Sure, you’re smart and can figure out Cumulus Linux on your own. Or maybe you can’t spare 8 hours for training. If you don’t think you have the time or can benefit from attending the Cumulus Linux Boot Camp as you get started with open networking, here are five good reasons to think again.
Yes, you can actually SAVE time deploying and managing your network by investing time in training. Our Cumulus Linux Boot Camp is an instructor-led, hands-on training course for networking and sysadmins, optimized to get you going quickly with open networking using Cumulus Linux. You could read the documentation and try to figure things out on your own, but why not maximize your time by leveraging a course where the essential information is gathered in a single place, presented in a methodical order?
Our class is taught by technical trainers and consultants who are well-versed with open networking. It’s a great venue to get answers to your questions.
This course includes hands-on labs using switches in our Cumulus Workbench. You’ll run through practical exercises and be provided with lab answers and sample code to increase Continue reading
I am preparing for the CCDE written exam, which I have coming up at CLUS.
There are so much material to go through, both to read as well as watch CL presentations, it can be a bit overwhelming at times.
So if you are thinking about going down this path, learn how to speed-read
Just under a month until we leave for the US. We are looking very much forward to the break!
Just a quick thought for the day!
SDxCentral talked to Alcatel-Lucent’s Heidi Adams about how service providers are deploying carrier-grade virtualized routing functions today, and when it’s best to stick to hardware.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
As cyber security threats have become increasingly sophisticated and pervasive, it’s become impossible to identify and defend against every probable attack with traditional security budgets. That’s where threat intelligence comes in. Effective use of threat intelligence is a way for businesses to pool their resources and overcome internal technical or resource limitations. Theoretically, it allows companies to “crowd source” security and stay one step ahead of malicious entities.
To read this article in full or to leave a comment, please click here
One of the brilliant things about conferences like Interop is the hallways (and if you’re not going to Interop, this is why you should be!). It’s not that I don’t enjoy the sessions, but — like the IETF — I often get much more out of the conversations with folks who know networking, and yet have a completely different view of the problems we face in the networking industry, and hence completely different ideas about the way forward in resolving those problems. One of my major problems in life is I often can’t think of a solid answer when I’m sitting there in the conversation itself (one of the reasons I always converted TAC cases to email, rather than sitting on the phone with a customer).
One such conversation (with @cigoodwi) brought out a phrase I thought I’d never hear in the networking world — “a GUI and a wizard.” The context was this: what most x% (your beliefs about the percentage may vary) companies need is a network they can run with a GUI and a wizard. It’s a startling statement, of course, but — in reality — true in many respects. Given this is our Continue reading
Back in the day, I wasn’t a SNA expert but that was because almost no one was using it. Oh sure, SNA was used by all the big companies to connect their TN5250 terminals to their mainframes using SDLC but back in 1995 there A) weren’t that many companies who could afford to operate a […]
The post SNA was Awful. SDN Isn’t Awful (Yet) appeared first on EtherealMind.