
Welcome to Lukeoson Labs
+ ++ “It takes aeons of evolution and perpetual starvation" ... Work in progress +
+diff --git a/.nojekyll b/.nojekyll new file mode 100644 index 00000000..e69de29b diff --git a/404.html b/404.html new file mode 100644 index 00000000..45ac82c2 --- /dev/null +++ b/404.html @@ -0,0 +1,1273 @@ + + + +
+ + + + + + + + + + + + + + + + + +Luke Richardson is currently employed as Network Architect in London.
+
+ Network Architect
+ Hello@Lukeoson.com
+ Linkedin
+ +447376209455
+ lukeoson
+ Acclaim
+ Please don't hesitate to book time with my Fantasical.
Book a meeting or interview with my Fantasical. Thank you.
+Just want to chat? I'm always happy to meet people and discuss Technology.
+Scheduling an interview? Awesome. Thanks. Evenings are best.
+Arranging a paid consulting call? My rate is $500 per hour for Network Assurance.
+Need a speaker for your event? I'm ready. Please reach out!
+Want to discuss a potential collaboration? I'm always open to new opportunities.
+Want to talk about climbing? Don't be silly. See you at the crag!
+Anything regarding my current employment at Lloret? Please contact me directly.
+Getting deep and meaningful? You will need to agree that...
+... NOTHING is CERTAIN and EVERYTHING is POSSIBLE. 🎉
+Zoom Meeting with Luke NOW > 320 876 8436
+Google Meeting with Luke NOW > Reach me at lukeoson@gmail.com or 07376 209455
+Thank you. Your convenience is my priority
So feel free to use any other preferred method to reach out and conduct interviews or meetings.
+I cancelled my subscription. If you choose to Zoom it's 40mins on free tier.
+Luke Richardson is currently employed as a Network Architect in London.
+
+ Network Architect
+ Hello@Lukeoson.com
+ Linkedin
+ +447376209455
+ lukeoson
+ Acclaim
+ Please don't hesitate to book time with my Fantasical.
Luke's Employment in the Technology Industry includes WeWork & Dimension Data.
+gantt
+dateFormat YYYY
+title Luke's Career Path
+
+section Dimension Data
+Project Management & Network Engineer :done, 2012, 2017
+
+section Redstone
+Network Engineer :done, 2017, 2018
+
+section Sabbatical
+Peace & Quiet :done, 2018, 2019
+
+section WeWork
+Network Architect - Global :done, 2019, 2023
+
+section Lloret Control Systems
+Network Architect :active, 2023, 2025
+Where | +When | +What | +Why | +
---|---|---|---|
Available for Hire | +2024 - | +Network Automation | +Bring it all together | +
Lloret | +2023 - Present | +Network Architect | +Rediscover my Roots | +
WeWork | +2019 - 2023 | +Network Architect - Global | +Build Complex Systems at Scale | +
Redstone | +2017 - 2018 | +Network Engineer & TPM | +Prove Myself | +
Dimension Data | +2012 - 2017 | +PM to Network Engineer | +Learn the Ropes | +
Luke's Education includes a BA in Politics prior to his various Tech Industry roles.
+Where | +When | +What | +Why | +
---|---|---|---|
YouTube | +2008 - 2023 | +> 10,000 hours | +Life long learner | +
University of London | +2005 - 2008 | +Politics BA - 2:1 | +I should have known better | +
Bishop Stopford | +1997 - 2005 | +x4 A-levels Grade A | +The year they let you retake exams! | +
This chart shows a timeline of Luke's Professional Certifications and upcoming expiry.
+gantt
+dateFormat YYYY
+title Luke's Learning Path
+
+section You Tube
+Stay Curious :active, 2019, 2025
+
+section CCNA
+Cisco Route & Switch :done, 2019, 2022
+
+section JNCIA-Junos
+Juniper Networks Certified Associate - Junos :active, 2020, 2025
+
+section JNCIA-DevOps
+Juniper Networks Certified Associate - DevOps :active, 2020, 2025
+
+section JNCIA-Secuirty
+Juniper Networks Certified Associate - Security :active, 2020, 2025
+
+section JNCIA-Mist
+Juniper Networks Certified Associate - Mist :active, 2020, 2025
+
+section Juniper Associate x 4
+Juniper JNCIA x 4 :active, 2021, 2025
+
+section JNCIS-DevOps
+Juniper Networks Certified Specialist - DevOps :active, 2021, 2025
+
+section JNCIS-ENT
+Juniper Networks Certified Specialist - ENT :active, 2023, 2025
+
+section JNCIS-Mist
+Juniper Networks Certified Specialist - Mist :active, 2023, 2025
+
+section Juniper Specialist x3
+Juniper JNCIS x 3 :active, 2023, 2025
+
+section Juniper Innovator
+Juniper Networks Innovator :done, 2023, 2024
+
+section GitLab Associate
+GitLab Certified Git Associate :active, 2021, 2025
+
+section AWS Certified Cloud
+AWS Certified Cloud :active, 2021, 2025
+
+section Okta Professional
+Okta Certified Professional :done, 2021, 2024
+
+section GitHub
+GitHub Foundations :active, 2023, 2025
+
+section Allied Telesis
+Allied Telesis Professional ENT :active, 2023, 2025
+
+section Lost to Time
+Multiple others not stored in Credly :done, 2020, 2025
+Luke's Career story is of ascending rigour & complexity (1) Smartly Summarised
+ +Lloret Control Systems
+Cisco & Aruba Greenfield Enterprise Systems Architecture. Smart Buildings & IoT.
+I made the decision for move on from Lloret. I'm looking for something more inspiring that embraces the paradigm shift toward Automated Infrastructure as Code.
+++Network Design mapping Client Specifications to constraints.
+
+ Requirements delivered in strict adherence to defined budget.
+ Managed multitudinous stakeholders expectations.
+ Built a frame of reference for future project pipelines.
+ Delivered in strict adherence to defined timeline.
WeWork
+Key contributor to the global Network Architecture.
+Circa 750 Branches spanning >100 Countries with x4 Data Centres in x3 Continents.
+++Transition the Global Branch Network to Juniper Full Stack.
+
+ Radically reduced outages & increased network performance.
+ Accommodations for budget & logistics constraints.
+ Enabled the Golden Config for global standardisation.
+ Completed refresh of First Generation Branches by 2023.
Key contributor to the global Network Automation & Orchestration Strategy.
+Much nuance here, lessons learnt and all that jazz.
+++Incorporate the Branch Network into a code pipeline.
+
+ Reduce the time to deploy a change from days to minutes.
+ Built block by block. Source of Truth & Assurance first.
+ Radically reduce team toil & increased Member MPS.
+ Complete the transition to Infrastructure as Code by 2023.
Owner & Keeper of Nautobot & Netbox Sources of Truth & IPFabric Network Assurance.
+Network to Code & IPFabric are wonderful companies - I joyfully advocate for!
+++Built Nautobot in AWS & IPFabric as distributed On-Premise.
+
+ Accurate Database of >10,000 network devices. No Diff.
+ Cross Functional collaboration with DevOps & Security.
+ Ensure we have viable Sources of Truth both actual & desired.
+ Complete the transition to Infrastructure as Code by 2023.
Administrative duties of Splunk Cloud Observability & Okta SSO.
+An unexpected void following Layoffs - I was eager to help!
+++Be the gateway for SSO configuration & access in Network Systems.
+
+ Configuration & Access verified by Cyber Compliance Team.
+ Training & Documentation for Okta & Splunk.
+ Ensured the Network Team had the correct access to the correct systems.
+ Completed the transition to SSO Okta for capable Systems by 2023.
Luke's Hobbies occupied much of his twenties as he pursued adventure sports.
+Alas, time flies, he is now 38 years old and primarily focused on his career.
+Luke's life tree looks like this:
+ +Luke's 2022 WeWork Performance Review
+If you would like a reference, Brandon Ross would be a useful starting point.
+Describe how Luke has successfully delivered business impact:
+++"Luke is exceptionally good at identifying technology business opportunities and delivering on them. Luke's management of IPFabric and Netbox have been stellar."
+
Brandon Ross, Network Architecture Director, WeWork
+Describe how Luke could work to further elevate their business impact:
+++"Luke should continue his excellent progress at building relationships with other stakeholders around Wework."
+
Brandon Ross, Network Architecture Director, WeWork
+Categorize Luke's proficiency across each impact driver:
+>>>>>>>>>>>>>>
Core Strength>>>>>>>>>>>>>>>>>>
Core Strength>>>>>>>>>>>>>>>>>>>>>>>>>>
Exceptional Skill>>>>>>>>>>>>>
Core Strength>>>>>>>>>>>>>>>>>>
Core Strength>>>>>>>>>>>>>>>>>
Exceptional Skill>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
High>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Maximum++ + + + + + + + + + + + + + + + +Thanks for taking the time to read my resume. Please get in touch. 🎉
+
Luke's Employment in the Technology Industry includes WeWork & Dimension Data.
+<div data-iframe-width="150" data-iframe-height="270" data-share-badge-id="4e357c24-30e4-4379-8e20-54bedc6213dd" data-share-badge-host="https://www.credly.com"></div>
+<!-- Additional badges can be added here -->
+</div>
+<script type="text/javascript" async src="//cdn.credly.com/assets/utilities/embed.js"></script>
+
pending
+ + + + + + + + + + + + + + + + ++-------------------+ +--------------------+ +| Clone Repo |-----> | Create New Branch | ++-------------------+ +--------------------+ + | + v + +--------------------+ + | Make Changes | + +--------------------+ + | + v + +--------------------+ + | Commit Changes | + +--------------------+ + | + v + +--------------------+ + | Push to Remote | + +--------------------+ + | + v + +--------------------+ + | Merge to Main/Prod| + +--------------------+
+ + + + + + + + + + + + + + + + +pending
+ + + + + + + + + + + + + + + + +pending
+ + + + + + + + + + + + + + + + +pending
+ + + + + + + + + + + + + + + + +pending
+ + + + + + + + + + + + + + + + +pending
+ + + + + + + + + + + + + + + + +pending
+ + + + + + + + + + + + + + + + +IPv4 addresses are assigned by IANA (Internet Assigned Numbers Authority).
+They allocate routable IP addresses to ISPs (Internet Service Providers).
+ISPs assign routable IP addresses to customers.
+Octet Number | +Binary Format | +Decimal Equivalent | +
---|---|---|
1st Octet | +00000000 | +0 - 255 | +
2nd Octet | +00000000 | +0 - 255 | +
3rd Octet | +00000000 | +0 - 255 | +
4th Octet | +00000000 | +0 - 255 | +
Octet Number | +Binary Format | +Decimal Equivalent | +
---|---|---|
1st Octet | +11000000 | +192 | +
2nd Octet | +10101000 | +168 | +
3rd Octet | +00000001 | +1 | +
4th Octet | +00000010 | +2 | +
Component | +Description | +Details | +
---|---|---|
Octet | +An IPv4 address is divided into 4 octets. | +Each octet consists of 8 bits. | +
Bit | +The basic unit of data in an IP address. | +There are 32 bits in total (8 bits per octet). | +
Byte | +Equivalent to one octet. | +Each byte (or octet) ranges from 0 to 255. | +
Example | +For the IP address 192.168.1.2: | +- 192 is the first octet (byte). - 168 is the second octet (byte). - 1 is the third octet (byte). - 2 is the fourth octet (byte). |
+
Octet Number | +Binary Format | +Decimal Equivalent | +
---|---|---|
1st Octet | +00001010 | +10 | +
2nd Octet | +01000110 | +70 | +
3rd Octet | +00000011 | +3 | +
4th Octet | +01100100 | +100 | +
Group Number | +Binary Format | +Hexadecimal Equivalent | +
---|---|---|
1st Group | +0000000000000000 | +0000 - FFFF | +
2nd Group | +0000000000000000 | +0000 - FFFF | +
3rd Group | +0000000000000000 | +0000 - FFFF | +
4th Group | +0000000000000000 | +0000 - FFFF | +
5th Group | +0000000000000000 | +0000 - FFFF | +
6th Group | +0000000000000000 | +0000 - FFFF | +
7th Group | +0000000000000000 | +0000 - FFFF | +
8th Group | +0000000000000000 | +0000 - FFFF | +
Example IPv6 Address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Step | +Description | +IPv6 Address | +
---|---|---|
1 | +Remove leading zeros in each block | +2001:db8:85a3:0:0:8a2e:370:7334 |
+
2 | +Collapse consecutive blocks of zeros with :: |
+2001:db8:85a3::8a2e:370:7334 |
+
2001:db8:85a3::8a2e:370:7334
must remain as it is. ::
Note
+Dropping leading zeros in IPv6 addresses still makes sense because each field in an IPv6 address is understood to be a fixed size of 16 bits, represented in hexadecimal. When you see a field like 0db8, it's clear that it represents four hexadecimal digits, even if it's written as db8. The leading zero doesn't add any additional information because the size of the field is already established.
