Please join us in congratulating the following iPexpert students who have passed their CCIE lab!
Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!
A brand new podcast -- Datanauts -- has launched! Here's the summary of episode 1. The latest form factor, hyper-converged infrastructure, seems to be storming through the data center market like a thundering donkey with a rainbow laser cannon. Join the Datanauts as they pick apart the pros and cons of hyper-converged, ramble on about architecture and design challenges, and shine a piercing light into a dark and murky corner of the next generation data center!
The post Datanauts 001 – Hyper Convergence with Scott D. Lowe appeared first on Packet Pushers Podcast and was written by Ethan Banks.
A new use case solution from Brocade discusses its Virtual Customer Edge framework, showing how it helps service providers (SPs) transition from outdated CPEs to flexible, dynamic virtualized edge solution
This week we announced our partnership with CloudGov Technologies, a third platform IT Solutions provider servicing the government and commercial markets. This partnership helps federal agencies address the increasing need for scalable, agile and distributed data center networks built for third platform computing workloads. As a result of this partnership, a large U.S. government agency recently deployed our solutions to automate the provisioning and deployment of more than 30,000 virtual desktops with minimal administration. The deployment significantly improves application user experience and performance by optimizing the flow of east-west traffic across its virtualized data center.
Interested in learning more? Drop us a line at [email protected] to schedule a demo or stop by booth #7071 at the AFCEA Defensive Cyber Operations Symposium from June 16-18 in Baltimore. We will be showcasing our third platform solution alongside CloudGov Technologies.
Below please find a few of our top picks for our favorite news articles of the week. Enjoy!
Fortune: 5 things that keep tech execs up at night
By Barb Darrow
Pity the poor soul at your company who is in charge of technology decisions. Whether that person is the CIO, the director of engineering, vice president of IT, or Continue reading
The who, what, where, when and why.
As a mainframer, I belong to a number of organizations and groups that focus on this technology. And when I read message boards, Web sites, magazines, and blogs about big iron one theme always comes through loud and clear: my peers are overwhelmingly negative about their jobs.
In fact, some recent polls highlighting employee job dissatisfaction paint a fairly grim picture. A recent Gallup Poll is here. The Washington Post poll is here. And a Forbes poll is here.
To read this article in full or to leave a comment, please click here
A look at the role each group is playing in the evolution of NFV.
In this "nominal 15 minute analysis" I"m looking at technology convergence and how it needs standards for the market to operate.
The post Convergence & Standards in IT Infrastructure appeared first on EtherealMind.
According to the Data Center Journal:
What’s the problem with IT resumes? They’re useless.
The real problem with IT resumes, though, is we want to see a long list of technologies, because we want to find the specific technology we want to implement (or are implementing) — rather than a good engineer. The hiring process is a fishing expedition rather than a search for solid talent and personality fit. If we want to fix this problem we can. The question is — do we want to?
Bruce Schneier has some wise thoughts on airport security this week —
We don’t need perfect airport security. We just need security that’s good enough to dissuade someone from building a plot around evading it. If you’re caught with a gun or a bomb, the TSA will detain you and call the FBI. Under those circumstances, even a medium chance of getting caught is enough to dissuade a sane terrorist
Replace “airport” with “network,” and you get the drift of where network security is going, I think. Of course, there’s the reality that you can’t stop insane attackers… Worth remembering. The same point can be made for network uptime, by the way. Perfection is Continue reading

If you liked this post, please do click through to the source at The IOS XR CLI and give me a share/like. Thank you!
Earlier today a massive route leak initiated by Telekom Malaysia (AS4788) caused significant network problems for the global routing system. Primarily affected was Level3 (AS3549 – formerly known as Global Crossing) and their customers. Below are some of the details as we know them now.
Starting at 08:43 UTC today June 12th, AS4788 Telekom Malaysia started to announce about 179,000 of prefixes to Level3 (AS3549, the Global crossing AS), whom in turn accepted these and propagated them to their peers and customers. Since Telekom Malaysia had inserted itself between these thousands of prefixes and Level3 it was now responsible for delivering these packets to the intended destinations.
This event resulted in significant packet loss and Internet slow down in all parts of the world. The Level3 network in particular suffered from severe service degradation between the Asia pacific region and the rest of their network. The graph below for example shows the packet loss as measured by OpenDNS between London over Level3 and Hong Kong. The same loss patterns were visible from other Level3 locations globally to for example Singapore, Hong Kong and Sydney.
At the same time the round trip time between these Continue reading
How does Internet work - We know what is networking
Flowing text is a project done as a part of academic work that I am involved with for last few years at the University of Rijeka – Department of Informatics. It’s a short overview at latest achievements in the field of network automation with some lab experiments done to test different paths across the network. The work was presented at 6th International Conference on Information Technologies and Information Society (ITIS2014). The scope of ITIS events are the applications of IT, particularly in social sciences. The conference also covers a wider range of topics related to IT and computational modeling and