An interview with Mohamed Radwan (Part One)
Today, we’ll be interviewing Mr. Mohamed Radwan, the award-winning network architect, and a top-notch consultant and trainer. Radwan is both a CCDE | CCIE certified individual with a curriculum too [...]
Today, we’ll be interviewing Mr. Mohamed Radwan, the award-winning network architect, and a top-notch consultant and trainer. Radwan is both a CCDE | CCIE certified individual with a curriculum too [...]
It’s finally here, your dream job as a Network Designer in a newly established local service provider. You received the acceptance e-mail yesterday, and today is your first day on [...]
NFV is believed to be a main pillar of any enterprise digital transformation. Latest Market Surveys are all pointing to a wide adoption from Mobile Operators with ISPs. NFV Promise [...]
In the previous posts, we outlined the use of Ansible in Network Automation and how to use NAPALM in multi-vendor networks for both Configuration deployment and Validation. Next, we outlined how [...]
In this article, we continue what we have started in the previous two articles focusing on Network Automation with Ansible and NAPALM. In the first article, we introduced Ansible and [...]
Test Results and Conclusion This is the last article in the series where we have discussed how to use NFV (Network Functions Virtualization) to secure your network and react promptly [...]
In the previous article, we introduced Ansible and how it can be used to manage network devices and how to use NAPALM as a common API to manage multiple vendor [...]
In the New Era of SDN and NFV and the push towards network programmability and automation, the usual method of deploying new changes on the network and validating the network [...]
Test Methodology and Tools This Series of articles explain How to use emerging technologies such as NFV (Network Functions Virtualization) to secure your network and adapt promptly to security threats [...]
How to use NFV to Guard your “Environment”? -- 2nd Episode In this article, we will continue what we have started in the first article; How to use emerging technologies [...]