+graph LR
+ A[IPv6 Address] --> B[Group 1]
+ A --> C[Group 2]
+ A --> D[Group 3]
+ A --> E[Group 4]
+ A --> F[Group 5]
+ A --> G[Group 6]
+ A --> H[Group 7]
+ A --> I[Group 8]
+
+ B --> B1[16 bits<br>Hex: 2001]
+ C --> C1[16 bits<br>Hex: 0db8]
+ D --> D1[16 bits<br>Hex: 85a3]
+ E --> E1[16 bits<br>Hex: 0000]
+ F --> F1[16 bits<br>Hex: 0000]
+ G --> G1[16 bits<br>Hex: 8a2e]
+ H --> H1[16 bits<br>Hex: 0370]
+ I --> I1[16 bits<br>Hex: 7334]
+
+ style A fill:#f9f,stroke:#333,stroke-width:4px
+ style B fill:#ccf,stroke:#f66,stroke-width:2px
+ style C fill:#ccf,stroke:#f66,stroke-width:2px
+ style D fill:#ccf,stroke:#f66,stroke-width:2px
+ style E fill:#ccf,stroke:#f66,stroke-width:2px
+ style F fill:#ccf,stroke:#f66,stroke-width:2px
+ style G fill:#ccf,stroke:#f66,stroke-width:2px
+ style H fill:#ccf,stroke:#f66,stroke-width:2px
+ style I fill:#ccf,stroke:#f66,stroke-width:2px
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Network Congestion: Broadcast packets are sent to all devices on a network segment, regardless of whether they're the intended recipient. This means every device has to process these packets, even if they're irrelevant. On a busy network, this can lead to a lot of unnecessary data traffic, congesting the network.
+Resource Drain: Each device on the network must process and determine the relevance of broadcast packets. This can be a drain on resources, especially on devices that might already be running heavy tasks. It's like getting a bunch of irrelevant group emails; you have to check each one, just in case.
+Reduced Performance: High levels of broadcast traffic can slow down the overall network performance. Devices spend time and processing power handling these broadcasts, which could be better spent on actual data transmission relevant to their tasks.
+Security Concerns: Broadcasts can be a security risk. They can potentially be used for malicious activities like broadcast storms or as a method to discover devices on a network by an attacker.
+The goal in network design and management is, therefore, to keep broadcast traffic as minimal as possible. This can be achieved by:
+In essence, minimizing broadcast packets helps maintain a smoother, faster, and more secure network. It's like keeping public announcements in a big building to only the floors that need to hear them, rather than blasting them everywhere!
+ + + + + + + + + + + + + + + + +CIDR stands for "Classless Inter-Domain Routing." It's a method used for allocating IP addresses and routing Internet Protocol packets. CIDR replaced the older system based on classes A, B, and C in the 1990s.
+++We call slash notation "CIDR notation" because it's a key component of Classless Inter-Domain Routing (CIDR), which is a method for allocating IP addresses and routing decisions. The slash notation is a concise way to represent an IP address and its associated routing prefix.
+
Decimal Subnet Mask | +Binary Subnet Mask | +CIDR Notation | +
---|---|---|
255.255.255.255 | +11111111.11111111.11111111.11111111 | +/32 | +
255.255.255.254 | +11111111.11111111.11111111.11111110 | +/31 | +
255.255.255.252 | +11111111.11111111.11111111.11111100 | +/30 | +
255.255.255.248 | +11111111.11111111.11111111.11111000 | +/29 | +
255.255.255.240 | +11111111.11111111.11111111.11110000 | +/28 | +
255.255.255.224 | +11111111.11111111.11111111.11100000 | +/27 | +
255.255.255.192 | +11111111.11111111.11111111.11000000 | +/26 | +
255.255.255.128 | +11111111.11111111.11111111.10000000 | +/25 | +
255.255.255.0 | +11111111.11111111.11111111.00000000 | +/24 | +
255.255.254.0 | +11111111.11111111.11111110.00000000 | +/23 | +
255.255.252.0 | +11111111.11111111.11111100.00000000 | +/22 | +
255.255.248.0 | +11111111.11111111.11111000.00000000 | +/21 | +
255.255.240.0 | +11111111.11111111.11110000.00000000 | +/20 | +
255.255.224.0 | +11111111.11111111.11100000.00000000 | +/19 | +
255.255.192.0 | +11111111.11111111.11000000.00000000 | +/18 | +
255.255.128.0 | +11111111.11111111.10000000.00000000 | +/17 | +
255.255.0.0 | +11111111.11111111.00000000.00000000 | +/16 | +
255.254.0.0 | +11111111.11111110.00000000.00000000 | +/15 | +
255.252.0.0 | +11111111.11111100.00000000.00000000 | +/14 | +
255.248.0.0 | +11111111.11111000.00000000.00000000 | +/13 | +
255.240.0.0 | +11111111.11110000.00000000.00000000 | +/12 | +
255.224.0.0 | +11111111.11100000.00000000.00000000 | +/11 | +
255.192.0.0 | +11111111.11000000.00000000.00000000 | +/10 | +
255.128.0.0 | +11111111.10000000.00000000.00000000 | +/9 | +
255.0.0.0 | +11111111.00000000.00000000.00000000 | +/8 | +
254.0.0.0 | +11111110.00000000.00000000.00000000 | +/7 | +
252.0.0.0 | +11111100.00000000.00000000.00000000 | +/6 | +
248.0.0.0 | +11111000.00000000.00000000.00000000 | +/5 | +
240.0.0.0 | +11110000.00000000.00000000.000000 | +/4 | +
224.0.0.0 | +11100000.00000000.00000000.00000000 | +/3 | +
192.0.0.0 | +11000000.00000000.00000000.00000000 | +/2 | +
128.0.0.0 | +10000000.00000000.00000000.00000000 | +/1 | +
0.0.0.0 | +00000000.00000000.00000000.00000000 | +/0 (Default) | +
Class A: Large networks, 0-126.
+0xxxxxxx | First bit is OFF.
+Class B: Medium networks, 128-191.
+10xxxxxx | First bit is ON, Second bit is OFF.
+Class C: Small networks, 192-223.
+110xxxxx | First two bits are ON, Third bit is OFF.
+Class D: Multicast groups, 224-239.
+1110xxxx | First three bits are ON, Fourth bit is OFF.
+Class E: Experimental use, 240-255.
+1111xxxx | First four bits are ON.
+Class | +Leading Bits | +Range of First Octet | +
---|---|---|
A | +0xxxxxxx | +0 - 127 | +
B | +10xxxxxx | +128 - 191 | +
C | +110xxxxx | +192 - 223 | +
D | +1110xxxx | +224 - 239 | +
E | +1111xxxx | +240 - 255 | +
Luke's favourite Visual Subnet Calc from davidc.net.
+A common introductory source of info at How to Network.com.
+Lets start with a Class C network stealing 2 bits from Hosts.
+How about 192.168.100.0/26
+IP Address | +Subnet Mask | +CIDR Notation | +Binary Subnet Mask | +
---|---|---|---|
192.168.100.0 | +255.255.255.192 | +/26 | +11111111.11111111.11111111.11000000 | +
Concept | +Explanation | +
---|---|
Network Address | +192.168.100.128 (192.168.100.130 falls in this range) | +
CIDR Notation | +/26 (means 26 bits for network, remaining for host) | +
Subnet Mask | +255.255.255.192 (or /26) | +
Binary Subnet Mask | +11111111.11111111.11111111.11000000 | +
Host Address Range | +192.168.100.128 - 192.168.100.191 | +
Next Network Address | +192.168.100.192 (since /26 allows 64 addresses per subnet) | +
Broadcast Address | +192.168.100.191 (one less than the next network address) | +
Let's start with a Class B network stealing 3 bits from Hosts.
+How about 172.16.0.0/19
+IP Address | +Subnet Mask | +CIDR Notation | +Binary Subnet Mask | +
---|---|---|---|
172.16.0.0 | +255.255.224.0 | +/19 | +11111111.11111111.11100000.00000000 | +
Concept | +Explanation | +
---|---|
Network Address | +172.16.32.0 (172.16.32.130 falls in this range) | +
CIDR Notation | +/19 (means 19 bits for network, remaining for host) | +
Subnet Mask | +255.255.224.0 (or /19) | +
Binary Subnet Mask | +11111111.11111111.11100000.00000000 | +
Host Address Range | +172.16.32.0 - 172.16.63.255 | +
Next Network Address | +172.16.64.0 (since /19 allows 8192 addresses per subnet) | +
Broadcast Address | +172.16.63.255 (one less than the next network address) | +
Let's start with a Class A network stealing 4 bits from Hosts.
+How about 10.0.0.0/12
+IP Address | +Subnet Mask | +CIDR Notation | +Binary Subnet Mask | +
---|---|---|---|
10.0.0.0 | +255.240.0.0 | +/12 | +11111111.11110000.00000000.00000000 | +
Concept | +Explanation | +
---|---|
Network Address | +10.16.0.0 (10.16.0.130 falls in this range) | +
CIDR Notation | +/12 (means 12 bits for network, remaining for host) | +
Subnet Mask | +255.240.0.0 (or /12) | +
Binary Subnet Mask | +11111111.11110000.00000000.00000000 | +
Host Address Range | +10.16.0.0 - 10.31.255.255 | +
Next Network Address | +10.32.0.0 (since /12 allows 1,048,576 addresses per subnet) | +
Broadcast Address | +10.31.255.255 (one less than the next network address) | +
MAC Addresses are 48 bits long.
+IPv6 Addresses are 128 bits long.
+Made of 16 Symbols
+More User-Friendly Than Binary
+Base-16 Numbering System: Hexadecimal is a base-16 system. Power of 16.
+Binary is Base-2: Binary is a base-2 system. Power of 2.
+Decimal is Base-10: Power of 10. 10 Digits! Caveman Counting.
