tag:blogger.com,1999:blog-74277837939237013412024-03-05T01:29:28.317-08:00Cisco Certified Design ExpertUnknownnoreply@blogger.comBlogger27125tag:blogger.com,1999:blog-7427783793923701341.post-2473557028920083222019-01-14T02:23:00.002-08:002019-01-14T02:23:48.715-08:00Cisco 352-001 Question Answer<b>A service provider creates a network design that runs MPLS in its WAN backbone using OSPF as the IGP routing protocol. What would be two effects of additionally implementing MPLS-TE? (Choose two.)</b><br />
<br /><b>A.</b> MPLS-TE is required to reroute traffic within less than 1 second in case of a link failure inside the backbone.<br /><b>B. </b>MPLS-TE is required to route different MPLS QoS service classes through different paths.<br /><b>C. </b>MPLS-TE and OSPF cannot be used together inside one MPLS network.<br /><b>D. </b>MPLS-TE cannot use OSPF for the traffic path calculation.<br /><b>E. </b>MPLS-TE is required to create backup paths independently from the IGP.<br />
<b><br />Answer: BE</b><br /><br /><br /><b>Which two mechanisms ensure that a network design provides fast path failure detection? (Choose two.)</b><br />
<br /><b>A. </b>BFD<br /><b>B.</b> fast hello packets<br /><b>C.</b> UDLD<br /><b>D. </b>IP Cisco Express Forwarding<br />
<br /><b>Answer: AB</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-274774266965028242018-02-21T02:14:00.002-08:002018-02-21T02:14:53.264-08:00Cisco Service Provider Group Debuts 5 New Automation Capabilities<div class="separator" style="clear: both; text-align: center;">
<img border="0" data-original-height="245" data-original-width="490" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWQsJ6LwVc0ELG82BJZgUUSJDJbbChyphenhyphenvdMcflu7B_F49Ze_90yw_sMC5IXi8rWq2dYBwSXo8hs1iQJuJxbAz7F8xoVj-7cLIkarrZjL9vaYBbhQQ45xlnueEfHT4la1x8lKvoxBJnwtZVm/s640/1.jpg" width="640" /></div>
<br />
The group of service providers of Cisco today introduced its new Crosswork Network Automation system for service providers. The system uses networks based on intention to help operators predict change and react in near real time. Crosswork includes five separate services. "Each of these could have been their own unique launch," said Jonathan Davidson, senior vice president and general manager of Cisco service provider networks.<br />
<br />
The company has been making a great effort with its intention-based network since last June when Cisco CEO Chuck Robbins introduced The Network Intuitive.<br />
<br />
It may seem that the business of Cisco service providers is getting into action based on network attempts. But Davidson said: "We've been driving the infrastructure driven by intention for years, I think it's been five years since we acquired Tail-f and changed it to" Network Services Orchestrator. "It's a tool driven by the intention to implement services to throughout its life cycle. "<br />
<br />
Davidson said that the first work in networks based on intention "came from the domain of the service provider". He made a "big leap forward with ACI," he said. And the launch of Network Intuitive last June "took it to a whole new level - we are applying these technologies back to the domain of the service provider."<br />
<br />
Crosswork Network Automation provides service providers with the tools to describe what they want to do and deliver. Extends Cisco Network Services Orchestrator (NSO) and WAN Automation Engine (WAE) capabilities.<br />
Crosswork network automation<br />
<br />
<b>The five new services that are announced today are:</b><br />
<br />
Cisco Data Platform. It presents an open source and commercial data analysis platform. The open source platform uses the platform code of the Linux Foundation for network data analysis (PNDA).<br />
<br />
Cisco Network Insights This is a cloud-based analytics to solve large-scale routing problems. It is a software as a service (SaaS) delivered in the cloud that allows operators to understand what is happening in their Border Gateway Protocol (BGP) infrastructure.<br />
<br />
Cisco Situation Manager This software uses machine learning to correlate events across an operator's infrastructure, logically grouping events so that staff can more quickly determine where problems occur. It also includes a social aspect for staff to share information quickly through common tools such as Slack. "The Situations Administrator has the ability to find a problem that has existed in the past, take information from the repository and apply it directly within the situation in which he is working," Davidson said.<br />
<br />
Cisco Health Insights includes intelligent sensors, intelligent alerts and intelligent solutions to monitor and optimize the network; and Cisco Change Automation is an application that automates the application of operations and provides closed circuit control. "These two tools work together," Davidson said. "Once a human being has participated in an event the first time, there is no reason for a human to get involved next time." Closed-loop automation means that if a problem occurs and is solved, then the next time the problem occurs, an alert is issued and the problem is automatically resolved.<br />
<br />
Davidson said that Crosswork helps operators with problems they have been complaining about. "We hear that more than 50 percent of network interruptions are caused by human beings writing directly on consoles," he said. "In addition, they have difficulties to understand what happens in all their infrastructure."Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-62440642357264910462017-12-19T22:47:00.001-08:002017-12-19T22:47:33.314-08:00Cisco 352-001 Question Answer<b>A large enterprise customer is migrating thousands of retail offices from legacy TDM circuits to an Ethernet-based service. The network is running OSPF and has been stable for many years. It is now possible to backhaul the circuits directly to the data centers, bypassing the regional aggregation routers. Which two networking issues need to be addressed to ensure stability with the new design? (Choose two.)</b><br />
<br />
<b>A.</b> Nothing will change if the number of offices is the same.<br />
<b>B.</b> Nothing will change if the number of physical interfaces stays the same.<br />
<b>C.</b> The RIB will increase significantly.<br />
<b>D.</b> The FIB will increase significantly.<br />
<b>E.</b> The amount of LSA flooding will increase significantly.<br />
<b>F. </b>The size of the link-state database will increase significantly.<br />
<br />
<b>Answer: EF</b><br />
<br />
<b><br /></b>
<b>A company requests that you consult with them regarding the design of their production, development, and test environments. They indicate that the environments must communicate effectively, but they must be kept separate due to the inherent failures on the development network. What will be configured on the links between the networks to support their design requirements?</b><br />
<br />
<b>A. </b>IBGP<br />
<b>B. </b>EBGP<br />
<b>C. </b>OSPF<br />
<b>D. </b>static routes<br />
<br />
