Finally, I have published my new CCDE book titled CCDE In-Depth. The much-awaited book is available in three version: PDF, Kindle and Paperback versions. You can purchase the PDF version directly from this website. And if you need the Kindle and Paperback version, it is available on Amazon. Why This Book Is the Best for CCDE […]
The post CCDE In-Depth: The New CCDE Book of Orhan Ergun Is Available appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
To ensure optimal performance, check your TCP maximum segment size.
CTO Singh leaves Cisco, Why Google's Network Needs 5 Controllers, and Top 10 Acquisitions.
The networking industry continued to morph with several significant acquisitions so far this year.
How Does Internet Work - We know what is networking
If you want to send or store data and be sure it is safe from being intercepted, you will use Cryptography. Cryptography uses chipper as mathematical virtual lock to make data scrambled so that is not understandable if intercepted by unauthorized third parties. There are different cryptography techniques, some of them are: encryption, hashing, and steganography. Cryptography can be differentiated by usage of different key types: Symmetric Key Encryption Asymmetric Key Encryption Symmetric Key Encryption is sometimes known as Secret Key Cryptography. Main characteristic of this type of cryptography is the same key usage in encryption and decryption of transferred
Got this comment on my Network Automation RFP Requirements blog post:
Looks like you are paid shill for Brocade based on the quote earlier in your blog "The Pass/Fail information included below was collected to the best of my knowledge with extensive help from Jason Edelman, Nick Buraglio, David Barroso and several Brocade engineers (THANK YOU!)."
Hooray, one more accolade to add to my list of accomplishments. And now for a few more details:
Read more ...