Cisco ASA Site-to-Site VPN Best Practices (2026 Update) If you are deploying a site-to-site VPN on Cisco ASA in 2026,...
JoinedMay 2, 2023
Articles685
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
AI Doesn’t Reduce Work—It Intensifies It Why generative AI often expands scope, raises expectations, and changes the structure of technical...
The Internet Visibility Gap: Understanding Accountability Constraints in Cloud Service Delivery Executive Summary As organizations rapidly migrate to cloud-based services,...
Cisco ISE Profiling Guide Device profiling in Cisco Identity Services Engine (ISE) enables network administrators to automatically identify and classify...
From an architecture standpoint, this is the most accurate answer: Both Claude and ChatGPT are fundamentally generative models (they generate...
Understanding VRFs and Front-Door VRFs in a B2B Cisco VPN Design In a dedicated B2B router design, the device is...
Certificate Export Formats Explained (and When to Use Them) Certificate management gets messy fast when different platforms expect different file...
How ISE “Sees” Those Attributes You have two main paths to get that data from the switch to your Profiler....
Overview An Amazon Virtual Private Cloud (VPC) is an isolated virtual network that enables you to launch AWS resources in...
Generative AI produces outputs (content). Agentic AI produces outcomes (actions + verification). In practice, this is less about two competing...