<b>Answer: B</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-49788458754977531192017-11-06T02:19:00.002-08:002017-11-06T02:19:29.768-08:00Bringing Cisco and BroadSoft Together: An Update from BroadSoft ConnectionsBroadSoft Connections has long been established as one of the largest communication and teleconference events in the annual calendar. However, this year, the excitement was palpable, after an incredible and innovative announcement that confirmed that Cisco was buying BroadSoft for $ 1.9 billion.<br /><br />I was there to attend Connections this year, and I heard directly from Cisco Vice President Rowan Trollope and BroadSoft CEO Michael Tessler about the impending purchase and what it means for partners. and the final customers.<br />Create improved collaboration and communication<br /><br />Rowan was the first to speak and talk about the journey that Cisco has undertaken so far to create a simpler and more complete solution for a UC & C stack. Rowan suggested that Cisco has a long-standing focus on improving its strategy. Collaboration in a "flexible" manner and noted that the new acquisition of BroadSoft could give the brand access to solutions it did not have before.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMIlf7vbsjoThLLpvn53tNL__m5jWoLeJTg609XputQ6MeMBM-22ILTG5TVW8ENNg5-1qa4OKvVgUzbaKuK16KrI3fOk2sPBBIARx0gTZRuDDTjXHtRX5lJD2li0QkT5KYYpaxyRf1Jf-H/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="129" data-original-width="600" height="136" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMIlf7vbsjoThLLpvn53tNL__m5jWoLeJTg609XputQ6MeMBM-22ILTG5TVW8ENNg5-1qa4OKvVgUzbaKuK16KrI3fOk2sPBBIARx0gTZRuDDTjXHtRX5lJD2li0QkT5KYYpaxyRf1Jf-H/s640/1.png" width="640" /></a></div>
<div style="text-align: center;">
<br /></div>
As the modern computing environment becomes more complex and distributed, companies such as Cisco and BroadSoft have been looking for solutions that make speed and scalability more accessible. In 2012, Cisco purchased Meraki for $ 1.2 billion, not only to operate its wireless solutions, but also to take full advantage of its infrastructure management technologies. Now this acquisition will be even more important since they cover the base installed by 18 million BroadSoft users.<br /><br />By placing BroadSoft at the center of its strategy, Cisco can provide richer and more scalable solutions to a wider audience around the world, which can make it the largest competitor in the unified communications market.<br />
<br />
<b>An evolution of the BroadSoft strategy</b><br /><br />After a positive message about the future of Cisco and its evolution of UC, Rowan spoke with Michael Tessler, who pointed out that, so far, BroadSoft has focused mainly on SMEs. However, with Cisco, BroadSoft will be able to drive some of its "high-end" technologies, especially its three strategic foundations: "BroadSoft Business", "BroadCloud" and "Powered by BroadSoft".<br /><br />Tessler noted that BroadSoft has always focused on end-user productivity in its suite of applications, making it easier for companies to seamlessly transition to the cloud. They will continue with their open solution for "bOpen" integration, as Michael pointed out that one of the most important elements of BroadSoft's success has been its "open ecosystem". When you explore the BroadSoft Connections broadcast, it's easy to see a wide variety of partners and diverse solutions with BroadSoft integrations.<br />
<b><br /></b>
<div style="text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh007glUHCePCs_lLCr4vwZhvyji08_2dAnJyysyxrKxT2upCl1_wbodl01-Wy1sEOdLjT6inIlWSdKpH1KuPdkvorGVubKmgXktdAsjtf9KJ0tpfwfnKmZgHWzurQJSu2FFqKM5MgLkP-2/s1600/1.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="159" data-original-width="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh007glUHCePCs_lLCr4vwZhvyji08_2dAnJyysyxrKxT2upCl1_wbodl01-Wy1sEOdLjT6inIlWSdKpH1KuPdkvorGVubKmgXktdAsjtf9KJ0tpfwfnKmZgHWzurQJSu2FFqKM5MgLkP-2/s1600/1.png" /></a><b>Address conflicts in a large acquisition</b><br /><br />Of course, combining two brands the size of Cisco and BroadSoft is not without its difficulties. In the question and answer session that followed the speeches by Tessler and Trollope, both members debated about the "Spark" overlay and what it would take to combine business collaboration. Rowan said that rationalization will have to start in the portfolio. For now, HCS will continue as a corporate gaming solution, while everything else below that level remains tuned to BroadSoft technology.<br /><br />One point of concern is the apparent containment of channels between BroadCloud and Cisco HCS. However, Rowan and Michael seemed confident that the two brands could work together to serve the market in the corporate space of HCS using BroadSoft, while larger deployments in BroadCloud could potentially become HCS. Rowan even discussed the idea of partner conflicts over IP endpoints and video and said<br /><br /> <b>"We have to continue adopting BroadSoft's winning strategy: we have to give customers the option."</b><br /><br />However, the pair did not have an answer for everything. Michael Tessler deftly asked a question about "BroadSoft My Room" and "Meet," noting that it was too early to comment on the changes to the "Powered by BroadSoft" brand. In addition, many participants wondered what companies would do to deal with the dramatic differences in their price structures.<br /><br /><br /><b>Design a common vision for the future</b><br /><br />One of the most important issues that BroadSoft and Cisco have adopted together in their future potential is the idea of allowing customers to have more "options." Rowan and Michael seemed to be connected at this point, which has long been a key part of Broadsoft's USP.<br /><br />Rowan said Cisco and BroadSoft would invest much of their investment in the customer experience area to offer a simpler solution to their customers and develop synergy in terms of sales incentives, cross-selling, etc.<br /><br />For now, Cisco has suggested that they did not intend to continue with additional UCaS acquisitions, at least not in the immediate future. However, the pre-existing relationship between Cisco and Apple could open new doors for BroadSoft to work with Apple and create new technological solutions for the network.</div>
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-10742298074319399172017-09-11T00:49:00.000-07:002017-09-11T00:49:11.644-07:00Cisco 352-001 Question Answer<b>In a large enterprise network with multiple data centers and thousands of access devices, OSPF is becoming unstable due to link flapping. The current design has the access devices multihomed to large aggregation routers at each of the data centers. How would you redesign the network to improve stability?</b><br />
<br />
<b>A. </b>Add a layer of regional Layer 3 aggregation devices, but leave the ABR function on the data center aggregation routers.<br />
<b>B. </b>Add a layer of regional Layer 2 aggregation devices, but leave the ABR function on the data center aggregation routers.<br />
<b>C.</b> Add a layer of regional Layer 3 aggregation devices and move the ABR function to the regional aggregation device.<br />