+graph TD
+ subgraph A[Decimal]
+ A1[0]
+ A2[1]
+ A3[2]
+ A4[3]
+ A5[4]
+ A6[5]
+ A7[6]
+ A8[7]
+ A9[8]
+ A10[9]
+ A11[10]
+ A12[11]
+ A13[12]
+ A14[13]
+ A15[14]
+ A16[15]
+ end
+
+ subgraph B[Hexadecimal]
+ B1[0]
+ B2[1]
+ B3[2]
+ B4[3]
+ B5[4]
+ B6[5]
+ B7[6]
+ B8[7]
+ B9[8]
+ B10[9]
+ B11[A]
+ B12[B]
+ B13[C]
+ B14[D]
+ B15[E]
+ B16[F]
+ end
+
+ A1 --> B1
+ A2 --> B2
+ A3 --> B3
+ A4 --> B4
+ A5 --> B5
+ A6 --> B6
+ A7 --> B7
+ A8 --> B8
+ A9 --> B9
+ A10 --> B10
+ A11 --> B11
+ A12 --> B12
+ A13 --> B13
+ A14 --> B14
+ A15 --> B15
+ A16 --> B16
+Decimal | +Hexadecimal | +Binary | +
---|---|---|
0 | +0 | +0000 | +
1 | +1 | +0001 | +
2 | +2 | +0010 | +
3 | +3 | +0011 | +
4 | +4 | +0100 | +
5 | +5 | +0101 | +
6 | +6 | +0110 | +
7 | +7 | +0111 | +
8 | +8 | +1000 | +
9 | +9 | +1001 | +
10 | +A | +1010 | +
11 | +B | +1011 | +
12 | +C | +1100 | +
13 | +D | +1101 | +
14 | +E | +1110 | +
15 | +F | +1111 | +
Network | +IP Address | +Subnet Mask | +Description | +
---|---|---|---|
LAN | +10.1.0.1 | +255.255.0.0 | +LAN Network | +
STAFF | +10.70.0.1 | +255.255.0.0 | +Staff Network | +
BYOD | +10.110.0.1 | +255.255.0.0 | +BYOD Network | +
GUEST | +10.120.0.1 | +255.255.0.0 | +Guest Network | +
set ip 10.1.0.1 255.255.0.0 #LAN
+set ip 10.70.0.1 255.255.0.0 #STAFF
+set ip 10.110.0.1 255.255.0.0 #BYOD
+set ip 10.120.0.1 255.255.0.0 #GUEST
+
site002 $ get system arp
+Address Age(min) Hardware Addr Interface
+10.70.3.5 0 64:79:f0:45:eb:56 lloret_staff
+10.70.3.72 15 c4:9d:ed:ad:27:d9 lloret_staff
+10.120.0.32 1 d2:eb:db:14:f6:d5 lloret_guest
+10.70.241.1 1 c0:56:e3:50:32:94 lloret_staff
+10.120.0.44 1 66:c9:6a:28:bd:73 lloret_guest
+10.70.3.29 0 d8:bb:c1:0e:e7:8e lloret_staff
+10.70.3.41 0 f4:a8:0d:5c:e5:82 lloret_staff
+10.120.0.68 1 ce:d9:90:ca:85:38 lloret_guest
+10.70.0.206 0 00:0c:29:95:86:5a lloret_staff
+10.70.0.17 0 00:11:32:b4:fd:93 lloret_staff
+10.70.3.53 3 e0:4f:43:e3:c0:b3 lloret_staff
+10.110.0.40 3 26:39:93:9a:9c:c0 lloret_byod
+10.70.240.100 12 6c:4b:90:6b:a1:d6 lloret_staff
+10.120.0.25 1 ce:91:23:e7:02:c0 lloret_guest
+10.70.3.10 3 d8:5e:d3:ae:d4:3c lloret_staff
+10.70.3.77 0 28:16:a8:04:d8:a7 lloret_staff
+10.70.3.22 0 08:3a:88:6d:d2:45 lloret_staff
+10.70.1.69 0 1c:69:7a:64:db:5f lloret_staff
+10.70.3.34 0 6c:24:08:2c:05:dd lloret_staff
+10.110.0.21 0 5a:20:ea:cb:62:b7 lloret_byod
+10.70.3.46 0 f8:75:a4:7f:21:f2 lloret_staff
+10.70.0.10 0 9c:8e:99:4b:9d:68 lloret_staff
+10.1.0.241 1 78:bc:1a:ad:ed:52 lan
+10.120.0.73 1 ba:cc:77:f4:f0:2b lloret_guest
+10.70.3.70 0 f8:75:a4:7f:40:25 lloret_staff
+10.120.0.30 1 0e:4a:68:ac:9d:e3 lloret_guest
+10.70.3.15 1 50:a4:d0:61:13:bd lloret_staff
+10.70.243.153 1 58:fd:b1:56:7c:81 lloret_staff
+10.1.0.21 3 24:9a:d8:2b:16:79 lan
+10.70.3.27 1 6c:4b:90:59:5e:b7 lloret_staff
+10.70.3.39 0 98:ee:cb:ea:0a:70 lloret_staff
+10.70.3.51 0 44:39:c4:34:ee:5c lloret_staff
+10.70.0.15 0 00:11:32:e9:02:2b lloret_staff
+10.1.0.246 1 08:4f:a9:fd:86:c4 lan
+10.120.0.23 0 a2:60:df:48:18:97 lloret_guest
+10.70.2.248 0 b8:27:eb:3f:36:43 lloret_staff
+10.70.3.8 0 50:a4:d0:61:3b:5f lloret_staff
+10.70.3.20 0 50:a4:d0:61:3b:68 lloret_staff
+10.70.3.32 0 04:ec:d8:26:6b:cd lloret_staff
+10.70.3.44 0 48:2a:e3:aa:f5:e4 lloret_staff
+10.70.3.56 1 50:a4:d0:61:3b:44 lloret_staff
+10.120.0.83 1 3e:93:08:cd:7d:00 lloret_guest
+10.70.3.13 1 50:a4:d0:61:3a:6c lloret_staff
+10.70.243.151 8794 88:c9:b3:d0:17:4f lloret_staff
+10.120.0.40 2 62:ca:9e:c2:99:c6 lloret_guest
+10.70.3.25 0 24:9a:d8:0d:1d:d1 lloret_staff
+10.70.3.49 0 28:16:a8:01:87:f5 lloret_staff
+10.1.0.244 1 5c:5a:c7:57:c4:20 lan
+10.70.3.61 0 a4:f9:33:4d:7c:68 lloret_staff
+10.70.3.6 0 f4:a8:0d:32:44:12 lloret_staff
+10.70.3.18 1 50:a4:d0:61:3a:e4 lloret_staff
+86.188.216.217 0 54:a2:74:27:f7:11 wan1
+10.120.0.45 2 56:c0:73:c9:11:da lloret_guest
+10.70.3.30 0 d8:5e:d3:ae:d4:3b lloret_staff
+10.70.243.101 3 00:0e:c6:d3:f1:e4 lloret_staff
+10.70.0.6 2670 9c:b6:54:74:9c:ca lloret_staff
+10.70.3.42 0 10:60:4b:68:0a:8f lloret_staff
+10.70.3.66 0 0c:37:96:15:9e:c7 lloret_staff
+10.70.3.11 0 10:b5:88:06:96:67 lloret_staff
+10.120.0.93 0 26:61:e0:70:54:60 lloret_guest
+10.120.0.38 3 5e:7e:9c:18:45:d0 lloret_guest
+10.70.3.23 3 02:11:32:2f:e9:be lloret_staff
+10.120.0.50 1 42:16:3f:ae:69:02 lloret_guest
+10.70.3.35 0 04:ec:d8:7c:db:de lloret_staff
+10.70.3.47 0 5c:e9:1e:6b:54:a9 lloret_staff
+10.70.0.11 0 02:11:32:27:bb:b6 lloret_staff
+10.1.0.242 1 10:b3:d6:46:49:ee lan
+10.70.3.83 1 e8:eb:1b:11:af:f7 lloret_staff
+10.70.3.28 0 00:0a:b0:07:25:83 lloret_staff
+10.70.3.40 22 40:16:3b:c1:a3:d1 lloret_staff
+10.70.3.52 0 e4:a8:df:95:98:b8 lloret_staff
+10.70.0.16 0 00:11:32:d2:1d:9e lloret_staff
+10.1.0.247 1 78:bc:1a:ad:ee:28 lan
+10.70.3.64 0 d4:3d:7e:7d:fa:89 lloret_staff
+10.70.2.249 0 b8:27:eb:9a:44:39 lloret_staff
+10.70.3.9 0 d8:5e:d3:ae:d2:34 lloret_staff
+10.70.3.21 1 44:39:c4:34:f8:28 lloret_staff
+10.70.3.33 0 14:d6:4d:1f:e5:fa lloret_staff
+10.70.3.45 0 f4:a8:0d:31:df:d1 lloret_staff
+10.70.242.100 52 00:80:f4:46:e9:a2 lloret_staff
+10.70.3.57 2 98:ee:cb:a5:d7:b6 lloret_staff
+10.1.1.12 4 30:b5:c2:cd:9c:6e lan
+10.70.3.2 8432 9c:50:d1:20:49:01 lloret_staff
+10.70.3.69 0 98:ee:cb:b7:23:61 lloret_staff
+10.120.0.29 0 a2:9b:d9:63:07:4f lloret_guest
+10.70.3.14 2 08:3a:88:69:34:be lloret_staff
+10.70.3.81 5 98:ee:cb:9c:3c:48 lloret_staff
+10.70.3.26 5 60:70:c0:48:f6:e4 lloret_staff
+10.70.3.38 0 d8:80:83:3f:58:fb lloret_staff
+10.70.0.14 5 00:11:32:8a:ac:85 lloret_staff
+10.1.0.245 1 08:4f:a9:ae:44:d4 lan
+10.70.3.62 1 8c:89:a5:3c:bf:bf lloret_staff
+192.168.1.1 0 00:1e:42:15:a3:64 wan2
+10.120.0.22 17 68:ec:c5:b1:8f:0f lloret_guest
+10.120.0.89 1 2a:2a:5d:c2:a0:82 lloret_guest
+10.70.3.74 0 cc:48:3a:c3:2a:67 lloret_staff
+10.70.3.19 0 08:3a:88:6d:6c:59 lloret_staff
+10.70.3.31 0 e0:4f:43:25:04:ab lloret_staff
+10.70.3.55 3 e8:ea:6a:83:df:49 lloret_staff
+10.120.0.82 2 4a:bc:2b:b8:12:89 lloret_guest
+10.120.0.27 0 ca:12:b5:1c:71:18 lloret_guest
+10.70.3.12 1 6c:3c:8c:7a:25:46 lloret_staff
+10.70.243.150 2 00:0a:b0:09:66:11 lloret_staff
+10.70.3.24 0 74:97:79:ec:a4:29 lloret_staff
+10.70.3.36 3 50:a4:d0:61:3b:62 lloret_staff
+10.70.0.12 2 02:11:32:27:ba:55 lloret_staff
+
+site002 $
+
IP Address | +Subnet Mask | +CIDR Notation | +Binary Subnet Mask | +
---|---|---|---|
10.1.0.1 | +255.255.0.0 | +/16 | +11111111.11111111.00000000.00000000 | +
Concept | +Explanation | +
---|---|
Network Address | +10.1.0.0 (10.1.0.130 falls in this range) | +
CIDR Notation | +/16 (means 16 bits for network, remaining for host) | +
Subnet Mask | +255.255.0.0 (or /16) | +
Binary Subnet Mask | +11111111.11111111.00000000.00000000 | +
Host Address Range | +10.1.0.0 - 10.1.255.255 | +
Broadcast Address | +10.1.255.255 (covers the entire 10.1.x.x range) | +
This example is specific to the 10.1.0.1/16 subnet, detailing its characteristics and addressing within a Class A network.
+IP Address | +Subnet Mask | +CIDR Notation | +Binary Subnet Mask | +
---|---|---|---|
10.70.0.0 | +255.255.0.0 | +/16 | +11111111.11111111.00000000.00000000 | +
Concept | +Explanation | +
---|---|
Network Address | +10.70.0.0 (10.70.3.130 falls in this range) | +
CIDR Notation | +/16 (means 16 bits for network, remaining for host) | +
Subnet Mask | +255.255.0.0 (or /16) | +
Binary Subnet Mask | +11111111.11111111.00000000.00000000 | +
Host Address Range | +10.70.0.0 - 10.70.255.255 | +
Broadcast Address | +10.70.255.255 (covers the entire 10.70.x.x range) | +
IP Address | +Subnet Mask | +CIDR Notation | +Binary Subnet Mask | +
---|---|---|---|
10.110.0.1 | +255.255.0.0 | +/16 | +11111111.11111111.00000000.00000000 | +
Concept | +Explanation | +
---|---|
Network Address | +10.110.0.0 (10.110.0.130 falls in this range) | +
CIDR Notation | +/16 (means 16 bits for network, remaining for host) | +
Subnet Mask | +255.255.0.0 (or /16) | +
Binary Subnet Mask | +11111111.11111111.00000000.00000000 | +
Host Address Range | +10.110.0.0 - 10.110.255.255 | +
Broadcast Address | +10.110.255.255 (covers the entire 10.110.x.x range) | +
IP Address | +Subnet Mask | +CIDR Notation | +Binary Subnet Mask | +
---|---|---|---|
10.120.0.1 | +255.255.0.0 | +/16 | +11111111.11111111.00000000.00000000 | +
Concept | +Explanation | +
---|---|
Network Address | +10.120.0.0 (10.120.0.130 falls in this range) | +
CIDR Notation | +/16 (means 16 bits for network, remaining for host) | +
Subnet Mask | +255.255.0.0 (or /16) | +
Binary Subnet Mask | +11111111.11111111.00000000.00000000 | +
Host Address Range | +10.120.0.0 - 10.120.255.255 | +
Broadcast Address | +10.120.255.255 (covers the entire 10.120.x.x range) | +
Binary: Base-2, uses 0 and 1.
+ +Hexadecimal: Base-16, uses 0-9 and A-F.
+ +Decimal: Base-10, uses 0-9.
+ +Bit Position | +7 | +6 | +5 | +4 | +3 | +2 | +1 | +0 | +
---|---|---|---|---|---|---|---|---|
Binary Value | +128 | +64 | +32 | +16 | +8 | +4 | +2 | +1 | +
What is The OSI Model by Cloudflare ?
+The Open Systems Interconnect Model from the International Organization for Standardization
+The OSI model was first defined in raw form in Washington, D.C., in February 1978 by French software engineer Hubert Zimmermann, and the refined but still draft standard was published by the ISO in 1980.
+It is a reference model. Ultimately, the TCP/IP model is the more practical model for today's networks, but the OSI model is still used to describe network layers and protocols. The US DoD invented the TCP/IP model in the 1970s, and it was used to build the internet. The OSI model was created in the 1980s by the International Organization for Standardization (ISO), and it was designed to be an abstract model for describing network protocols, not a practical model for building networks.
