Archive

Category Archives for "Networking"

Checkpoint Portals

All Checkpoint portals are configured under the Gateway properties.
The IP address of the portal must be that of an IP of an interface on the checkpoint (loopback or physical).
Can either use a different IP for each portal or the same IP for all portals. All portals with the same IP address use the same certificate.

Virtual Reality and Skeuomorphism

Remember skeuomorphism? It’s the idea that the user interface of a program needs to resemble a physical a physical device to help people understand how to use it. Skeuomorphism is not just a software thing, however. Things like faux wooden panels on cars and molded clay rivets on pottery are great examples of physical skeuomorphism. However, most people will recall the way that Apple used skeuomorphism in the iOS when they hear the term.

Scott Forrestal was the genius behind the skeuomorphism in iOS for many years. Things like adding a fake leather header to the Contacts app, the wooden shelves in the iBooks library, and the green felt background in the Game Center app are the examples that stand out the most. Forrestal used skeuomorphism to help users understand how to use apps on the new platform. Users needed to be “trained” to touch the right tap targets or to feel more familiar with an app on sight.

Skeuomorphism worked quite well in iOS for many years. However, when Jonny Ive took over as the lead iOS developer, he started phasing out skeuomorphism starting in iOS 7. With the advent of flat design, people didn’t want fake leather and Continue reading

Recap: How to make a Cloudflare App workshop in Austin

Cloudflare hosted a developer preview workshop in Austin for Cloudflare Apps, taught by Zack Bloom, tech lead of Cloudflare Apps. Due to popular request, we are making available the video from the workshop.


Want some ideas on what to start with? Check out the idea suggestion list on our Cloudflare Community page. It's a great idea to review our Apps documentation available here.

Want to request a Cloudflare Apps workshop in your city? Please drop a line to [email protected]

Share your works in progress and compare notes with other developers on the community forum.

BFD is not a Fast Convergence mechanism !

BFD is not a fast convergence mechanism. BFD stands for Bidirectional Forwarding Detection. It is an important tool for the IP layer but there is a confusion in the network community about it.   BFD is a failure detection mechanism. Link and  node failures can be detected with it.   Without BFD, detection can be done at Layer […]

The post BFD is not a Fast Convergence mechanism ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Feedback: Open Networking for Large-Scale Networks

Got this feedback from a network architect attending the Open Networking for Large-Scale Networks webinar:

I used the webinar when preparing for a meeting/discussion with a NOS SW-vendor. In the meeting, my knowledge was completely up-to-speed & I was on the level with the vendor in the discussion! :-)

Obviously, Russ White and Shawn Zandi did a great job based on their real-life hands-on experience (they use whitebox switches @ LinkedIn).

Cisco ASAv Vagrant Box Install

This blog covers how to install Cisco ASAv boxes for use with Vagrant. Cisco does not provide an ASAv Vagrant box on Vagrant cloud but it is possible to create a Vagrant boxes out of the ASAv VMware ova. As you will see it is a bit more involved but well worth the effort. This post assumes...

IDG Contributor Network: Is WAN Optimization Dead?

As an ever present staple of technology in the inventory of any major enterprise, WAN optimizers have begun to lose their luster. While there are still probably thousands in widespread use throughout the world, evolution has conspired to put them on the endangered species list. Do you remember thicknet, thinnet, or token ring? Yup! That kind of endangered! Continue reading

IDG Contributor Network: Is WAN Optimization Dead?

As an ever present staple of technology in the inventory of any major enterprise, WAN optimizers have begun to lose their luster. While there are still probably thousands in widespread use throughout the world, evolution has conspired to put them on the endangered species list. Do you remember thicknet, thinnet, or token ring? Yup! That kind of endangered! Continue reading