<b>D. </b>Add a layer of regional Layer 2 aggregation devices and move the ABR function to the regional aggregation device.<br />
<br />
<b>Answer: C</b><br />
<br />
<b><br /></b>
<b>During a network design review, it is recommended that the network with a single large area should be broken up into a backbone and multiple nonbackbone areas.</b><br />
<b>There are differing opinions on how many ABRs are needed for each area for redundancy. What would be the impact of having additional ABRs per area?</b><br />
<br />
<b>A.</b> There is no impact to increasing the number of ABRs.<br />
<b>B. </b>The SPF calculations are more complex.<br />
<b>C.</b> The number of externals and network summaries are increased.<br />
<b>D. </b>The size of the FIB is increased.<br />
<b><br /></b>
<b>Answer: C</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-24918679028615045172017-04-18T02:05:00.000-07:002017-04-18T02:05:09.644-07:00Cisco 352-001 Question Answer<b>When you design a network, when would it be required to leak routes into a Level 1 area?</b><br />
<br /><b>A. </b>when a multicast RP is configured in the nonbackbone area<br /><b>B. </b>when MPLS L3VPN PE devices are configured in the Level 1 areas<br /><b>C. </b>when equal cost load balancing is required between the backbone and nonbackbone areas<br /><b>D. </b>when unequal cost load balancing is required between the backbone and nonbackbone areas<br />
<br /><b>Answer: B</b><br />
<br /><b><br />What are two benefits of following a structured hierarchical and modular design? (Choose two.)</b><br />
<br /><b>A. </b>Each component can be designed independently for its role.<br /><b>B. </b>Each component can be managed independently based on its role.<br /><b>C. </b>Each component can be funded by different organizations based on its role.<br /><b>D. </b>Each component can support multiple roles based on the requirements.<br /><b>E. </b>Each component can provide redundancy for applications and services.<br />
<br /><b>Answer: AB</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-65330617905342776492016-11-20T21:37:00.004-08:002016-11-20T21:37:25.809-08:00How to Get 352-001 Real Exam QuestionsPreparation of any exam is not easy, especially when a person wants to pass it with a good score, same is the case with Cisco 352-001 Exam as it not only requires hard work, but also the practice questions which will assist in the preparation of the Cisco ADVDESIGN exam. Preparing for the CCDE 352-001 certification Exam by getting the 352-001 Questions Answers from a reliable source makes a candidate confident which makes him/her able to score high because confidence is required for gaining success in everything in life. The <a href="https://www.braindumps4it.com/braindumps-352-001.html" target="_blank">352-001 Braindumps</a> are great in a sense that they can turn the weakness of a candidate of not feeling fully prepared for the Cisco Cisco ADVDESIGN exam into the strength of feeling fully prepared and able to solve every single question no matter how tough it is. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://bit.ly/2g8t5Wl" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="336" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbvrJnBSM7dS_6HBcb86t6JmMnHA1yCObTjMDjotTwCNlwOkii6htsHxNZwvuWZ4MWMYQglLU1P8KJUNESnuFuhpnF-DHNnKkI2fu1Ah1q8tAGb6p3EhyB-PN5igM1YR8wvJlAZJe1cT09/s640/student_using_laptop9844019_ml.jpg" width="640" /></a></div>
<br />
<br />
The individual who wants to get the guidance and assistance for passing the 352-001 Test with high score can go for signing up the websites which offer the 352-001 Real Exam Questions because it is the only way to get successful in the <a href="https://www.braindumps4it.com/dumps-ccde.html" target="_blank">Cisco CCDE exams</a>. The candidates who are going to appear in the exam can download 352-001 Exam Dumps from the braindumps4it because it helps them in getting ready for the tough Cisco ADVDESIGN exam. A person should not think that the 352-001 Exam Questions that they will be given to answer will be tough and they will feel worried when the CCDE exam questions will be shown to them because the Cisco 352-001 Practice Test is the perfect thing which not only prepares a person for scoring high, but also makes him/her feel confident about how to Pass 352-001 Exam.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://bit.ly/2g8t5Wl" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRU-TBorX4iPeOPsyQvvTfiL8Po-Py5clJ4MlZ5v3ejDZhshP0q993pw2djbIS5P-MRKMM9cyaTv2no123R5iGriujzZHzMWfT0WDlO1bToZFXX1tzG7FQtkuBoLR2DMgYkJzJllE85eSR/s640/2-in-1-woman-in-cafe.jpg" width="640" /></a></div>
<br />
<br />
There is a special assistance available on any braindumps4it for the candidates who want to pass the 352-001 Test for which they offer their service by arranging and giving free 352-001 Dumps that are good for the student’s preparation. Not only the dumps, but there are also free 352-001 Exam Questions which are not a hectic task to download. The Cisco 352-001 Dumps enhances the performance level of the individuals who are struggling to get the Cisco ADVDESIGN exam certification and it is a good idea to get the help of the Cisco questions available for the practice because it is the only way through which a person can know that he/she is ready to perform well in the Cisco ADVDESIGN exam. There are some sources available which provides the 352-001 Test Engine for determining if the person is ready for taking the CCDE exam.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://bit.ly/2g8t5Wl" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkfyQX8nhIZPFQSMo-ugoH6N4sLjJjx34GLDv8wtpC6mpLPt9AusVeSVlqe7pPYS9B0R4mAoKE9X1eawgB3lxqAojX20E2yO2H3rYNvmNDmNEkWU_IFO15Cu0uP0IxbSGEnbwS35-JM1Gt/s640/teacherOath.jpg" width="640" /></a></div>
<br />
<br />
The country in which a person lives don’t matter, individuals living in any corner of the world can get the Cisco 352-001 Practice Exam as there is only a requirement of having an internet connection through which a person can download 352-001 Test Questions. So, there is no need to take tension if the person is not the resident of USA or Canada. <a href="https://www.braindumps4it.com/" target="_blank">Braindumps4it</a> offer to download the Cisco ADVDESIGN 352-001 PDF while the others have different processes through which they provide the Cisco 352-001 Study Material to those who need it for the perfect performance and to get the CCDE certification with good marks.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://bit.ly/2g8t5Wl" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhhWURTJkOjFNHGUAWWRVb8_M7wtKYwWQByY8-NuIJBch-yHsbdD_rmvVyxEbTrEV8B_GEUsCEym9J7qdrR1wQ64GaFWp86NP75CdTynp9eTEi1LztaaqlLTUcuHAV4k_6lGVPNb8JnxJZ/s640/Pass_the_exam_next_time_2.jpg" width="640" /></a></div>
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-3242292498553534682016-08-28T20:57:00.003-07:002016-08-28T20:57:49.761-07:00Pass4sure 352-001 Question Answer<b>What are three key design principles when using a classic hierarchical network model? (Choose three.)</b><br />
<br />