+Layer Number | +Layer Name | +Function | +Examples | +
---|---|---|---|
7 | +Application | +Provides network services directly to applications | +HTTP, FTP, SMTP | +
6 | +Presentation | +Translates data between the network and application formats | +SSL, TLS, JPEG, MPEG | +
5 | +Session | +Manages sessions between applications | +NetBIOS, RPC | +
4 | +Transport | +Provides reliable data transfer | +TCP, UDP | +
3 | +Network | +Handles addressing and routing of data packets | +IP, ICMP, IPSec | +
2 | +Data Link | +Transfers data between network and physical layers | +Ethernet, PPP, Switch, Bridge | +
1 | +Physical | +Deals with the physical connection to the network, data transmission | +Cables, Hubs, Repeaters, Network Cards | +
Layer Number | +Layer Name | +Function | +Examples | +
---|---|---|---|
4 | +Application | +Handles high-level protocols, representation, encoding | +HTTP, SMTP, FTP, DNS | +
3 | +Transport | +Manages end-to-end data transmission | +TCP, UDP | +
2 | +Internet | +Determines the best path through the network | +IP (IPv4, IPv6), ICMP | +
1 | +Network Access (or Link) | +Deals with the physical aspects of data transmission | +Ethernet, Wi-Fi, ARP | +
Protocol | +OSI Layer | +Description | +
---|---|---|
BACnet | +Application | +Provides rules for data representation and communication. | +
+ | Network | +BACnet/IP uses IP for networking. | +
+ | Physical/Data Link | +Uses Ethernet, ARCNET, or MSTP for physical communication. | +
Modbus | +Application | +Defines its own data model and functions at this layer. | +
+ | Transport | +In Modbus TCP/IP, TCP is used for transport. | +
+ | Network | +Modbus TCP/IP uses IP. | +
+ | Physical/Data Link | +In Modbus Serial (RTU or ASCII), operates over RS-232 or RS-485 lines. | +
Stage | +Description | +
---|---|
1. Generation | +Data is generated or requested by an application. | +
2. Encapsulation | +Data is encapsulated into packets with headers. | +
3. Transmission | +Packets are transmitted over the network. | +
4. Routing | +Routers forward packets based on destination. | +
5. Switching | +Switches forward packets within local networks. | +
6. Arrival | +Packets arrive at their destination. | +
7. Decapsulation | +Packets are decapsulated to retrieve data. | +
8. Delivery | +Data is delivered to the destination app. | +
+-----------------------------------+
+ | Layer 7: Application |
+ | - Data generated by app |
+ +-----------------------------------+
+ | Layer 6: Presentation |
+ | - Data conversion and encoding|
+ +-----------------------------------+
+ | Layer 5: Session |
+ | - Session management |
+ +-----------------------------------+
+ | Layer 4: Transport |
+ | - Segmentation/Reassembly |
+ | - Ports and error checking |
+ +-----------------------------------+
+ | Layer 3: Network |
+ | - Routing |
+ | - Logical addressing |
+ +-----------------------------------+
+ | Layer 2: Data Link |
+ | - Frame creation/interpretation|
+ | - MAC addressing |
+ +-----------------------------------+
+ | Layer 1: Physical |
+ | - Transmission of raw bits |
+ +-----------------------------------+
+
Power of 2 | +Result | +
---|---|
2^0 | +1 | +
2^1 | +2 | +
2^2 | +4 | +
2^3 | +8 | +
2^4 | +16 | +
2^5 | +32 | +
2^6 | +64 | +
2^7 | +128 | +
2^8 | +256 | +
2^9 | +512 | +
2^10 | +1,024 | +
2^11 | +2,048 | +
2^12 | +4,096 | +
2^13 | +8,192 | +
2^14 | +16,384 | +
2^15 | +32,768 | +
2^16 | +65,536 | +
2^17 | +131,072 | +
2^18 | +262,144 | +
2^19 | +524,288 | +
2^20 | +1,048,576 | +
2^21 | +2,097,152 | +
2^22 | +4,194,304 | +
2^23 | +8,388,608 | +
2^24 | +16,777,216 | +
Bit Position | +Possible Values | +
---|---|
1 | +128 | +
2 | +192 | +
3 | +224 | +
4 | +240 | +
5 | +248 | +
6 | +252 | +
7 | +254 | +
8 | +255 | +
Here is my go to Visual Subnet Calc.
+But it is handy to know the basic theory. ␆
+In most programming languages, arrays and sequences start at index 0. This convention carries over to how we count positions in a binary number. It aligns with the way memory addresses and offsets are calculated in computer systems.
+Bit Position | +7 | +6 | +5 | +4 | +3 | +2 | +1 | +0 | +
---|---|---|---|---|---|---|---|---|
Binary Value | +128 | +64 | +32 | +16 | +8 | +4 | +2 | +1 | +
Binary Bits | +Decimal Number | +
---|---|
00000000 | +0 | +
00000001 | +1 | +
00000010 | +2 | +
00000011 | +3 | +
00000100 | +4 | +
00000101 | +5 | +
00000110 | +6 | +
00000111 | +7 | +
00001000 | +8 | +
00001001 | +9 | +
... | +... | +
11111110 | +254 | +
11111111 | +255 | +
Octet Number | +Binary Format | +Decimal Equivalent | +
---|---|---|
1st Octet | +11000000 | +192 | +
2nd Octet | +10101000 | +168 | +
3rd Octet | +00000001 | +1 | +
4th Octet | +00000000 | +0 | +
Octet Number | +Binary Format | +Decimal Equivalent | +
---|---|---|
1st Octet | +11000000 | +192 | +
2nd Octet | +10101000 | +168 | +
3rd Octet | +00000001 | +1 | +
4th Octet | +11111111 | +255 | +
Octet Number | +Binary Format | +Decimal Equivalent | +
---|---|---|
1st Octet | +11000000 | +192 | +
2nd Octet | +10101000 | +168 | +
3rd Octet | +00000001 | +1 | +
4th Octet | +00000001 | +1 | +
Host Bits Status | +Address Type | +Description | +
---|---|---|
All 0s | +Network Address | +The address used to identify the subnet itself. | +
All 1s | +Broadcast Address | +The address used to send data to all hosts on the subnet. | +
Network | +IP Address | +Subnet Mask | +Description | +
---|---|---|---|
LAN | +10.1.0.1 | +255.255.0.0 | +LAN Network | +
STAFF | +10.70.0.1 | +255.255.0.0 | +Staff Network | +
BYOD | +10.110.0.1 | +255.255.0.0 | +BYOD Network | +
GUEST | +10.120.0.1 | +255.255.0.0 | +Guest Network | +
++When we talk about aggregating subnets, we're basically trying to find a bigger subnet that can neatly fit all these smaller subnets inside it.
+
We're looking for the common ground here, the starting point that fits all these ranges. If we look closely, all the addresses start with "10.", which is our first clue. After the "10.", things start to get different, so that's where we need to focus.
+When we do a bit of magical binary conversion and comparison, we find that the common bits in all these addresses go up to the first 8 bits (that's the "10" part). After that, the bits start to differ.
+So, if we were to aggregate these networks, our new subnet would start at 10.0.0.0. But what about the mask? Well, since we only have the first 8 bits in common, our new mask would be 255.0.0.0.
+Therefore, your aggregated subnet would be 10.0.0.0 with a subnet mask of 255.0.0.0. This big subnet umbrella can cover all your smaller subnets like a cozy blanket! 🌐💻🎉
+Network | +IP Address | +Binary Representation (First 10 bits) | +
---|---|---|
LAN | +10.1.0.1 | +00001010.00 | +
STAFF | +10.70.0.1 | +00001010.01 | +
BYOD | +10.110.0.1 | +00001010.01 | +
GUEST | +10.120.0.1 | +00001010.01 | +
traceroute bad.horse
+traceroute to bad.horse (162.252.205.157), 64 hops max, 52 byte packets
+ 1 192.168.200.254 (192.168.200.254) 2.121 ms 2.470 ms 2.295 ms
+ 2 79.173.166.153 (79.173.166.153) 2.599 ms 3.316 ms 2.614 ms
+ 3 195.167.176.78 (195.167.176.78) 3.516 ms 3.514 ms 3.220 ms
+ 4 lon00-br0.as5631.net (83.143.228.238) 4.232 ms 3.710 ms 3.021 ms
+ 5 xe-9-1-2.edge3.london2.level3.net (212.113.9.201) 3.169 ms 3.103 ms 2.936 ms
+ 6 ae1.8.bar4.toronto1.level3.net (4.69.218.54) 90.796 ms 90.944 ms 90.892 ms
+ 7 level3-gw.core02.tor1.prioritycolo.com (4.16.51.30) 91.740 ms 91.998 ms 91.592 ms
+ 8 67.223.96.90 (67.223.96.90) 91.401 ms 91.863 ms 91.377 ms
+ 9 bad.horse (162.252.205.130) 91.974 ms 91.953 ms 91.525 ms
+10 bad.horse (162.252.205.131) 97.062 ms 96.838 ms 98.465 ms
+11 bad.horse (162.252.205.132) 101.131 ms 98.995 ms 99.642 ms
+12 bad.horse (162.252.205.133) 106.636 ms 106.428 ms 106.886 ms
+13 he.rides.across.the.nation (162.252.205.134) 111.930 ms 112.171 ms 131.932 ms
+14 the.thoroughbred.of.sin (162.252.205.135) 116.678 ms 116.763 ms 116.639 ms
+15 he.got.the.application (162.252.205.136) 129.628 ms 121.732 ms 119.512 ms
+16 that.you.just.sent.in (162.252.205.137) 127.010 ms 127.023 ms 125.168 ms
+17 it.needs.evaluation (162.252.205.138) 129.663 ms 131.599 ms 131.342 ms
+18 so.let.the.games.begin (162.252.205.139) 137.167 ms 136.652 ms 134.110 ms
+19 a.heinous.crime (162.252.205.140) 142.548 ms 140.485 ms 141.390 ms
+20 a.show.of.force (162.252.205.141) 146.570 ms * 146.862 ms
+21 a.murder.would.be.nice.of.course (162.252.205.142) 150.387 ms 152.285 ms 148.757 ms
+22 bad.horse (162.252.205.143) 156.445 ms 156.839 ms 156.380 ms
+23 bad.horse (162.252.205.144) 161.859 ms 161.328 ms 161.561 ms
+24 bad.horse (162.252.205.145) 167.209 ms 166.741 ms 165.658 ms
+25 he-s.bad (162.252.205.146) 171.489 ms 169.464 ms 169.579 ms
+26 the.evil.league.of.evil (162.252.205.147) 175.822 ms 176.793 ms 176.918 ms
+27 is.watching.so.beware (162.252.205.148) 181.350 ms 181.487 ms 181.877 ms
+28 the.grade.that.you.receive (162.252.205.149) 186.980 ms 186.881 ms 183.815 ms
+29 will.be.your.last.we.swear (162.252.205.150) 191.504 ms 192.136 ms 191.605 ms
+30 so.make.the.bad.horse.gleeful (162.252.205.151) 194.137 ms 196.883 ms 196.596 ms
+31 or.he-ll.make.you.his.mare (162.252.205.152) 201.546 ms 201.798 ms 201.274 ms
+32 o_o (162.252.205.153) 206.265 ms 207.723 ms 206.742 ms
+33 you-re.saddled.up (162.252.205.154) 323.803 ms 211.544 ms 211.737 ms
+34 there-s.no.recourse (162.252.205.155) 216.559 ms 217.206 ms 216.652 ms
+35 it-s.hi-ho.silver (162.252.205.156) 223.292 ms 333.837 ms 248.602 ms
+36 signed.bad.horse (162.252.205.157) 221.292 ms 221.970 ms 297.960 ms
+
++ + + + + + + + + + + + + + + + + +Here is an image showing a group of diverse cavemen inventing the decimal system, with thought bubbles depicting their dreams of future computers, branded with "Lloret Control Systems", and used for counting a vast number of antelopes. The scenes blend primitive settings with futuristic elements.
+
Aspect | +Wildcard Mask | +Subnet Mask | +
---|---|---|
Purpose | +Used in Access Control Lists (ACLs) to specify which IP addresses to permit or deny access to. | +Used in IP addressing to divide a network into subnetworks and determine the network and host portions of an IP address. | +
Format | +Inverse of subnet mask. It marks the bits that are to be matched with the corresponding bits in an IP address. | +Binary mask with 1s indicating the network portion and 0s indicating the host portion. | +
Representation | +Typically represented with the "wildcard bits" keyword in ACLs, followed by a series of four octets with values between 0 and 255 separated by dots. Example: 0.0.0.255 |
+Represented using the same dotted decimal format as IP addresses, with a varying number of bits set to 1. Example: 255.255.255.0 |
+
Usage Example | +To permit access to IP addresses within a specific range, specify the wildcard mask in an ACL entry. Example: permit 192.168.1.0 0.0.0.255 allows all addresses in the 192.168.1.0/24 subnet. |
+To define network boundaries within an IP address range, apply the subnet mask to the IP addresses. Example: 192.168.1.0/24 represents a subnet with a subnet mask of 255.255.255.0 . |
+
Network Calculation | +To calculate the network ID from an IP address, perform a bitwise AND operation with the IP address and the wildcard mask. | +To calculate the network ID from an IP address, perform a bitwise AND operation with the IP address and the subnet mask. | +
CAT-ENT Training
+The Training Instructions 2020 - Student 4 from Allied Telesis.
