On 6 June 2017, Internet Society President & CEO Kathy Brown spoke at the Opening Session of the Next Generation Internet Summit at the European Parliament in Brussels, Belgium. These are her remarks as prepared.
Good Afternoon ladies and gentleman, Honorable colleagues and friends.
Thank you, President Bonvicini for your very gracious invitation to speak at this prescient Summit on the Next Generation Internet.
Today is a big day for us over here at Cumulus Networks! We are pleased to announce the launch of a brand new product designed to bring you unparalleled network visibility & remediation. The newest addition to the Cumulus Networks portfolio, NetQ, is a telemetry-based fabric validation system that ensures the network is behaving as it was intended to. It allows you to test, validate and troubleshoot using advanced fabric-wide telemetry and Cumulus Linux.
To respond to the evolving industry, increasing business demands and growth, many companies have started the web-scale journey by deploying a fully programmable fabric with fully automated configurations across an open network infrastructure. Companies that have implemented some of these best practices are quickly seeing the benefits of agility, efficiency and lowered costs.
However, these organizations are also facing some unknowns: They are worried about making ad-hoc changes that disrupt the network and they can’t easily demonstrate “network correctness.” They’re interested in moving towards intent-based networking methods, but don’t have the right technology in place to do so.
Traditional operations tools and workflows weren’t built for the speed and scale that a modern cloud data center needs as they are manual, reactive and Continue reading
IDC research shows many enterprises plan to buy SD-WAN from a service provider.
This morning while looking at new blog posts I came across one that grabbed me. For forever and a day …
The post Cisco CCIE/CCDE Recertification Update appeared first on Fryguy's Blog.
These eight cities offer the best IT career prospects for new college graduates.
Last week I published self-study exercises for the YAML and Jinja2 modules in the Ansible for Networking Engineers webinars, and a long list of review questions for the Using Ansible and Ansible Deeper Dive sections.
I also reformatted the webinar materials page. Hope you’ll find the new format easier to read than the old one (it’s hard to squeeze over 70 videos and links on a single page ;).
Oh, and you do know you get Ansible webinar (and over 50 other webinars) with ipSpace.net subscription, right?
Certification – Major News for Expert Level Recertification
Everyone holding an expert level Cisco certification knows the pain of recertifying. Recertification today is achieved by taking any expert level written exam which means you can take the written in the track you are already certified in (the “safe bet”) or in another track if you want to learn something new. The quality of these written exams have varied over the years. Some revisions have been very difficult to pass even for people that are masters of their trade due to the pool of questions not being as high quality as can be expected from an expert level exam. This has been debated for years.
Every two years the pain of recertifying kicks in. Taking the written exam costs around 400$ per attempt depending on local rates, VAT etc. Many people have had to go through multiple attempts to recertify and some have chosen other written exams than their own track because the written of that track was not up to par quality-wise.
Over the years we have been many that have suggested that there must be a better path to getting recertified. Many of us go to Cisco Live, write Continue reading
Cybersecurity, as defined by Merriam-Webster, is “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.”
—
The true importance of cybersecurity can only be understood if our dependence on “computer systems” is understood. It is difficult to imagine a day using nothing that is actively dependent on technology. We depend on connected systems to purchase groceries, perform medical procedures, manage the delivery of utilities and facilitate communications. These systems facilitate safe travel and alert us of impending dangers. It is conceivable that a cyberattack could take the power grid offline making it difficult or impossible to fill a car with fuel, purchase groceries, receive healthcare and even gain access to the typical procedures to restore the grid itself.
In our world today, unless we are primitive camping, we are using products of computer systems continually. To state it differently, our lives would change drastically if these systems became under widespread compromise. Considering Maslow’s hierarchy of needs, most individuals in a civilized society depend on computer systems for most of the elements defined in the critical first two layers. Since we have built this dependence, we must also protect these systems Continue reading