Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Kerry Cordero
JoinedMay 2, 2023
Articles649
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Data Center

Optimizing Storage Infrastructure: Key Strategies for Dell Compellent

In the dynamic realm of IT infrastructure management, understanding the intricacies of your storage system is not just beneficial—it’s crucial...
Read More
Code

Useful Powershell Commands

I’ll try to keep adding to this list....
Read More
Data CenterServers

HPE & Citrix XenServer

If you are running HPE hardware, see what’s supported below when it comes to Citrix XenServer.  It’s important to keep...
Read More
Wireless

WiFi Signal Strengths

Wireless signal strength is measured in dBm (decibel milliwatts). 0-60 = GOOD 60-80 = WEAK 80-100 = BAD...
Read More
Security

SPF Records

SPF’s are used to help mitigate SPAM emails.  It basically dictates what happens when there’s a failure in a match...
Read More
Laptops & DesktopsServers

Useful Windows Terminal Commands

I’ll try to keep adding to this list....
Read More
Data Center

Best Practices – Data Center and POP Power Cooling

1. Measuring Performance The first step in improving efficiency in a POP or data center is to track energy usage...
Read More
Data CenterServers

HPE & Windows Support

If you are running HPE hardware, see what’s supported below when it comes to Microsoft Windows OS.  It’s important to...
Read More
Security

Palo Alto – Search Filter for Security Polices

There are times I need to search Security rules.  Below is great way to filter in to what you are...
Read More
Security

Windows AD GPP cpassword Exposure

Below I’ll show you how easy it is to get the cpassword.  There are environments where this password could be...
Read More
Load More

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Logging macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 HTTP(S) IP Addressing and Subnetting Logging macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results