+The CAT-ENT.pptx from Allied Telesis.
+The CAT-ENT-INTRO from Allied Telesis.
+CAP-ENT Training
+The Training Instructions 2020 - Student 4 from Allied Telesis.
+The CAP-ENT.pptx from Allied Telesis.
+The CAP-ENT-INTRO).pdf from Allied Telesis.
+The CAP-ENT-EXTENDED.pdf from Allied Telesis.
+pending
+ + + + + + + + + + + + + + + + +pending
+ + + + + + + + + + + + + + + + +Alas, my Company has a preference for Allied Telesis, as a cheaper alternative.
+Value Engineering, so they say.
+So I have to learn it.
+Manager Friendly
+I have touched Allied Telesis before. My former employer had a lucky dip smattering of Allied Telesis in the Network i would occasionally stumble upon. I remember them well because they were known by the slang manager friendly due to the default credentials being manager:friend
! that chimed with the lower price point... to the chagrin of the Network Team.
The CAP/ENT training course provides knowledge of the AlliedWare Plus operating system.
+The course ends with an open-book multiple-choice exam.
+++Monday 5th February 2024 - Wednesday 7th February 2024
+
A remote lab is provided for the course. You SHH to a Linux box and onward to the console of the Allied Telesis Firewall & Switches.
+No Stack | |
---|---|
Use lsof -i tcp:22
to see the SSH sessions to the lab devices. In our case we have x2 per lab device as we are passing a linux jump box to reach the device console.
The command lsof -i tcp:22
is used in Unix-like operating systems to list open files and network connections. The components of this command (lsof, -i, tcp:22) each have specific meanings:
lsof
: This stands for "List Open Files". lsof is a command-line utility that provides information about files that are opened by processes. In Unix and Linux systems, almost everything is treated as a file, including physical devices, directories, and network sockets.
-i
: This option tells lsof to show network connections. When used without any additional parameters, -i lists all network files. However, it can be further narrowed down with additional parameters like protocol type (TCP or UDP) and port numbers.
tcp:22
: This further filters the lsof output to show only TCP connections (due to tcp) that are using port 22. Port 22 is the default port for SSH (Secure Shell) connections, which are used for securely accessing remote machines.
➜ ~ lsof -i tcp:22
+
+COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
+ssh 94715 lukeoson 4u IPv4 0x52af948b88c31015 0t0 TCP 192.168.1.108:61894->194.73.86.54:ssh (ESTABLISHED)
+ssh 94715 lukeoson 5u IPv4 0x52af948b88c31015 0t0 TCP 192.168.1.108:61894->194.73.86.54:ssh (ESTABLISHED)
+ssh 94838 lukeoson 4u IPv4 0x52af948b8986327d 0t0 TCP 192.168.1.108:61928->194.73.86.54:ssh (ESTABLISHED)
+ssh 94838 lukeoson 5u IPv4 0x52af948b8986327d 0t0 TCP 192.168.1.108:61928->194.73.86.54:ssh (ESTABLISHED)
+ssh 94938 lukeoson 4u IPv4 0x52af948b8862e705 0t0 TCP 192.168.1.108:61965->194.73.86.54:ssh (ESTABLISHED)
+ssh 94938 lukeoson 5u IPv4 0x52af948b8862e705 0t0 TCP 192.168.1.108:61965->194.73.86.54:ssh (ESTABLISHED)
+
And you get a topology like this:
+ +The first thing we did was unstack the switches. Couple of reboots required to remove the provisioned devices and renumber to 1. This exercise was to prepare the lab for the content to follow.
+No Stack | |
---|---|
With the devices unstacked we can proceed to the course content.
+The first module covered some Spanning Tree features.
+Root Guard | |
---|---|
Verify with show spanning-tree brief
.
BPDU Guard | |
---|---|
Error Disabled Timeout | |
---|---|
Usage:
+specifies the time interval after which a port is brought back up when it has been disabled by the BPDU guard feature
+Loop Detection | |
---|---|
Warning
+Always remove loop-protection loop-detect ldf-interval 5
when enabling EPSR.
2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on port2.0.26 by 0202.0ayy.xxxx on VLAN 20
+2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on port1.0.25 by 0202.0ayy.xxxx on VLAN 2
+2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on sa50 by 0202.0ayy.xxxx on VLAN 2
+
Spanning tree
+ Ports blocked by a spanning tree protocol can still transmit and receive LLDP advertisements.
+802.1x
+ Ports blocked by 802.1x port authorization cannot transmit or receive LLDP advertisements. If LLDP has stored information for a neighbor on the port before it was blocked, this information will eventually time out and be discarded.
+VLAN tagging
+ LLDP packets are untagged; they do not contain 802.1Q header information with VLAN identifier and priority tagging.
+Virtual Chassis Stacking (VCStack) resiliency link
+ When a port is configured as a VCStack resiliency link port, LLDP does not operate on the port; LLDP neither transmits nor receives advertisements, and any LLDP configuration and data stored for the port, including counters, is discarded.
+Mirror ports
+* LLDP does not operate on mirror analyzer ports
``` py linenums="1" title="LLDP" hl_lines="1 2"
+Free 2D symbols for computer network diagrams.
+Simple. I wanted modern, crisp, pixel-perfect, printable, manufacturer independent symbols for computer-network topology that does not look like they were made in the 80s.
+sed -e "s/rgb(77,77,77)/rgb(45,103,185)/" c_shield_gray.svg > c_shield_blue.svg
0&&i[i.length-1])&&(p[0]===6||p[0]===2)){r=0;continue}if(p[0]===3&&(!i||p[1]>i[0]&&p[1]=e.length&&(e=void 0),{value:e&&e[o++],done:!e}}};throw new TypeError(t?"Object is not iterable.":"Symbol.iterator is not defined.")}function K(e,t){var r=typeof Symbol=="function"&&e[Symbol.iterator];if(!r)return e;var o=r.call(e),n,i=[],s;try{for(;(t===void 0||t-- >0)&&!(n=o.next()).done;)i.push(n.value)}catch(a){s={error:a}}finally{try{n&&!n.done&&(r=o.return)&&r.call(o)}finally{if(s)throw s.error}}return i}function B(e,t,r){if(r||arguments.length===2)for(var o=0,n=t.length,i;o Sapolsky presents a deterministic view rooted in biology and neuroscience. His approach emphasizes empathy and explores the ethical implications of human behavior, pushing us towards a nuanced, context-sensitive understanding of actions. Behave: The Biology of Humans at Our Best and Worst is an intricate exploration of the myriad factors influencing human behavior. Sapolsky argues that behavior cannot be understood through a single lens but is shaped by a complex interplay of biological, environmental, and cultural factors. He blends reductionist explanations (biological mechanisms) with holistic perspectives (sociocultural influences), offering an in-depth view of why humans act the way they do. Helpful Context & Definitions Sapolsky's deterministic view of human behavior, grounded in biology and neuroscience, is tempered by a commitment to empathy and the ethical implications of understanding behavior. He challenges readers to move beyond simple dichotomies like good and evil and to embrace a more integrated, context-sensitive view of human actions. The brain is heavily influenced by genes. But from birth through young adulthood, the part of the human brain that most defines us (frontal cortex) is less a product of the genes with which you started life than of what life has thrown at you. Robert Salpolsky - Wikipedia
+Robert Salpolsky talks Behave - YouTube Click the play button below to listen to the audio version of this post. Whoops - Terrible Audio Quality! Update in Progress. Sorry. Assembly Theory. Life is complex molecular structures and pathways. Life as No One Knows It: Assembly Theory and the Search for Life’s Origins introduces a fresh perspective on life by focusing on the complexity of molecular assembly. By rethinking life as a continuum of assembly complexity rather than a strict category, Walker and Cronin challenge existing paradigms and open new avenues for understanding life’s origins and detecting it in the universe. While their approach leans heavily towards complexity and speculative thinking, it provides a thought-provoking framework that could reshape the scientific and philosophical discourse on what it means to be alive. Helpful Context & Definitions I can't decide if this is a theory of the intuitively obvious or a profound new imagining of... everything ever. What modern science has taught us is that life is not a property of matter. Physicists and chemists see very intimately what the rest of us who think life exists cannot: there is no magic transition point where a molecule or collection of molecules is suddenly “living.” Life is the vaporware of chemistry: a property so obvious in our day-to-day experience—that we are living—is nonexistent when you look at our parts. Sara Imari Walker - Santa Fe Institute Profile Sara Imari Walker - Google Scholar Sara Imari Walker - Joe Rogan Experience #2184 Click the play button below to listen to the audio version of this post. Generational theory suggests that history moves in cycles. According to Strauss and Howe, we are currently in the Crisis phase of the Fourth Turning. The Fourth Turning argues that history follows a predictable cycle, divided into four generational archetypes (Prophet, Nomad, Hero, Artist) and four turnings or stages (High, Awakening, Unraveling, Crisis). Each turning represents a different phase of social mood, driven by the behavior and values of the generations in power. Currently, we are in the "Fourth Turning" or Crisis phase, which will reshape society and create a new social order. Helpful Context & Definitions The High: Societal rebuilding following a crisis (Prophet, Idealist Archetype) The Awakening: Cultural upheaval (Nomad, Reactive Archetype) The Unraveling: Fragmentation of society (Hero, Civic Archetype) The Crisis: Systemic shock (Artist, Adaptive Archetype) Relevance of Cycles in Modern Society: The cyclical nature of history is particularly relevant today, aligning with the current social and political tensions of the "crisis" phase. Will this crisis lead to structural reform or just reset the cycle? Generational Leadership: Transitioning leadership from Baby Boomers (Prophet) to Generation X (Nomad) and Millennials (Hero) could influence the societal response to crises. Predictive Power: While the book claims predictive accuracy, history is shaped by unpredictable factors (e.g., technological advancements, environmental shifts). The framework is useful but not absolute. Crisis as a Catalyst for Innovation: Historically, crises have sparked technological and social advancements. The current crisis could drive breakthroughs in sustainability, AI, and governance. Cross-Cultural Applicability: The theory primarily focuses on Western societies, particularly the U.S. Can it apply to other cultural and political systems? The universality of the theory is debatable. The generational theory in The Fourth Turning provides a compelling framework for understanding society’s recurring patterns and future shifts, emphasizing the importance of recognizing these cyclical changes. History moves in cycles, and Winter is coming. Each generation’s response to the social moment shapes the next era. The Fourth Turning - Wikipedia
+The Fourth Turning - YouTube The AutoCon conferences have been remarkable gatherings of our network automation tribe. The Network Automation Forum (NAF) has fostered an engaged, curious community that's pushing toward what's possible in automated network infrastructure. We’re all very thankful for the passion of Chris & Scott in their efforts to bring ‘our people’ together… and we hope they get very rich along the way! They deserve all the accolades, and more besides. Take a Bow. They say you should follow the money... and I’m eager to better grasp the macro economics of our sector in transition. A theme I’ll be exploring in more depth later. As my career progresses, i'm looking for ways to add extreme business value structurally - beyond incremental business efficiency in project delivery and design. I want to lead. My initial presumption is we are seeing a slow burn realignment of allocated capital that will be of great benefit to the thought leaders in our space. If anyone can help me understand this better… please reach out. I’m patient - but I too would like to be rich before I die: Let’s begin with the NAF's negatively framed tagline and central question: "Why hasn't network automation seen full adoption yet?” which is an appropriately provocative query but strikes me as somewhat out of whack. Mostly because I believe we are in the new golden era of networking, filled with the most exciting tools, systems, and platforms, and an unprecedented tolerance for experimentation and failure. It’s ironic that many of the vendors we moan about as automation obstacles have, in their oligopolistic malaise, opened the market for the very companies sponsoring these conferences, allowing them to thrive in spaces previously under the iron fist of the big hardware players. These conferences are for engineers rather than companies so its appropriate to interrogate that question with more regard to our professional fulfillment and joy as network tinkerers, as opposed to accrued business value as corporate stooges - ultimately crucial though that is! And from that perspective, as far as I can tell, everything is going great! But I’m a moron so don’t listen to me. Let's get into what I’ve gathered from these conferences, focusing on my favorite presentations from the most recent AutoCon1 in Amsterdam (because the content was much better than AutoCon0 in Denver), before placing all this in the context of where I see network automation heading and drawing a quasi analogy to the current intellectual zeitgeist of societal loops and The Four Turnings. It’s a stretch... but it kinda fits. The Cycle of Life (and Networks) All that's old is new again. Plan, Build, Operate. Design, Implement, Maintain. Prepare, Deploy, Manage. Architect, Execute, Optimize. Observe, Engage, Act. We all have one of those circular diagrams. We've seen every iteration of them. We use them because they are true in some conceptual or actual sense. They're a compelling frame of reference for conveying what the hell is going on. And usually hide much murkiness. Anyone noticed the migration back to CLI implementations abstracting new-fangled automation tools of late? All that's old is new again. Full circle. How Meta is that. At AutoCon1, Dinesh delivered a compelling keynote with the tagline "A Contrarian Perspective". His use of the phrase, “History doesn’t repeat, but it certainly rhymes,” set the tone for a talk that challenged some of the conventional wisdom in network automation. And will assist me in folding in the Four Turnings analogy later in this post. My real time notes included: Primordial Soup: He likened the rise of Network Engineers and Developers as evolving from the same "primordial soup," yet diverging into different technical lineages. Different species can’t reproduce! Configuration Management ≠ Automation: Dinesh emphasized that configuration management isn’t real automation. Today, it’s more about validation - automating the processes that ensure configurations are correct and in line with policy. Python is the New OpenFlow: One provocative statements was, "Python is the new OpenFlow." While Python has become a defacto tool for many, Dinesh warned that this won’t be the endgame. He compared Python to OpenFlow’s failure due to its high-level abstraction, implying that simply knowing Python isn’t sufficient. The Myth of a Uniform Data Model: He argued that the industry’s dream of a uniform data model across vendors is a myth. Vendors will always vendor, meaning they’ll continue to prioritize their own ecosystems over true interoperability. Broken hearts all round. More on this later. Avoid the Go-Lang Bandwagon: Dinesh advised against pushing specific languages like Go-Lang