<b>A.</b> The core layer controls access to resources for security. <br />
<b>B.</b> The core layer should be configured with minimal complexity. <br />
<b>C.</b> The core layer is designed first, followed by the distribution layer and then the access layer. <br />
<b>D.</b> A hierarchical network design model aids fault isolation. <br />
<b>E. </b>The core layer provides server access in a small campus. <br />
<b>F. </b>A hierarchical network design facilitates changes.<br />
<br />
<b>Answer: B, D, F</b><br />
<br />
<b><br /></b>
<b>Which three techniques can be used to improve fault isolation in an enterprise network design? (Choose three.)</b><br />
<br />
<b>A.</b> aggregate routing information on an OSPF ABR <br />
<b>B.</b> fully meshed distribution layer <br />
<b>C. </b>Equal-Cost Multipath routing <br />
<b>D. </b>EIGRP query boundaries <br />
<b>E.</b> multiple IS-IS flooding domains <br />
<b>F.</b> tuned Spanning Tree Protocol timers<br />
<br />
<b>Answer: A, D, E</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-43829466462655219292016-07-10T23:56:00.000-07:002016-07-10T23:56:23.450-07:00IDS and IPS Buyers Guide: Cisco Offers Integration To Prevent Intrusion Attacks From Reaching Medical Devices, Old and NewA threat that could compromise a device automatically signals Cisco’s Identity Services Engine and Cisco TrustSec to quarantine and prevent the attack.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" height="359" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZvj_CyesS2u2tNx95BV3Q_G20lQfgwixWRnk-9jLkqmx2XhD1DpMWLaw32oh6a02kzsonf7Ccbq_c7IBAMKbrble2vBJ4sM4SAgIk32kopj0y0RzAvI1DkoJ-NmUn8R2U4c3CFxXaM8Ah/s640/10.jpg" width="640" /> </div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
In a typically short-staffed healthcare IT environment integration and automation are two key components to look for when purchasing a modern intrusion detection and prevention solution. Cisco believes its solution provides just that.<br /><br />Probably what keeps healthcare security specialists up at night most often are the huge number of older medical devices that cannot be patched or taken offline.<br /><br />“Many are built atop outdated operating systems like Windows XP, where the original manufacturer did not provide a way to update or patch these systems,” says Steve Caimi, Cybersecurity Specialist, U.S. Public Sector at Cisco.<br /><br />When Cisco’s IDS and IPS detects a threat that could compromise a medical device its automated system signals Cisco’s Identity Services Engine and Cisco TrustSec to update the network segmentation policy and quarantine the system of origin, thus preventing the attack from reaching the device.<br /><br />Greg Young, a research vice president at Gartner says that in most cases healthcare has the same security requirements of any business but a notable exception is the need to deploy IPS in front of medical devices as a "pre-patch shield" for operating systems in devices that can’t be patched or taken offline.<br /><br />Another layer of medical device protection is found in the integrated design of Cisco’s IDS solution that becomes one part of its overall cyber security defenses, including but not limited to network access control and network-based segmentation.<br /><br />Through its recent purchase of Sourcefire, Cisco now also offers Snort, a rules-based open source network intrusion system. It analyzes traffic and performs packet logging on IP networks in real-time. The open source solution is also designed to detect buffer overflows, stealth port scans, CGI attack, SMB probes, OS fingerprinting attempts among other things.<br /><br /><b>Pricing Model: </b>Firepower NGIPS (Next Generation IPS) and NGFW (Next Generation Firewall) appliances use a software subscription model for Threat (IPS), URL Filtering, and Advanced Malware Protection (AMP). Available separately or in combinations and available in 1-, 3-, and 5-year terms. In addition, Cisco has maintenance/support contracts for the appliances. </div>
<div style="text-align: center;">
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-10460876013073018092016-06-07T23:52:00.000-07:002016-06-07T23:52:17.064-07:00Pass4sure 352-001 Question Answer<b>Refer to the exhibit.</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhHgjS3b3yFI29nbYzj6Lvi8M_iLrU6GtIv-e9RXTrZu3z6wmD1aBP43OW87lowQHeg_W752swehr4XHLJIpvzlAcKaJOQKlKBKYW_HSYTcPkg71V_p0Oqmb6ttKkYqwXmsQ83i5uaTAlL/s1600/4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="278" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhHgjS3b3yFI29nbYzj6Lvi8M_iLrU6GtIv-e9RXTrZu3z6wmD1aBP43OW87lowQHeg_W752swehr4XHLJIpvzlAcKaJOQKlKBKYW_HSYTcPkg71V_p0Oqmb6ttKkYqwXmsQ83i5uaTAlL/s320/4.jpg" width="320" /></a></div>
<div style="text-align: center;">
<br /></div>
<b>In this design, which technology would provide for the best use of resources to provide end-to-end Layer 2 connectivity? </b><br />
<br />
<b>A. </b>MSTP<br />
<b>B. </b>PAgP<br />
<b>C. </b>Multichassis EtherChannel<br />
<b>D. </b>LACP<br />
<br /><b>Answer: C <a href="http://www.passleaders.com/352-001-exam.html"> Passleader 352-001 Exam Question</a></b><br />
<br />
<br />
<b>What are three key design principles when using a classic hierarchical network model? (Choose three.)</b><br />
<br /><b>A. </b>The core layer controls access to resources for security.<br />
<b>B.</b> The core layer should be configured with minimal complexity.<br />
<b>C.</b> The core layer is designed first, followed by the distribution layer and then the access layer.<br />
<b>D.</b> A hierarchical network design model aids fault isolation.<br />
<b>E. </b>The core layer provides server access in a small campus.<br />
<b>F. </b>A hierarchical network design facilitates changes.<br />
<br /><b>Answer: B, D, F </b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-51604662412573805632016-05-06T03:10:00.002-07:002016-05-06T03:10:53.092-07:00Pass4sure 352-001 Question Answer<b>What are two design advantages to using virtual port channel? (Choose two.) </b><br />
<br /><b>A. </b>enhanced system availability through multiple systems <br /><b>B. </b>reduced Spanning Tree Protocol convergence time <br /><b>C. </b>loop management without use of Spanning Tree Protocol <br /><b>D.</b> ability to use Spanning Tree Protocol blocked ports to forward traffic <br /><b>E. </b>enhanced ability to recover from Spanning Tree Protocol changes<br />
<br /><b>Answer: A, C</b><br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-63778602294788180892016-04-04T04:55:00.001-07:002016-10-02T23:25:08.203-07:00Pass4sure 352-001 Question Answer<b>A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?</b><br />
<br />
<b>A. </b>Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network. <br />
<b>B. </b>Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts. <br />
<b>C. </b>The multicast application sends too many packets into the network and the network infrastructure drops packets. <br />
<b>D. </b>The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.<br />
<br />
<b>Answer: D </b><br />
<br />
<br />
