Some days it’s all I can do to wearily lift my eyes from my desk, peer over the top of my monitor, and look across my basement at the squat rack.
I should’ve lifted this morning, but as usual I went to bed too last night watching the latest episode of The Expanse and couldn’t get up early enough to get a proper lift in before work.
It’s still there now, loaded with my warmup weight, waiting for me to do something useful with it.Continue reading “The Hardest Part is Just Starting”
Years ago I had a manager explain in casual conversation that if a technology professional wanted to grow and advance to a high level they’d have to relocate out of upstate New York.
However, I just don’t think that really matters anymore.Continue reading “Get Plugged Into the Global Tech Community”
When planning for an SD-WAN, I like to start with these ten questions to determine my high-level design and initial implementation strategy. This is just scratching the surface, but it helps me get moving with an actual design and migration strategy.Continue reading “Top 10 Questions to Ask When Planning a New SD-WAN”
I have the luxury and privilege to work on some very interesting projects. Sometimes it’s advanced routing, sometimes it’s working with brand-new technology, and sometimes it’s a very interesting and unique use case.
However, it never ceases to amaze me that some the most important skills and technical knowledge I’ve gained over the years is understanding how to calculate a power budget for an IDF, the difference between an L620P and 620P cord, the difference between various types of fiber, and remembering to ask my customer about the direction of airflow in their data center.
When designing real-world networks, it really is the overall picture we have to keep in mind. Speeds and feeds, bits and bytes, and all the syntax in the world isn’t enough to properly design a real-work network that you can actually power on and plug into.
Over the past five or six years we’ve heard plenty of discussion around the slow and steady demise of monolith single-vendor networking and a shift to multi-vendor environments. Due to the rise of disaggregation, whitebox networking, and to an extent even vendor agnostic network automation, we should all be running multivendor networks by now.
This year I started to get very bored with tech podcasts. There seemed to be a new one every day. Sometimes high quality content and production, sometimes mediocre.
“Ugh, not another tech podcast”, I’d think to myself, rolling my eyes.
As deep as a blade server and with a couple power supplies hanging out of the back, some of those one rack unit switches are pretty heavy in spite of their pizza-box form factor. I remember years ago I installed a pair of Nexus 5k switches in a building MDF, but since they were both heavy and used rails instead of rack screws, I just couldn’t rackmount them by myself.
I think it’s safe to say network automation is pretty mainstream now. Judging by what vendors are doing and what the community is talking about, automation is more than the latest advent of hipster networking. It’s becoming the primary way many network admins manage their networks.
But there are a couple barriers to taking the leap into automation. For some it’s the steep learning curve. There are courses to take, programming languages to learn, and entirely new processes to get comfortable with.
But I’ve worked with enough network engineers over the years to say that a steep learning curve is not an insurmountable problem. Many engineers I’ve worked with have an eagerness to learn new things and grow in their profession.
I don’t believe the issue is learning how to automate a network. I think the real barriers are the time and resources it takes to automate a network at scale in a meaningful way.
Just recently, the inimitable Greg Ferro took an interesting look at DHCP and explained in a blog post:
“During a recent discussion on DHCP I realised that this process is a near perfect expression of intent.”
The process he’s referring to is DHCP, and notice that he went beyond identifying the DHCP process as an example of automation but also as a “near perfect expression of intent.”
I disagree with Greg’s conclusion, and here’s why.
“Zoom bombing” is when uninvited (and unwanted) Zoom meeting attendees hijack a video conference with unwanted and inappropriate content including audio, video, screensharing, or even transferring unwanted files in chat.
Many companies, schools, churches, and even individuals having video calls with their family rely on Zoom trying to continue life as normal during the current COVID-19 crisis. Keeping these video conferences safe, smooth and productive has been a challenge, so here are 10 settings you can use right now to help prevent Zoom bombing.
During the coronavirus self-quarantine, my kids have been taking advantage of video conferencing for many of their classes. In the very brief video below, I go through a few of the settings I select in Zoom to optimize the audio quality for my daughters’ piano lessons.
If you’ve recently found yourself temporarily homeschooling your kids as a result of the COVID-19 pandemic, there are some lessons I’d like to share that my wife and I learned from 10 years of homeschooling our own kids. Before we get started, there’s one overarching truth you need to accept right away:
Homeschooling is hard work.
It takes effort, self-discipline, organizational skill, time-management, and to an extent even financial resources, to provide your children with a solid education, even if it’s for only a few weeks or months.
Juggling homeschooling with your day job will be difficult. Balancing instruction and running errands will be tough. Managing three kids doing three different assignments will be no easy task. But I promise that though it’ll be challenging, it will also be incredibly rewarding for both you and your children.
So let’s get started.
Path probing. Intelligent path selection. Application-aware routing. The aggregation of divergent internet links. Those are the things we talked about when SD-WAN was still an emerging technology, but that’s not the case anymore.
Today, a discussion about SD-WAN is a discussion about cloud connectivity.
As SD-WAN shifts from an emerging technology to a maturing technology, several real-world use cases have emerged, and right at the forefront is how we connect to our public cloud resources and SaaS applications.
I’ve always been interested in how we use language. Why do we choose certain words over others? Why do we speak one way, but write our emails in a completely different way?
In particular, I’ve always been fascinated with dialects and colloquialisms, and our beloved tech industry, a veritable cornucopia of eye-rolling and groan-worthy jargon, does not disappoint.
Here’s a list of some of my favorite tech industry phrases. It’s a few of those short rhyming phrases (or almost rhyming) that we use a lot, but it’s not a list of every tech marketing word I could think of. Frankly, I don’t think I have enough cycles to synergize such a digitally transformative list anyway 🙂
I’ve spent a lot of time thinking about intent based networking – trying to define it – identifying its core tenets. Without a library of IETF drafts to go by, I listened to vendors explain their platforms, I read their whitepapers, I explored their solutions trying to figure out the commonalities among them and pinpoint exactly what they were all really trying to do.
I believe I came to a pretty good conclusion. IBN is a closed loop system of analytics, orchestration, and continuous validation. And in that process micro-configuration is abstracted from the network operator and replaced with higher level macro-configurations otherwise known as “intent.”
Using that definition, is Cisco Software Defined Access intent based networking?
Last night my buddy, Kermit the Frog, and I were hanging out talking about that Twitter conversation yesterday all around BGP – how bad it is – how great it is.
Either way, it got us thinking about all the crazy times we’ve had working with providers over the years setting up new BGP adjacencies.
Kermit decided to write a song about it, and since I’m not a great singer, Kermit took that part, and I just ran the soundboard.
He calls it “Stable Connection.”
We hope you like it.
In this video, I give some basic tips and advice for public speaking. I discuss some ways to create an effective presentation as well as some methods for delivering a great speech.
Once in a while the Cisco ISE web service doesn’t start after a reboot of the server, and though less frequent, sometimes the service just stops in a running production server. This means the Admin portal is unavailable, though ISE may be working properly otherwise. In this post I’ll go over a couple commands that can help.
The ability for IT to change at the pace of business.
These are a few bullet points used by vendors, marketers, and some technology analysts to describe the main goal of IT today. The ability to deploy services quickly sounds great, but I’m not sure this is truly top of mind for most network operators.