When you try to use UNC (Universal Naming Convention) to access a share on a different server, multiple components come...
JoinedMay 2, 2023
Articles646
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Broadcom’s acquisition of VMware for $61 billion has prompted questions about what Broadcom plans to do with the virtualization giant’s...
If you operate Palo Alto Networks firewalls, are you taking full advantage of the critical log data they generate? Palo...
COR-PALO-A# show location ip 8.8.8.8 United States...
The world of networking is in constant evolution. Among the players steering this transformation are Cisco Nexus switches, renowned for...
Palo Alto Networks’ firewall technology includes the capability to identify applications with App-ID and control the traffic based on Service...
To use the curl command to search for a PDF file on a website, you can use the following command:...
Table of Contents 1. Objectives 2. Stakeholders 3. RTO/RPO Targets 4. Hurricane Trigger Points 5. Communication Plan 6. Pre-Hurricane...
Cisco’s Virtual Port Channel (vPC) technology has been a cornerstone in modern data center network designs, offering device-level redundancy. While...
vPC, or Virtual PortChannel, is a fundamental technology in modern networking that allows links to be aggregated across multiple physical...