without considering the bigger picture of where the industry came from versus where it’s headed. He drew an empathetic cord that spoke to people like me that love our field of play but are not genetically built for it. We need tools that democratize the playing field and are accessible to amateurs as well as AutoGods. Praise be upon him. This led to a deeper reflection on what the next generation of tools will be, coining the term Among all the speakers, Claudia De Luna of Gratuitous Arp, delivered what I believe was the best talk of the AutoCons to date. She drew a powerful analogy between the stages of network automation maturity and the space flight missions that led to the Apollo moon landing. My real time notes included: Mercury: The early days of automation—akin to manually copying and pasting configurations. We were simply orbiting the earth, building basic scripts, and laying groundwork. Gemini: This phase was about endurance—engineers started creating automation scripts that could be triggered manually but in a reliable way, much like the longer-duration Gemini missions that bridged the path to Apollo. Apollo: Full automation, akin to landing on the moon. Fully automated workflows are triggered with minimal human intervention, solving complex problems autonomously. “Who really needs Apollo-level automation?” Claudia challenged us, pointing out that some businesses are aiming for complete automation when, in reality, a more practical level of automation may be sufficient right now while we figure things out as a community and refine corporate ecosystems. It’s a question worth pondering: How far do we actually need to go? And more importantly, what’s the cost of pushing automation too far too soon in our current quasi nascent state? Claudia is Awesome I was fortunate to have the opportunity to interact with Claudia a bit during the Workshops in the days prior to the main conference. She was a stand out wonderful person I admired very much. She will be an essential resource and important player as we quest towards Mars. May the force be with her. Thank You Nokia! By far the best of the Workshops was Nokia’s Container Lab session delivered by our communities shining light, Roman. What an incredibly impressive person he is. Respect. We have much to thank Nokia and its exceptional people for. Their approach to open sourcing community tools that deliver outstanding value and assist in building the automation ecosystem is a credit to clever capitalism done right. Container Lab is very well covered in a million community posts so I won’t spend any time on it here - other than to bridge this post toward Wim and Kubenet by linking to the latest iteration… Clabernetes. Check it out! One of the most impressive takeaways from AutoCon1 was Wim's introduction of Kubenet, a new tool from Nokia. Wim, the Head of Technology and Architecture IP at Nokia, has been a shining light and thought leader within the NAF AutoCon community, much respected as an authority in the field. Wim opened his session by noting how Nokia's approach to making tools like Container Lab and SR Linux freely available has been well-received by the community. He teased the audience by asking if we wanted more, to muted applause. Mostly because we are an introverted bunch incapable of expressing our emotions with appropriate flare. Inside we were all applauding rapturously, I’m sure. Wim’s presentation was delightfully paced. He took us through Kubernetes as a reference framework for Network Automation before expounding in more detail on how our community can leverage the Kubernetes ecosystem to do more than orchestrate containers and explained the path to Kubenet as a new tool for configuring Network devices. This is the promised land for those us who have spent the last decade tinkering with field adjacent activities like Dev-Ops, Cloud, SRE, etc & infinity. My real time notes included: Wim began outlining Nokia’s approach to network automation requirements, stipulating that the new era must be: Wim then outlined what Kubernetes does for us to achieve our before stated aims. Kubernetes as the platform to do network automation because it is Open source, API Centric, Declarative, Extendable, Continuously Reconciliatory, Collaborative, Event Driven, AI Enabled, and has a Huge knowledge Base. Boom! Wim tabled the current use cases of Kubernetes amongst our technical peers as a tool for automating and orchestrating Containers, VMs, Clouds, Bare metal, Storage, Server workloads, Applications, mobile core/RAN and emergent AI use cases… notice anything missing that is close to our hearts? Why can’t we leverage the outstandingly mature ecosystem of Kubernetes to automate our Networks? Awkward pause... Wim is a practical guy - so he birthed and built KubeNet himself! And all glory goes to him. All these industries use Kubernetes so why not Networks? Wim is on a mission so we can use Kubernetes to do just that. Dinesh would doubtless call this Tools 2.0. I would venture this is a giant leap, let’s be conservative and say Tools 2.5. As we will touch upon later in this post… some of us still have hope! Making networks consumable with Kubernetes: As we’ve seen, many other industries are adopting Kubernetes and we don’t want networking to be left behind. Particularly given we have bunch of people on social media grabbing the limelight with the tagline takeaway from AutoCon0 in Denver: “Make Network Engineering Cool Again!” Wim impressed upon us a new frame of reference. We can think of Kubernetes as a container life cycle management tool, sure - got it. Kubenet at is core is not focused on that! Rather than delivering containers Kubenet is delivering Network Artifacts. Using Vendor, Abstract, and Automation layer APIs. So rather than instantiating a POD we are configuring network devices. Using APIs constructs to generate and push config to network boxes. Whoa! Kubenet will take our protocol abstract parameters which form our intent and then build what we need for our network to operate. Then provide a continuous reconciliation loop to check what we have against what we want and keep it in sync. Lovely. I for one can’t wait to see this project develop. I encourage people to keep a keen eye on (frankly everything Nokia is doing) but Wim & Roman in particular are just straight forwardly smashing it. Well done. Kubenet is written in Go and will need a scaled out Kubernetes cluster in production - maybe you’ll learn these skills (I’m trying) or otherwise throw it over the fence to your Dev-Ops or SRE Team. But it’s about time we leveraged the whole ecosystem from Kubernetes. And Kubenet will help us learn how to build APIs. As this is required to define new services in Kubernetes. But don’t panic, Kubenet is an orchestrator so you can leverage Python, Ansible, Terraform from Kubenet to bring the Network change to life. Exciting times. As Ethan said in the Packet Pushers interview that followed the presentation - this is A LOT! Awe & Wonder Blooms I’m currently in the awe and wonder naive and blissfully ignorant stage. I’m quite sure multitudinous skeptics and negative commentary will emerge that will prune my absurd expectations. I expect AutoCon2 in Denver this November to open my eyes to this project more. But right now I’m just grateful for Wim and everything Nokia are doing to bridge the gap to our dreams. Thank you. And now for my exquisitely profound (i’m British) insight to bring this all together as we approach the “moment of the conference” and the battle of accrued wisdom and naive hope. AutoCon folklore starts here. For those unfamiliar The Fourth Turning is a description of societal change through cycles. The intellectual zeitgeist posits we are currently living through the Crisis period where societies are forced to rebuild, new institutions are forged, and unity emerges from chaos. Is there an analogy to be drawn to our evolution from conventional Network Engineering to our new tribe of Network Automation professionals? Kind of. Shaky. But i’ve started so I’ll finish. The High, The Awakening, The Unraveling, and The Crisis Applying this to the networking industry, it's tempting to claim we're at the crisis point. But are we really there yet? Perhaps we're still in the Awakening or Unraveling phase? Opinions welcome! The Awakening: Freedom-Seeking and Automation’s Emergence Currently, we see a surge in automation tools and a collective desire for freedom from traditional vendor constraints. Network engineers are actively experimenting with open-source projects and bespoke automation solutions, challenging the status quo. This mirrors the Awakening phase, where norms are questioned and innovation flourishes. The Unraveling: Institutions Weaken, Networks Break Alternatively, we might be in the Unraveling phase. Here, the institutions that once provided stability (traditional network vendors and their solutions) are weakening. We're witnessing the consequences of fragmented automation efforts, with individualized scripts and bespoke solutions leading to fragile networks. Not Quite the Crisis Yet While there's a palpable tension and concern about the future, it's arguable that we haven't hit the Crisis point. We’re in the midst of a transformation where the old ways are being questioned, and new practices are being formed. The true crisis would come when the re-skilling becomes required, and network engineers find themselves needing to pivot significantly or face obsolescence. Right now we are very much flourishing as far as I can tell. It's a choose your own adventure landscape. At some future point those choices may depart the stage. For now, we’re navigating the complexities and contradictions of these transitions, but we haven’t yet faced the full impact of what this automation-driven evolution will mean for the profession. I for one am totally cool with that. I suspect you are too. Towards the Moment of the Conference: “I couldn't disagree with you more” The moment of the conference came at the very end of AutoCon1, in the questions following Peter's closing Keynote, which posed the question… “Are we building Hall-9000 or Wall-E?” I was fortunate to attend the Workshops in the days proceeding the main conference. The Container Lab session from Nokia was the clear stand out. But Peter, who is the Tech Lead of the Workflow Orchestrator Program at SURF impressed with his demonstrable acumen and holistic orchestration perspective. Peter lives and breathes in the State sponsored and QANGO funded space. He is not subject to same commercial travails as most of us in the Enterprise & Telecoms money machines. Keep that in mind for later. Peter's talk on the emergence of AIOPs referenced the desired architectural flow of Observe > Engage > Act. He explained the inherent need and urgency to lean into this ML & LLM assisted approach - as statistically evidenced by the lack of talent entering the networking profession. A timely reminder of that recurrent message that we need to Make Network Engineering Cool again. There are simply not enough of us. I have thoughts here - and a decidedly unpopular opinion I may develop another time… It’s gone down like a lead balloon when I've brought it up in water cooler conversations at the AutoCons so far. Which makes me nervous to talk openly about it, but the gist is: We are no where close to as smart as we like to think we are! This field is full of comparatively poor technologists by reference to most other adjacent technical domains. Ut oh - I said it. To be clear - I'm in the bottom percentile, and, other than me, absolutely everyone that participates in NAF is to be excluded. This is the impressive tip of our community. But many in our profession would not be capable of transitioning to a legit development role. My argument being I'm of the few self aware or stupid enough to say it out loud. Note the ironically funny feedback loop there. Peters point was that it’s ridiculous to fear that AI will take our jobs. More likely, it will relieve some of the strain of an already lean and work burdened sector. We are all pretty bored of hearing this following the LLM early hype cycle so we can skip the detail. When I saw the AutoCon1 speakers list Peter's talk title stood out as the most intriguing. I assumed it would elucidate a narrative questioning if we are building high performance intelligent compute capable of solving real world problems akin to Bostrom’s 2014 SuperIntelligence predictions (Hall-9000) or if, in actuality, LLM models are just the first publicly notorious form of ML that can do a few fun and fluffy things and not much more (WALL-E). Alas, Peters talk did not pan out that way. My disappointment in the moment was ultimately salvaged by the debate that followed. Sweet! But before we get to that, it’s worth quickly summarizing Peter’s take on Hollywood's historic commentary on AI themes. My real time notes included: Good vs Evil: WALL-E is fluffy and nice: Hall-9000 is something scary: Peter declared that WALL-E & HALL-9000 started their life as good but malfunctioned into a stereotype. Before contextualising this to the here and now and our contemporary network automation agenda. So what now? Peter asked and answered - Intelligent Networks. AI will deliver the next paradigm. Peter’s conclusion was that Hollywood AI stereotypes should be avoided. (Shock horror. Not exactly the revelation I was hoping for. More a statement of the blindingly obvious.) Instead we need AIOPs for mundane tasks, so we can tackle more complex tasks. A perfectly fine perspective although I’m intrigued to see how our definitions and conceptions of what complexity really is begin to break down in the coming years. Much is ponderously in flux right now. SURF already have fully orchestrated provisioning. As displayed in their workshop of the Workflow Orchestrator they have built. You should check it out! Peters description of what SURF are building for the next Network Iteration of their high performance network is: Peters description of his aims designing and building SURFs next generation of networks was building toward his ultimate thesis: It has to be open source and open standards. Therefore, Vendors need to provide us APIs that always look the same. Before declaring, with provocative emphasis, that Vendors need to support OpenConfig to enable multi vendor configuration. In summing up, Peter said Automation enables Orchestration so we can unlock the potential of an Intelligent Network. It was a decent talk. Good points well made. He must have been feeling good about himself. Respect. Applause ensued. We had made it to the end of the conference and he must have had every expectation there would be a few soft ball questions and notional praise for all the great work he had done at SURF to build such a high performant network machine. Then cometh Dinesh… "I couldn’t disagree with you more.” “I couldn’t disagree with you more. It’s really important to understand the context in which we operate.” I’ll paraphrase the rest of his awesome diatribe... OpenConfig is zero. We have devices running that are a decades old. If it ain't broke don't fix mentalities mean these devices are not being replaced anytime soon. Dinesh insisted that the first thing we should stop as a community is continue our push to OpenConfig and other vendor agnostic plays. We need to stop harping on about the standard API because we are not going to get it. The longer we pursue this myth the longer we will be here asking why have we not seen full adoption of automation yet. We had the same problem from SNMP - it’s not changed. Of all the great lines being thrown back and forth during this wonderful exchange of frank opinions the most hilarious was: Dinesh said: “We somehow