<b>A customer is using a service provider to provide a WAN backbone for a 30-site network. In establishing the network, the customer must work within these constraints: The customer has a self-managed MPLS backbone. The VPLS WAN backbone of the service provider does not support PIM snooping. Multicast VPN must be used for multicast support inside some VRFs. What can the customer do so that multicast traffic is NOT flooded to all sites? </b><br />
<b></b><br />
<b>A.</b> Configure static GRE tunnels and run the MPLS and multicast VPN inside these GRE tunnels. <br />
<b>B. </b>Use Label Switched Multicast for the multicast transport. <br />
<b>C. </b>Use PIM-SSM as the multicast routing protocol with IETF Rosen Draft multicast VPN. <br />
<b>D. </b>Configure a static mapping between multicast addresses and MAC addresses. <br />
<b>E. </b>Use GET VPN to encrypt the multicast packets inside the WAN.<br />
<br />
<b>Answer: A</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-34497951259612395872016-03-01T19:53:00.001-08:002016-03-01T19:53:11.333-08:00Pass4sure 352-001 Question Answer<b>You are designing a network that will run EIGRP over a Metro Ethernet service that does not employ a link-loss technology. What will be the impact on convergence if there is a break in the end-to-end Layer 2 </b><br />
<b>connectivity within the service provider network? </b><br /><br /><b>A.</b> The routers will immediately lose their adjacencies and converge. <br /><b>B. </b>The routing protocol will not converge until the hold timers have expired. <br /><b>C.</b> The switch ports connected to the router will go down and the routers will immediately converge. <br /><b>D.</b> The VLAN on the switches will go inactive, the ports associated on the switch will go down, and the routers will immediately converge.<br /><b><br />Answer: B</b><br />
<br />
<b><br /></b>
<b>Acme Corporation hired you as a network designer to upgrade their network so that it supports IPv4 and IPv6 multicast. Which two protocols are needed on the LAN switch? (Choose two.) </b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinLy6UXuWXq2VxwkPDdxctle_AloceKbIJHDx_boGdqUldHgzRxsE_5r1E4GLZbYEJt4YO9rP1nYGMccubhgXUHCNRSLNWAKVZ5uUiHaVBcWRfq9ZGAqQzPUi6IajeEFi0COMCs_eQVFGJ/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinLy6UXuWXq2VxwkPDdxctle_AloceKbIJHDx_boGdqUldHgzRxsE_5r1E4GLZbYEJt4YO9rP1nYGMccubhgXUHCNRSLNWAKVZ5uUiHaVBcWRfq9ZGAqQzPUi6IajeEFi0COMCs_eQVFGJ/s1600/1.png" /></a></div>
<b>A. </b>PIM sparse mode <br /><b>B.</b> IGMP snooping <br /><b>C.</b> PIM snooping <br /><b>D.</b> Source Specific Multicast <br /><b>E. </b>MLD snooping<br /><br /><b>Answer: B, E</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-17115486957281996672016-01-28T22:02:00.000-08:002016-01-28T22:02:14.745-08:00Pass4sure 352-001 Question Answer<b>Voice traffic between two campus enterprise networks is growing. The network designers decide to add a second 10-Mb Metro Ethernet service parallel to their original 10-Mb service in order to provide more bandwidth and diversity. </b><br />
<b>The QoS profile will be the same on the new 10-Mb service due to the voice stability on the first Metro Ethernet link. When the second link is added to the OSPF domain, which traffic design consideration would have the most impact on the voice traffic when both links are active? </b><br /><br /><b>A. </b>per-destination IP address basis <br /><b>B. </b>per-flow basis <br /><b>C.</b> per-packet basis <br /><b>D. </b>per-source IP address basis<br /><br /><b>Answer: C</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-16964321893746756882015-12-28T20:09:00.004-08:002015-12-28T20:09:52.309-08:00Pass4sure 352-001 Question Answer<b>A service provider has a Resilient Ethernet Protocol ring running as a metro backbone between its locations in one city. A customer wants to connect one site with one box redundant to the Resilient Ethernet Protocol ring at two different service provider locations. How can this be done without producing any Layer 2 loops within the network design? </b><br />
<b><br /></b><b>A.</b> Spanning tree at the service provider side only must be enabled.<br /><b>B. </b>Spanning tree at the customer side only must be enabled. <br /><b>C. </b>Flex Links at the service provider side only must be enabled. <br /><b>D.</b> Flex Links at the customer side only must be enabled. <br /><b>E.</b> EtherChannel at the service provider side and the customer side must be enabled. <br /><b>F. </b>Spanning tree at the service provider side and the customer side must be enabled. <br /><b>G.</b> Flex Links at the service provider side and the customer side must be enabled.<br /><br /><b>Answer: D</b><br /><br /><b><br />You have created a network design that has two point-to-point Metro Ethernet circuits extending a single production VLAN between two data centers. Under normal circumstances, one circuit will carry traffic and spanning tree will block the other. If the company wants you to make use of both circuits to carry production traffic, which two technologies and features will you investigate to integrate into your network design? (Choose two.)</b><br /><br /><b>A. </b>EtherChannel <br /><b>B. </b>MST <br /><b>C. </b>Multichassis EtherChannel <br /><b>D.</b> PVST+<br /><br /><b>Answer: A, C</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-2768682603490644172015-12-06T23:22:00.001-08:002016-10-02T23:25:37.435-07:00Pass4sure 352-001 Question Answer<div style="text-align: left;">
<div class="separator" style="clear: both; text-align: center;">
<img border="0" height="363" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKmql2J4IUZsxCXVFGgkOnciTKsm9mawwvw9WsTuGQPYlnYYeUnfL9BngB9OzTdJNEUMD1cFRhNNYQFvRiY7owMi6q8Q1f9x4d0Sslj7G_RQflpRUPOBSwZjL04nBBSxjuCtn7WDtv5IKp/s400/6.jpg" width="400" /></div>
<b>If IEEE 802.1w is in use for this network design, what are two locations where spanning-tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4? (Choose two.)<br /><br />A.</b> Switch A <br />
<b>B.</b> Switch B <br />
<b>C.</b> Switch C <br />
<b>D.</b> Switch D<b><br /><br />Answer: C, D </b></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-91869034150425070162015-11-25T02:52:00.000-08:002015-11-25T02:52:17.517-08:00Pass4sure 352-001 Question Answer<b>A network designer is redesigning an enterprise campus network to ensure that Ethernet switches proactively attempt to reconnect after a fiber cut. In the design, they will have to address areas where fiber cuts exist on campus from past troubleshooting, where a single fiber is disconnected in the fiber pair, leading to looping. Which feature could be implemented in the design to allow the Spanning Tree Protocol on the switches to be protected?</b><br /><br /><b>A. </b>loop guard <br /><b>B.</b> UniDirectional Link Detection <br /><b>C.</b> UniDirectional Link Detection aggressive mode <br /><b>D.</b> root guard<br /><br /><b>Answer: C</b><br />
<br />
<br />
