

Feedback: Network Automation 101

Some networking practitioners start their network automation journey with the Python or Ansible dilemma. Engineers and architects usually want to understand the bigger picture first, and figure out the potential showstoppers and roadblocks. One of them left this feedback on the Network Automation 101 webinar:

A must-have overview of fundamental Network Automation concepts. I wouldn't face an automation project without understanding these concepts first.