Cisco and Apple Agree: QoS Marking Is an Application Problem

Cisco and Apple announced the first fruits of their partnership at Cisco Live Europe. Ivan Pepelnjak wrote up his thoughts on the announcements. Overall, he was delighted to find that the two companies are letting admins bring QoS to apps on Cisco networks. He runs through some of the potential problems in the solution, but overall finds it well thought out.


ASICs Behind the Scenes

ASICs Behind the Scenes


Arista EOS Available on Whitebox Switches

Arista EOS Available on Whitebox Switches


Networking Field Day 9 Wrap-up on Software Gone Wild

Networking Field Day 9 Wrap-up on Software Gone Wild


Cisco ACI – a Stretched Fabric That Actually Works

Cisco ACI – a Stretched Fabric That Actually Works


Response: Why Technology Still Matters

Response: Why Technology Still Matters


Response: We Dislike People Quoting Gartner

Response: We Dislike People Quoting Gartner


BGP Configuration Made Simple with Cumulus Linux

BGP Configuration Made Simple with Cumulus Linux


Recommended Resource For SDN

Recommended Resource For SDN


Myths That Refuse to Die: Scalability of Overlay Virtual Networking

Myths That Refuse to Die: Scalability of Overlay Virtual Networking


Networking Field Day 9: Brief Recap

Networking Field Day 9: Brief Recap


Per-Packet Load Balancing on WAN links

Per-Packet Load Balancing on WAN links


Whiteboarding Cisco ACI on Software Gone Wild

Whiteboarding Cisco ACI on Software Gone Wild


Interop New York: It Was Great Fun

Interop New York: It Was Great Fun


Data Center Protocols in HP Switches

Data Center Protocols in HP Switches


Post #2000

Post #2000


PLNOG 11 Interviews: Ivan Pepelnjak (NIL Data Solutions)

PLNOG 11 Interviews: Ivan Pepelnjak (NIL Data Solutions)


Cisco Nexus 9000 and ACI: Promising P V Architecture

Cisco Nexus 9000 and ACI: Promising P V Architecture


Use ThousandEyes to Implement IP SLA on Steroids

Use ThousandEyes to Implement IP SLA on Steroids


Can You Find SQL Injection Vulnerabilities with Spirent Avalanche NEXT?

Can You Find SQL Injection Vulnerabilities with Spirent Avalanche NEXT?