<b>A switched network is being designed to support a manufacturing factory. Due to cost constraints, fiber-based connectivity is not an option. Which design allows for a stable network when there is a risk of interference from the manufacturing hardware in use on the factory floor?<br /><br />A.</b> Design the network to include UDLD to detect unidirectional links and take them out of service. <br /><b>B. </b>Design the network to include EtherChannel bundles to prevent a single-link failure from taking down a switch interconnection point. <br /><b>C.</b> Design the network to include loop guard to prevent a loop in the switched network when a link has too much interference. <br /><b>D.</b> Design the network to include BackboneFast on all devices to accelerate failure convergence times.<b><br /><br />Answer: A </b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-89627589805887001782015-10-08T23:06:00.003-07:002015-11-25T02:49:56.711-08:00Pass4sure 352-001 Question Answer<b>A network designer is working with a company to improve convergence at the Layer 2 control plane and decides to use LACP. Which of these components does LACP use to create the system ID?</b><br />
<br />
<b>A. </b>LACP system priority and switch MAC address<br />
<b>B.</b> LACP port priority and switch MAC address<br />
<b>C.</b> LACP port priority and port number<br />
<b>D.</b> LACP system priority and port number<br />
<br />
<b>Answer: A</b><br />
<br />
<br />
<b>Refer to the exhibit.</b><br />
<div style="text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLxYvRzs7MxXOF2LHK_bMmrrb00HjC2eVMmPP7Wej7ONYOyWfojA0OZQvkYG84rJgYLzVq2MiJNXXOIvxmkF3qFqB3LEj4wEifJkKf8_4jk8rR8ZOxsTuWm1cZnyhUqMa0t2NRF7pfgOKe/s1600/5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="352" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLxYvRzs7MxXOF2LHK_bMmrrb00HjC2eVMmPP7Wej7ONYOyWfojA0OZQvkYG84rJgYLzVq2MiJNXXOIvxmkF3qFqB3LEj4wEifJkKf8_4jk8rR8ZOxsTuWm1cZnyhUqMa0t2NRF7pfgOKe/s400/5.jpg" width="400" /></a><b> </b></div>
<b>You are designing a spanning-tree network for a small campus. Which two of these options would result in a trouble-free spanning-tree network design? (Choose two.)<br /><br />A.</b> Convert all ports to trunk ports, prune off the VLANs that you do not require, and minimize the number of blocking ports. <br />
<b>B. </b>Introduce Layer 3 VLANs (SVIs) and prune off the VLANs that you do not require. <br />
<b>C.</b> Convert all the ports to trunk and enable BackboneFast. <br />
<b>D.</b> Convert all the ports to trunk and enable UplinkFast between all the links<b>.<br /><br />Answer: A, B </b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-18143982564867583762015-09-09T03:27:00.000-07:002015-09-09T03:27:06.251-07:00Pass4sure 352-001 Question Answer<h3>
Refer to the exhibit.</h3>
<br />
<div style="text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhczxS7Fbnw9JyBDnmoFvk3QH8hYNw12MVmbZRAzJa8IAF-ObfadXK01FEQOoND-9-3h6Vy9QT6Rg4RODOMN2gWcRxQ0G6DQzxky1J9c0Z8kqDrxM8_6_MW2UfzLgAFT8BUecC1MU8iexcs/s1600/3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhczxS7Fbnw9JyBDnmoFvk3QH8hYNw12MVmbZRAzJa8IAF-ObfadXK01FEQOoND-9-3h6Vy9QT6Rg4RODOMN2gWcRxQ0G6DQzxky1J9c0Z8kqDrxM8_6_MW2UfzLgAFT8BUecC1MU8iexcs/s1600/3.jpg" /></a></div>
<br />
<br />
<div style="text-align: center;">
<h3 style="text-align: left;">
A service provider would like to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP-SW2. </h3>
<h3 style="text-align: left;">
In which two of these ways can you design this solution? (Choose two.) </h3>
<h3>
</h3>
<div style="text-align: left;">
A. Enable Y.1731 Connectivity Fault Management on the SP switches. <br />B. E-LMI PDUs must be forwarded over VPLS. <br />C. Cisco Discovery Protocol PDUs must be forwarded over the VPLS. <br />D. Use upward maintenance endpoints on the SP switches. <br />E. Enable IEEE 802.1ag Connectivity Fault Management on the SP switches.</div>
<div style="text-align: left;">
<br /></div>
<h3 style="text-align: left;">
Answer: D, E</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
A network design shows two routers directly connected to an Ethernet switch using optical connections. There is an OSPF adjacency between the routers. In this design, which solution will ensure that interface down detection is reported as quickly as possible to the IGP? </h3>
<h3 style="text-align: left;">
<br /></h3>
<div style="text-align: left;">
<b>A.</b> optimized OSPF SPF timers </div>
<div style="text-align: left;">
<b>B.</b> Bidirectional Forwarding Detection </div>
<div style="text-align: left;">
<b>C. </b>automatic protection switching </div>
<div style="text-align: left;">
<b>D. </b>optimized OSPF LSA timers </div>
<div style="text-align: left;">
<b>E.</b> Ethernet OAM CFM monitoring</div>
<div style="text-align: left;">
<br /></div>
<h3 style="text-align: left;">
Answer: B </h3>
<div style="text-align: left;">
<span id="goog_1970528631"></span><span id="goog_1970528632"></span> </div>
<span id="goog_1970528631"></span><span id="goog_1970528632"></span> <br />
<span id="goog_1970528631"></span><span id="goog_1970528632"></span> <br />
<span id="goog_1970528631"></span><span id="goog_1970528632"></span> </div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-2243744981884341842015-04-15T23:31:00.001-07:002015-04-15T23:31:32.503-07:00352-001 Study Guide<h3>
Question NO : 3</h3>
<span style="font-weight: normal;">A designer is working with a large bank to redesign their network. The designer wants to minimize complaints regarding slow application response times across the WAN. It is suspected that currently traffic is not being classified and marked correctly somewhere in the network. Which tool should the designer recommend to validate quality of service mappings and use?</span><br />
<br /><br /><b>A.</b> SNMP<br /><b>B.</b> IPFIX<br /><b>C.</b> IP SLA<br /><b>D. </b>protocol analyzer<br /><b>E.</b> NBAR<br /><br /><h3>
Answer: B</h3>
<h3>
Question NO :4</h3>
<br />A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection?<br /><br /><b>A. </b>IP addresses of the GRE tunnel endpoints<br /><b>B. </b>IPsec configuration<br /><b>C. </b>MTU size on the GRE tunnel<br /><b>D.</b> encapsulation of the GRE tunnel<br /><br /><h3>
Answer: C</h3>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-56065886864119967962015-02-02T03:41:00.000-08:002015-02-02T03:42:58.488-08:00352-001 CCDE Test Design Written Exam Questions<div style="text-align: center;">
<br /><iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/XtCq4eQD5Iw" width="600"></iframe>
</div>
<div style="text-align: left;">
<br /></div>
<h3 style="text-align: left;">
For CISCO 352-001 Test Questions and Answers </h3>
<ul>
<li>Exam Section 1 - Layer 2 Control Plane Questions </li>
<li>Exam Section 2 - Layer 3 Control PlaneS Questions </li>
<li>Exam Section 3 - Network Virtualization Questions </li>
<li>Exam Section 4 - Design Considerations Questions</li>
</ul>
<div style="text-align: left;">
<br />
The <b>352-001</b> test is closed book, and no outside reference materials are allowed. The following topics are general <b>352-001</b> guidelines for the content that is likely to be included in the questions. However, other related topics may also appear on any specific delivery of the test. In order to better reflect the contents of the exam and for clarity purposes, the guidelines that follow may change at any time without notice.</div>
