Poolside Networking
Here's an important question every network engineer should be able to answer.
Here's an important question every network engineer should be able to answer.
The source of content goes to mostly Cisco Live & Cisco Validated Designs, but offcoruse it's just an extract of those information.
Please feel free to share your idea, I'm always looking to improve this if I find any other material to add here.
After spending 4 weeks of rereading the Cisco doc I manage to extract this information and put all the pieces together and come up with this cheat sheet, trust me it's not easy at all. Especially when you should follow certain rules for elements such as color, spacing, font and the explanation.
The source of content goes to mostly Cisco Live & Cisco Validated Designs, but offcoruse it's just an extract of those information.
Please feel free to share your idea, I'm always looking to improve this if I find any other material to add here.
In the previous posts I talked about why it’s important to build a network and how you can do it but there is still one component missing. Any guesses?
How do we maintain our network once we have built it?
Stay In Touch
You spent all this time and put effort into building a network. Are you going to let this effort go to waste? I hope not. It’s important to stay in touch every now and then and check in how your friends are doing. This could be by sending an e-mail, a text message, just giving them a call or going for a lunch. Don’t contact them only when you need their assistance. Don’t be a leach. Show that you appreciate them and the help you have received from them in the past.
Return The Favor
One of your contacts helped you with a technology or troubleshooting an issue which helped you move forward in a project. The next time they may require assistance from you. When this time comes, maybe you are very busy at work. Do you simply turn them down? I hope not and if you do don’t expect any help the next time you Continue reading
VMware's head of public cloud efforts is leaving the company.
In this post, I’m going to walk you through the steps to install Ansible 2.x into a Python virtual environment (virtualenv) on OS X. There’s nothing terribly hard or unusual about this process, but I wanted to document it here for folks who might be new to the process (or who might be interested in why using this approach could be beneficial).
I’m stumbled into this process because I had been using Ansible 1.9.x and wanted to upgrade to Ansible 2.x so that I could use some of the new OpenStack-related modules. (These are modules that allow you to manipulate OpenStack-based resources, like instances or networks, using Ansible playbooks, and they were introduced with the release of Ansible 2.x.) The new modules had some additional Python dependencies, and installing these Python dependencies on OS X can be challenging at times (due to System Integrity Protection [SIP]). For example, installing the shade
module on my OS X El Capitan system ran afoul of SIP.
The answer is to use Python virtual environments (aka “virtualenvs”). Virtualenvs provide a mechanism whereby you can isolate Python dependencies between different Python-based projects. You create a Python virtualenv, then Continue reading
CloudFlare recently wrote about the group of cyber criminals claiming to be be the "Armada Collective." In that article, we stressed that this group had not followed through on any of the ransom threats they had made. Quite simply, this copycat group of cyber criminals had not actually carried out a single DDoS attack—they were only trying to make easy money through fear by using the name of the original “Armada Collective” group from late 2015.
Since we published that article earlier this week, this copycat group claiming to be "Armada Collective" has stopped sending ransom threats to website owners. Extorting companies proves to be challenging when the group’s email actively encourages target companies to the search for the phrase “Armada Collective” on Google. The first search result for this phrase now returns CloudFlare’s article outing this group as a fraud.
Beginning late Thursday evening (Pacific Standard Time) several CloudFlare customers began to receive threatening emails from a "new" group calling itself the “Lizard Squad”. These emails have a similar modus operandi to the previous ransom emails. This group was threatening DDoS attacks unless a ransom amount was paid to a Bitcoin address before a deadline. Based on discussions Continue reading
It depends on the ratio of physical to virtual in the network.
HPE has all the pieces, but carriers want open source.
Flash storage is maturing, and the latest products are taking on a more general-purpose storage function.