think we will tell the vendors to get together and sing Kumbaya - ain’t happening!” To which Peter retorted: “Maybe I am naive and young - but I do have some hope.” Before Wim chimed in to provide a bridge between Dinesh & Peter by suggesting, in ways evocative of his prior KubeNet remarks, that perhaps we as a community could get together and build an abstraction layer, for at least some of it. So what were we seeing here? People fighting for their Products. (Noting that their products are, of course, the product of their reasoned and considered thoughts) Just like every Vendor does Dinesh has SuzieQ that is built around SSH discovery and interacting with Vendor CLI in order to be operable in the here and now. Wim has KubeNet that will require the API abstraction layer to work. Peter is building something shiny and new with vast quantities of public money that affords him the opportunity to think from first principles and behave aspiration-ally. And so he bloody should! People have different motivations and contexts. I began this post by referencing the allocation of capital in our industry... Dinesh & Peter are BOTH CORRECT My thought here is they are obviously both correct. It’s a question of perspective. The apparent disjunction between Dinesh & Peter is explained not just by the grizzled and wise vs young and hopeful thing. It’s a function of the sectors in which they have built extraordinarily successful careers. Dinesh is in the brown trenches, and Peter is in the green clouds. All thats old is new again. And ultimately - follow the money. We need more Peters. I'm proud of him for standing his ground to the extent he did. But, if it was me, i like to think I would have ripped Dinesh a new one - despite him being perfectly correct and sagely wise on the matter. If the University and Public sector is not pushing for Open Systems and vendor agnostic solutions then who the fuck is? In Peter we trust. The personification of a vitally important component of our wonderful technology ecosystem. After all, Elon built SpaceX off the back off NASA and Government funding. I wonder how long before Claudia gets to add the Mars mission to her space & automation analogies. Whatever the truth and ultimate outcome… it was a great dialogue, as Scott made clear in his closing remark. A truly delightful exchange. Thanks much Claudia, Dinesh, Peter & Wim. I like to think we will reflect on this at AutoCon10. Or otherwise the robots at AutoCon1010. I wonder where we will be. 633ac91 (2024-09-17 19:54:58+01:00) by Luke Richardson The AutoCon conferences have been remarkable gatherings of our network automation tribe. The Network Automation Forum (NAF) has fostered an engaged, curious community that's pushing toward what's possible in automated network infrastructure. We’re all very thankful for the passion of Chris & Scott in their efforts to bring ‘our people’ together… and we hope they get very rich along the way! They deserve all the accolades, and more besides. Take a Bow. They say you should follow the money... and I’m eager to better grasp the macro economics of our sector in transition. A theme I’ll be exploring in more depth later. As my career progresses, i'm looking for ways to add extreme business value structurally - beyond incremental business efficiency in project delivery and design. I want to lead. My initial presumption is we are seeing a slow burn realignment of allocated capital that will be of great benefit to the thought leaders in our space. If anyone can help me understand this better… please reach out. I’m patient - but I too would like to be rich before I die: Let’s begin with the NAF's negatively framed tagline and central question: "Why hasn't network automation seen full adoption yet?” which is an appropriately provocative query but strikes me as somewhat out of whack. Mostly because I believe we are in the new golden era of networking, filled with the most exciting tools, systems, and platforms, and an unprecedented tolerance for experimentation and failure. It’s ironic that many of the vendors we moan about as automation obstacles have, in their oligopolistic malaise, opened the market for the very companies sponsoring these conferences, allowing them to thrive in spaces previously under the iron fist of the big hardware players. These conferences are for engineers rather than companies so its appropriate to interrogate that question with more regard to our professional fulfillment and joy as network tinkerers, as opposed to accrued business value as corporate stooges - ultimately crucial though that is! And from that perspective, as far as I can tell, everything is going great! But I’m a moron so don’t listen to me. Let's get into what I’ve gathered from these conferences, focusing on my favorite presentations from the most recent AutoCon1 in Amsterdam (because the content was much better than AutoCon0 in Denver), before placing all this in the context of where I see network automation heading and drawing a quasi analogy to the current intellectual zeitgeist of societal loops and The Four Turnings. It’s a stretch... but it kinda fits. Click the play button below to listen to the audio version of this post. Generational theory suggests that history moves in cycles. According to Strauss and Howe, we are currently in the Crisis phase of the Fourth Turning. The Fourth Turning argues that history follows a predictable cycle, divided into four generational archetypes (Prophet, Nomad, Hero, Artist) and four turnings or stages (High, Awakening, Unraveling, Crisis). Each turning represents a different phase of social mood, driven by the behavior and values of the generations in power. Currently, we are in the "Fourth Turning" or Crisis phase, which will reshape society and create a new social order. Click the play button below to listen to the audio version of this post. Whoops - Terrible Audio Quality! Update in Progress. Sorry. Assembly Theory. Life is complex molecular structures and pathways. Life as No One Knows It: Assembly Theory and the Search for Life’s Origins introduces a fresh perspective on life by focusing on the complexity of molecular assembly. By rethinking life as a continuum of assembly complexity rather than a strict category, Walker and Cronin challenge existing paradigms and open new avenues for understanding life’s origins and detecting it in the universe. While their approach leans heavily towards complexity and speculative thinking, it provides a thought-provoking framework that could reshape the scientific and philosophical discourse on what it means to be alive. Sapolsky presents a deterministic view rooted in biology and neuroscience. His approach emphasizes empathy and explores the ethical implications of human behavior, pushing us towards a nuanced, context-sensitive understanding of actions. Behave: The Biology of Humans at Our Best and Worst is an intricate exploration of the myriad factors influencing human behavior. Sapolsky argues that behavior cannot be understood through a single lens but is shaped by a complex interplay of biological, environmental, and cultural factors. He blends reductionist explanations (biological mechanisms) with holistic perspectives (sociocultural influences), offering an in-depth view of why humans act the way they do. Click the play button below to listen to the audio version of this post. Generational theory suggests that history moves in cycles. According to Strauss and Howe, we are currently in the Crisis phase of the Fourth Turning. The Fourth Turning argues that history follows a predictable cycle, divided into four generational archetypes (Prophet, Nomad, Hero, Artist) and four turnings or stages (High, Awakening, Unraveling, Crisis). Each turning represents a different phase of social mood, driven by the behavior and values of the generations in power. Currently, we are in the "Fourth Turning" or Crisis phase, which will reshape society and create a new social order. Click the play button below to listen to the audio version of this post. Whoops - Terrible Audio Quality! Update in Progress. Sorry. Assembly Theory. Life is complex molecular structures and pathways. Life as No One Knows It: Assembly Theory and the Search for Life’s Origins introduces a fresh perspective on life by focusing on the complexity of molecular assembly. By rethinking life as a continuum of assembly complexity rather than a strict category, Walker and Cronin challenge existing paradigms and open new avenues for understanding life’s origins and detecting it in the universe. While their approach leans heavily towards complexity and speculative thinking, it provides a thought-provoking framework that could reshape the scientific and philosophical discourse on what it means to be alive. Sapolsky presents a deterministic view rooted in biology and neuroscience. His approach emphasizes empathy and explores the ethical implications of human behavior, pushing us towards a nuanced, context-sensitive understanding of actions. Behave: The Biology of Humans at Our Best and Worst is an intricate exploration of the myriad factors influencing human behavior. Sapolsky argues that behavior cannot be understood through a single lens but is shaped by a complex interplay of biological, environmental, and cultural factors. He blends reductionist explanations (biological mechanisms) with holistic perspectives (sociocultural influences), offering an in-depth view of why humans act the way they do. The AutoCon conferences have been remarkable gatherings of our network automation tribe. The Network Automation Forum (NAF) has fostered an engaged, curious community that's pushing toward what's possible in automated network infrastructure. We’re all very thankful for the passion of Chris & Scott in their efforts to bring ‘our people’ together… and we hope they get very rich along the way! They deserve all the accolades, and more besides. Take a Bow. They say you should follow the money... and I’m eager to better grasp the macro economics of our sector in transition. A theme I’ll be exploring in more depth later. As my career progresses, i'm looking for ways to add extreme business value structurally - beyond incremental business efficiency in project delivery and design. I want to lead. My initial presumption is we are seeing a slow burn realignment of allocated capital that will be of great benefit to the thought leaders in our space. If anyone can help me understand this better… please reach out. I’m patient - but I too would like to be rich before I die: Let’s begin with the NAF's negatively framed tagline and central question: "Why hasn't network automation seen full adoption yet?” which is an appropriately provocative query but strikes me as somewhat out of whack. Mostly because I believe we are in the new golden era of networking, filled with the most exciting tools, systems, and platforms, and an unprecedented tolerance for experimentation and failure. It’s ironic that many of the vendors we moan about as automation obstacles have, in their oligopolistic malaise, opened the market for the very companies sponsoring these conferences, allowing them to thrive in spaces previously under the iron fist of the big hardware players. These conferences are for engineers rather than companies so its appropriate to interrogate that question with more regard to our professional fulfillment and joy as network tinkerers, as opposed to accrued business value as corporate stooges - ultimately crucial though that is! And from that perspective, as far as I can tell, everything is going great! But I’m a moron so don’t listen to me. Let's get into what I’ve gathered from these conferences, focusing on my favorite presentations from the most recent AutoCon1 in Amsterdam (because the content was much better than AutoCon0 in Denver), before placing all this in the context of where I see network automation heading and drawing a quasi analogy to the current intellectual zeitgeist of societal loops and The Four Turnings. It’s a stretch... but it kinda fits. The AutoCon conferences have been remarkable gatherings of our network automation tribe. The Network Automation Forum (NAF) has fostered an engaged, curious community that's pushing toward what's possible in automated network infrastructure. We’re all very thankful for the passion of Chris & Scott in their efforts to bring ‘our people’ together… and we hope they get very rich along the way! They deserve all the accolades, and more besides. Take a Bow. They say you should follow the money... and I’m eager to better grasp the macro economics of our sector in transition. A theme I’ll be exploring in more depth later. As my career progresses, i'm looking for ways to add extreme business value structurally - beyond incremental business efficiency in project delivery and design. I want to lead. My initial presumption is we are seeing a slow burn realignment of allocated capital that will be of great benefit to the thought leaders in our space. If anyone can help me understand this better… please reach out. I’m patient - but I too would like to be rich before I die: Let’s begin with the NAF's negatively framed tagline and central question: "Why hasn't network automation seen full adoption yet?” which is an appropriately provocative query but strikes me as somewhat out of whack. Mostly because I believe we are in the new golden era of networking, filled with the most exciting tools, systems, and platforms, and an unprecedented tolerance for experimentation and failure. It’s ironic that many of the vendors we moan about as automation obstacles have, in their oligopolistic malaise, opened the market for the very companies sponsoring these conferences, allowing them to thrive in spaces previously under the iron fist of the big hardware players. These conferences are for engineers rather than companies so its appropriate to interrogate that question with more regard to our professional fulfillment and joy as network tinkerers, as opposed to accrued business value as corporate stooges - ultimately crucial though that is! And from that perspective, as far as I can tell, everything is going great! But I’m a moron so don’t listen to me. Let's get into what I’ve gathered from these conferences, focusing on my favorite presentations from the most recent AutoCon1 in Amsterdam (because the content was much better than AutoCon0 in Denver), before placing all this in the context of where I see network automation heading and drawing a quasi analogy to the current intellectual zeitgeist of societal loops and The Four Turnings. It’s a stretch... but it kinda fits. Click the play button below to listen to the audio version of this post. Generational theory suggests that history moves in cycles. According to Strauss and Howe, we are currently in the Crisis phase of the Fourth Turning. The Fourth Turning argues that history follows a predictable cycle, divided into four generational archetypes (Prophet, Nomad, Hero, Artist) and four turnings or stages (High, Awakening, Unraveling, Crisis). Each turning represents a different phase of social mood, driven by the behavior and values of the generations in power. Currently, we are in the "Fourth Turning" or Crisis phase, which will reshape society and create a new social order. Click the play button below to listen to the audio version of this post. Whoops - Terrible Audio Quality! Update in Progress. Sorry. Assembly Theory. Life is complex molecular structures and pathways. Life as No One Knows It: Assembly Theory and the Search for Life’s Origins introduces a fresh perspective on life by focusing on the complexity of molecular assembly. By rethinking life as a continuum of assembly complexity rather than a strict category, Walker and Cronin