<h3>
In 352-001 you will be tested for:</h3>
<div style="text-align: left;">
</div>
<ul>
<li>Describe fast exam convergence techniques and mechanisms.</li>
<li>Down detection questions.</li>
<li>Interface dampening.</li>
<li>Describe loop detection and mitigation test protocols.</li>
<li>Spanning tree types.</li>
<li>Spanning tree tuning techniques</li>
<li>Describe mechanisms that are available for creating loop-free topologies.</li>
<li>REP</li>
<li>Multipath</li>
<li>Switch questions clustering.</li>
<li>Flex exam links.</li>
<li>Loop detection and mitigation.</li>
<li>Describe the exam effect of transport mechanisms and their interaction questions with routing protocols over different types of links.</li>
<li>Describe multicast routing test concepts.</li>
<li>Describe the effect of fault isolation and resiliency on network design.</li>
<li>Fault isolation</li>
<li>Fate sharing</li>
<li>Redundancy</li>
<li>Virtualization</li>
<li>Segmentation</li>
<li>Describe route exam aggregation concepts and techniques.</li>
<li>Purpose of route aggregation.</li>
<li>When to leak routes / avoid suboptimal test routing.</li>
<li>Determine aggregation location and techniques.</li>
<li>Describe the theory and application of network topology layering questions.</li>
<li>Layers and their purposes in various environments.</li>
<li>Describe the theory and application of network topology abstraction.</li>
<li>Purpose of link state topology test summarization.</li>
<li>Use of link state topology summarization.</li>
<li>Describe the effect of fault isolation and resiliency on network design or network exam reliability.</li>
<li>Fault isolation</li>
<li>Fate sharing</li>
<li>Redundancy</li>
<li>Describe metric-based traffic flow and modification.</li>
<li>Metrics to modify questions traffic flow.</li>
<li>Third-party exam next hop.</li>
</ul>
<div style="text-align: left;">
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-91722601360501973562014-09-23T02:41:00.000-07:002014-09-23T02:41:40.770-07:00Insight on the New Cisco Certified Design Expert (CCDE) - Part IIIThis is my third and final (for now) blog about the upcoming CCDE and Architect certifications. Here is Part I and Part II. As I mentioned in Part II, Cisco hosted a Q&A last week at Networkers with about 50 CCIEs. The Q&A session itself was a lively event with a lot of questions raised and opinions offered. While the Cisco team had planned a short introduction of the new certification concepts, and then Q&A, the debate started pretty much right away. Most ideas were well received and there were a lot of questions about format and topics. Points I noted:<br />
<ul>
<li>Some of the engineers felt strongly that a current CCIE should be a prerequisite for the CCDE. However, an equal number disagreed, including myself. Cisco really sees the CCIE as a technology certification - how to make the actual equipment work. The CCDE, and the subsequent Architecture certification, is focused on network design, not necessarily making equipment work. The analogy given by one of the CCIEs summed it up well - "an architect of a home isn’t the general contractor; he doesn’t actually build the home. He just needs to know how the pieces interact (fit).”</li>
<li>Many people offered ideas for the format of the "performance oriented scenario test". The goal is to make it just as hard as a CCIE lab is, but it's not a lab. Thoughts about responding to an RFP were tossed about.</li>
<li>The tentative timeline is to have the "scenario test" ready by March or April of next year for beta testing. The Architecture certification would come much later, perhaps a year or more. The written exam is available in two weeks for the beta testers to attempt. Most people agreed this is a good timeline.</li>
<li>While the format and rules of the new certification were strongly debated, everyone in the room agreed there is a need for this type of certification and were very excited. I'm sure people will be eager to take the beta written exam in a few weeks. The consensus was this is a good thing for the certification program, a benefit to the industry, and good for professional development.</li>
<li>Some other quick notes of comments made: - People seemed to want to talk about the Architect certification more than CCDE. - Need to create CCDE numbers. Initial group also wanted recognition as the pioneers of this credential. - Make is multi-vendor (or vendor co-existent). - Keep it standards based, perhaps even partner with a standards board. - Allow people to take the CCDE "scenario" and attend Architect board via Telepresence and/or WebEx. - Possibly use a team format for the CCDE scenario, like used in MBA programs. - PLEASE be selective. Screen applicants, particularly beta candidates. - Must create industry awareness. This is key to employer support and showing candidates the benefits of achieving the certifications. </li>
</ul>
The written beta exam begins in 3 weeks and is available to only select invitees. Cisco's goal is to get 200 people through the beta exam to have sufficient results to base decisions on. An exhaustive, 6-page blue-print was provided in the meeting. General topics range from "IP Routing" to "Tunneling" to "Security". It should prove to be very tough. Passing does meet recertification requirements for existing CCIEs. I'll be signing up soon. Over the next couple months I'll provide updates on the beta program. This looks to be an exciting new addition to Cisco's certification program for senior engineers and network architects.<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-23085052852156540212014-09-23T02:30:00.001-07:002014-09-23T02:30:58.141-07:00Insight on the New Cisco Certified Design Expert (CCDE) - Part IIAs I mentioned in my post the other day about the CCDE, there was an initial Q&A session with about 50 CCIEs at Networkers last week that gave an overview of Cisco's intention for the CCDE. During the Q&A (and based on an invitation e-mail sent earlier) Cisco highlighted the following key points:<br />
<br />As I mentioned in my post the other day about the CCDE, there was an initial Q&A session with about 50 CCIEs at Networkers last week that gave an overview of Cisco's intention for the CCDE. During the Q&A (and based on an invitation e-mail sent earlier) Cisco highlighted the following key points:<br />
<ul>
<li>Cisco has identified a need for certifying individuals with a high degree of experience and expertise in designing and architecting large-scale networks (over several hundred routers) at the routing layer.</li>
<li>The CCIE, while an extremely well respected certification, focuses on the device level configuration and operation of Cisco equipment. Network design is not part of those tests. Furthermore, for experienced design engineers and architects, the CCIE tracks do not fit their roles and needs anymore, yet the CCIE is the only avenue for industry recognition for people at their level. The concept for this certification came about because some of Cisco's earliest CCIEs are no longer interested in the CCIE's product and configuration focus since that is not part of their job anymore.</li>
