Accepting credit card payments is a fundamental business requirement in the digital transformation era. For enterprises, choosing the correct method...
JoinedMay 2, 2023
Articles646
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Designing and building server infrastructure at scale involves planning, implementing, and managing servers that support applications, databases, high-traffic websites, large...
Both `BPDU Filter` and `BPDU Guard` are features of the Spanning Tree Protocol (STP) used to control the behavior of...
When looking at logs, they are usually UTC. This script helps convert the time zone from EST to UTC &...
In the world of networking, segregating traffic and maintaining isolated environments within a single piece of hardware is often crucial....
When configuring firewall settings, particularly in a Zone Protection profile on Palo Alto Networks (PAN-OS), it’s important to understand the...
Designing and building network infrastructure at scale involves planning, implementing, and managing computer networks that support wireless network services, high-traffic...
Dell’s commitment to network efficiency and security has ushered in an innovative feature in its MX configuration – Ethernet with...
In the context of networking and the TCP (Transmission Control Protocol), RST (Reset) and ACK (Acknowledgment) are flags within the...
# Author: Kerry Cordero # Version: 1.0.0 # Description: This script prompts for domain and gets the TLS version for...