<li>The new CCDE will be on par with the existing CCIE programs. It will have a written exam and then a "performance oriented scenario test which assesses a practitioner's advanced network design skills". The "scenario" format or process has not been developed yet. The intent is not to make it a "lab", but focus it on design. Thoughts about responding to an RFP or project plan were presented as options during the Q&A. The goal of the CCDE is to provide incentives for experienced network design practitioners to continue professional development.</li>
<li>The Network Infrastructure Architect (which is not officially named yet) will be feature a board review. Candidates to the board would have already completed the CCDE. The board would be made up of industry experts; likely Cisco employees, but not required. A candidate would have to present and defend a network design and architecture to the board. The expectation is the board review would be extremely rigorous, only for the most experienced engineers.</li>
<li>I'll have one more post about the CCDE and Architecture certification in a few days. That will detail the engineers' comments during the Q&A and information on the CCDE Written Exam. Let's just say, the comments were lively...positive....but lively.</li>
</ul>
<br /><br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-42134517530463117052014-09-23T02:26:00.002-07:002014-09-23T02:26:58.707-07:00Insight on the New Cisco Certified Design Expert (CCDE) and Network Infrastructure Architect Certification<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:RelyOnVML/>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="371">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->
<br />
<div class="MsoNormal">
<span class="hps"><span lang="EN" style="mso-ansi-language: EN;">I
was honored</span></span><span lang="EN" style="mso-ansi-language: EN;"> <span class="hps">this week</span> <span class="hps">to be invited to</span> <span class="hps">Cisco</span> <span class="hps">Network</span> <span class="hps">Design</span>
<span class="hps">Expert (</span>CCDE) <span class="hps">and</span> <span class="hps">Network Infrastructure</span> <span class="hps">Architect</span> <span class="hps">a couple of weeks</span> <span class="hps">ago</span> <span class="hps">with
this new</span> <span class="hps">beta program</span> <span class="hps">certification</span>).
<span class="hps">This is a</span> <span class="hps">private beta program</span> <span class="hps">for</span> <span class="hps">senior engineers</span> <span class="hps">and</span>
<span class="hps">Cisco</span> <span class="hps">CCIE</span> <span class="hps">exist</span>
<span class="hps">to help develop</span> <span class="hps">a</span> <span class="hps">new certification program</span> <span class="hps">for</span> <span class="hps">expert level</span> <span class="hps">"</span>drawing <span class="hps">fire.</span>" <span class="hps">In addition,</span> <span class="hps">Cisco</span> <span class="hps">is looking at</span> <span class="hps">how
to create a</span> <span class="hps">certification of "</span>architect"
of the <span class="hps">most experienced engineers</span> <span class="hps">and</span>
<span class="hps">competent</span>.</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="mso-ansi-language: EN;"><span class="hps">Cisco</span> <span class="hps">call</span>
<span class="hps">last week</span> <span class="hps">team</span> <span class="hps">and</span>
<span class="hps">beta</span><span class="atn">-</span>mail: <span class="hps">This
will be</span> <span class="hps">a collaborative effort</span> <span class="hps">with</span>
<span class="hps">Cisco</span> <span class="hps">CCIE</span> <span class="hps">Professional
Network</span> <span class="hps">and</span> <span class="hps">community</span> <span class="hps">design</span>. <span class="hps">Not only will it</span> <span class="hps">include</span> <span class="hps">the design principles</span> <span class="hps">of</span> <span class="hps">complex network</span> <span class="hps">theory</span>
<span class="hps">and</span> <span class="hps">analysis</span>, several operators <span class="hps">include</span> <span class="hps">high</span> <span class="hps">availability</span>
<span class="hps">design</span> <span class="hps">and</span> <span class="hps">architecture
concepts</span> <span class="hps">of strategic infrastructure.</span> <span class="hps">At the highest level</span>, <span class="hps">this credential</span> <span class="hps">is intended</span> <span class="hps">to focus</span> <span class="hps">"</span>over
the net" <span class="hps">design</span> <span class="hps">and</span> <span class="hps">network architecture</span> <span class="hps">leveraged</span> <span class="hps">to grow the</span> <span class="hps">business</span> <span class="hps">in</span>
<span class="hps">a</span> <span class="hps">respective organization.</span> </span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="mso-ansi-language: EN;"><span class="hps">There was a</span> <span class="hps">Q & A session</span> <span class="hps">with about 50</span> <span class="hps">initial</span> <span class="hps">CCIE</span>
<span class="hps">at</span> <span class="hps">Networkers</span> <span class="hps">this
week that</span> <span class="hps">gave</span> <span class="hps">a brief overview</span>
<span class="hps">of</span> <span class="hps">the intent</span> <span class="hps">of</span>
<span class="hps">Cisco</span>. <span class="hps">The next hour</span> <span class="hps">was spent</span> <span class="hps">in</span> <span class="hps">discussions
with</span> <span class="hps">the technicians.</span> <span class="hps">In</span> <span class="hps">general</span>, <span class="hps">Cisco</span> <span class="hps">is
making a strong</span> <span class="hps">community</span> <span class="hps">to
include the</span> <span class="hps">certification</span> <span class="hps">of</span>
<span class="hps">experts to prepare</span> <span class="hps">this new effort</span>
<span class="hps">certification</span>. <span class="hps">It</span> <span class="hps">'</span>something that should be <span class="hps">praised for</span>. <span class="hps">During the next</span> <span class="hps">week I'll post</span> <span class="hps">more information on the</span> <span class="hps">known</span> <span class="hps">beta</span> <span class="hps">and</span> <span class="hps">Q</span> <span class="hps">& A session</span> <span class="hps">program</span>.</span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7427783793923701341.post-45031782193609790592014-09-23T02:15:00.000-07:002014-09-23T02:15:43.907-07:00CCDE The Cisco Certified Design Expert<iframe width="640" height="360" src="//www.youtube.com/embed/P1_ufY9wL6o?feature=player_detailpage" frameborder="0" allowfullscreen></iframe>
<br>This course expands on what you learned in Introducing Cisco Data Center Networking (DCICN), introducing you to unified computing, unified fabric </br>Unknownnoreply@blogger.com0