challenge existing paradigms and open new avenues for understanding life’s origins and detecting it in the universe. While their approach leans heavily towards complexity and speculative thinking, it provides a thought-provoking framework that could reshape the scientific and philosophical discourse on what it means to be alive. Sapolsky presents a deterministic view rooted in biology and neuroscience. His approach emphasizes empathy and explores the ethical implications of human behavior, pushing us towards a nuanced, context-sensitive understanding of actions. Behave: The Biology of Humans at Our Best and Worst is an intricate exploration of the myriad factors influencing human behavior. Sapolsky argues that behavior cannot be understood through a single lens but is shaped by a complex interplay of biological, environmental, and cultural factors. He blends reductionist explanations (biological mechanisms) with holistic perspectives (sociocultural influences), offering an in-depth view of why humans act the way they do. Top Shelf Summarised below -> Bottom Shelf pending! Team of Rivals: The Political Genius of Abraham Lincoln Author: Doris Kearns Goodwin Team of Rivals explores the leadership and political acumen of Abraham Lincoln. Goodwin delves into Lincoln’s relationships with his cabinet members, many of whom were former political rivals. The book showcases Lincoln’s ability to bring together opposing figures and turn them into collaborators who helped guide the country through the Civil War. Why Read It? This book is a must-read for those interested in leadership, diplomacy, and history. It offers valuable insights into Lincoln’s character and the power of collaboration in difficult times. Getting Better: Why Global Development Is Succeeding Author: Charles Kenny Getting Better challenges the common narrative of global poverty and pessimism by presenting evidence that the world is improving in many important areas. Focusing on health, education, and access to technology, Charles Kenny argues that, despite slow economic growth, quality of life worldwide has been dramatically improving. This optimistic take on global development is backed by thoughtful analysis and data. Why Read It? This book provides a refreshing, data-driven perspective on global development, offering hope for a better future. It's essential reading for anyone interested in economics, development, and policy. The Expanding Circle: Ethics, Evolution, and Moral Progress Author: Peter Singer The Expanding Circle is a thought-provoking exploration of the evolution of ethics and how humans have progressively expanded their moral concern beyond kin and tribe to include larger communities, animals, and even future generations. Peter Singer presents compelling insights into how reason drives the expansion of our moral circle, offering a roadmap for further moral progress. Why Read It? This book challenges readers to rethink the boundaries of their moral concern and provides a philosophical foundation for understanding moral progress. It's an essential read for those interested in ethics, philosophy, and human evolution. Breaking Open the Head: A Psychedelic Journey into the Heart of Contemporary Shamanism Author: Daniel Pinchbeck Breaking Open the Head takes readers on a deep exploration of the intersection between psychedelics and shamanism. Daniel Pinchbeck embarks on a journey through indigenous cultures and Western history, investigating the use of psychedelics as tools for spiritual awakening and healing. The book combines personal narrative with research on the cultural and scientific significance of psychedelics in the modern world. Why Read It? This book offers an immersive dive into the world of psychedelics, their historical and cultural significance, and their potential to transform consciousness. A must-read for those interested in spirituality, alternative therapies, and shamanistic practices. Lifespan: Why We Age—and Why We Don’t Have To Author: David A. Sinclair, PhD Lifespan presents groundbreaking research into the biological processes of aging and makes the argument that aging is a disease that can be treated and even reversed. David Sinclair explores the science behind longevity and discusses genetic, lifestyle, and medical interventions that may allow humans to live longer, healthier lives. The book presents a hopeful vision of the future of aging. Why Read It? This book is a must-read for anyone interested in the science of aging, biotechnology, and the future of human health. It challenges the inevitability of aging and offers insights into how we might drastically extend human life expectancy. Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones Author: James Clear Atomic Habits is a practical guide to building better habits and breaking bad ones, based on the science of behavior change. James Clear explains how small, incremental changes—what he calls "atomic habits"—can compound into remarkable improvements over time. The book provides actionable strategies for overcoming bad habits, building new ones, and making lasting changes in your life. Clear combines research with practical examples to help readers understand how habits work and how to harness them to achieve their goals. Why Read It? If you're looking for a systematic, research-backed approach to self-improvement and habit formation, Atomic Habits offers clear, actionable advice that can lead to significant personal and professional growth. Terraform: Up & Running (3rd Edition) Author: Yevgeniy Brikman Terraform: Up & Running is the definitive guide to using Terraform, the open-source infrastructure as code software tool, for building, managing, and scaling cloud infrastructure. Yevgeniy Brikman provides practical, hands-on examples to help readers understand how to use Terraform to automate infrastructure on AWS, Google Cloud, Azure, and more. The third edition includes updates for the latest features of Terraform and expands on how to integrate Terraform into the DevOps lifecycle. Why Read It? If you're working in cloud infrastructure or DevOps, this book provides a comprehensive, practical guide to mastering Terraform, enabling you to efficiently build, manage, and scale your infrastructure. Learning Go: An Idiomatic Approach to Real-World Go Programming Author: Jon Bodner Learning Go provides a comprehensive and idiomatic introduction to the Go programming language, focusing on real-world programming practices. Jon Bodner walks readers through Go's unique features, from its concurrency model to how it handles errors. This book is ideal for developers with some experience in other languages who want to build robust applications in Go. Bodner provides practical examples and explains the key concepts in an easy-to-understand manner. Why Read It? This book is an essential resource for anyone looking to get started with Go, one of the most popular languages for building scalable and efficient systems. It's packed with practical tips and real-world examples to help you become proficient in Go programming. Network Programmability and Automation (2nd Edition): Skills for the Next-Generation Network Engineer Authors: Christian Adell,Jason Edelman, Scott Lowe, Matt Oswalt Network Programmability and Automation (2nd Edition) is a must-have for network engineers looking to evolve their skills for modern, automated networks. This book covers a broad range of network automation techniques, tools, and best practices, helping readers embrace the future of network engineering. From Python scripting and API-driven automation to tools like Ansible this edition updates the foundational skills needed to automate network infrastructure at scale. Why Read It? This book is essential for network engineers who want to stay ahead of the curve by learning how to automate and program networks. It's packed with real-world examples and practical knowledge that can help you modernize your networking skills and infrastructure. Purchase Network Programmability and Automation (2nd Edition) on Amazon The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win Authors: Gene Kim, Kevin Behr, George Spafford The Phoenix Project is a novel that introduces readers to the world of DevOps through a fictional narrative. It follows Bill, an IT manager tasked with saving a struggling project that is vital to the future of the business. As Bill implements DevOps principles, he and his team work to solve problems, streamline processes, and transform their organization. The book provides practical insights into how IT and business teams can collaborate more effectively to drive success. Why Read It? This book is perfect for anyone in IT or business leadership looking to understand how DevOps can drive efficiency and success. It provides a relatable, real-world application of DevOps principles in an engaging narrative format. The Staff Engineer's Path: A Guide for Individual Contributors Navigating Growth and Change Author: Tanya Reilly The Staff Engineer's Path provides practical advice for engineers navigating the complex role of a staff engineer. Tanya Reilly shares insights on how to grow as an individual contributor while also taking on leadership responsibilities. The book addresses how to influence, make decisions, and lead projects without moving into a traditional management role. Why Read It? This book is essential for software engineers and technical leaders who want to stay on the technical track while expanding their impact and leadership skills. It provides clear guidance on how to grow into senior engineering roles without becoming a manager. Energy and Civilization: A History Author: Vaclav Smil Energy and Civilization is a sweeping narrative of how energy has shaped human history. Vaclav Smil traces how societies have used energy—from human muscle and animal power to fossil fuels and modern renewables—and how energy transitions have driven economic, political, and social change. The book provides a deep understanding of the central role of energy in human progress and challenges. Why Read It? This book offers an insightful exploration of the role of energy in shaping civilization. It's essential for anyone interested in history, energy policy, and the future of energy in a rapidly changing world. The Progress Paradox: How Life Gets Better While People Feel Worse Author: Gregg Easterbrook The Progress Paradox explores the paradoxical relationship between material prosperity and personal satisfaction. Gregg Easterbrook argues that, despite unprecedented advances in wealth, health, and technology, people in modern societies report feeling less happy and more dissatisfied. Through data, anecdotes, and social theory, the book challenges the reader to rethink their assumptions about progress and happiness. Why Read It? This book offers a thought-provoking take on why increased wealth and technological advancement don’t always lead to greater happiness. It's essential reading for anyone interested in psychology, sociology, and the nature of human fulfillment. The Rational Optimist: How Prosperity Evolves Author: Matt Ridley The Rational Optimist by Matt Ridley presents an argument for optimism about the future based on historical and contemporary trends. Ridley explains how human innovation, trade, and cooperation have consistently improved standards of living throughout history, and he suggests that this trend is likely to continue. The book challenges pessimistic views of the world and argues that, despite present challenges, the future holds even greater potential for prosperity. Why Read It? This book provides a refreshing and well-researched take on why humanity’s long-term progress is reason for optimism. It's a must-read for those interested in economics, history, and the dynamics of human progress. The Cosmic Serpent: DNA and the Origins of Knowledge Author: Jeremy Narby The Cosmic Serpent explores the connection between shamanistic practices and molecular biology. Jeremy Narby draws on his experiences with indigenous shamans in the Amazon and suggests that DNA and life itself may be encoded in the visions induced by hallucinogenic plants. He provides a provocative theory linking ancient spiritual wisdom with modern biology, suggesting that shamans have been accessing knowledge about DNA for thousands of years. Why Read It? This book is a fascinating exploration of the intersection between science and spirituality. It's ideal for readers interested in anthropology, molecular biology, and alternative ways of understanding knowledge and consciousness. The Greatest Show on Earth: The Evidence for Evolution Author: Richard Dawkins The Greatest Show on Earth by Richard Dawkins is a comprehensive defense of the theory of evolution. Dawkins systematically presents the overwhelming evidence for evolution, from fossil records to molecular biology, showing that evolution is not just a theory but a well-supported fact. The book is both a scientific exploration and a passionate argument for understanding and appreciating the beauty of life's evolutionary history. Why Read It? This book is an essential read for anyone interested in understanding the evidence behind evolution. Richard Dawkins' clear, engaging writing makes complex scientific concepts accessible to a broad audience, offering both knowledge and inspiration. Sapiens: A Brief History of Humankind Author: Yuval Noah Harari Sapiens takes readers on a sweeping journey through the history of humanity, from the evolution of archaic human species to the present day. Yuval Noah Harari explores how Homo sapiens came to dominate the planet, the rise of civilizations, the development of religions, and the future challenges humanity faces. The book combines history, biology, anthropology, and sociology to offer a thought-provoking perspective on human progress. Why Read It? This book is a must-read for anyone interested in the history and future of humanity. Harari’s engaging writing and broad scope make complex historical and scientific ideas accessible, sparking deep reflection on where we’ve been and where we’re headed. The Ten Types of Human: Who We Are and Who We Can Be Author: Dexter Dias The Ten Types of Human by Dexter Dias is a fascinating exploration of the human mind and behavior. Dias combines stories from across the globe with cutting-edge research to explore ten fundamental types of human behavior and personality. He delves into the psychology of empathy, cruelty, courage, and fear, presenting a powerful reflection on what it means to be human and how understanding these traits can help us navigate our modern world. Why Read It? This book provides deep insights into human nature and behavior, offering readers a unique way to understand themselves and others. It's ideal for those interested in psychology, sociology, and anthropology. On Anarchism Author: Noam Chomsky On Anarchism is a collection of writings by Noam Chomsky that explores the principles and philosophy of anarchism. Chomsky presents a compelling case for anarchism as a way of organizing society that emphasizes freedom, equality, and opposition to all forms of unjust authority. The book serves as both an introduction to anarchist thought and a deep dive into Chomsky’s own views on the subject. Why Read It? This book offers a thought-provoking perspective on political theory and anarchism, especially for readers interested in alternative political philosophies. Chomsky’s clear and powerful writing makes complex ideas accessible, providing insight into one of the most influential political thinkers of our time. God Is Not Great: How Religion Poisons Everything Author: Christopher Hitchens Genre: Religion, Philosophy God Is Not Great is a sharp critique of organized religion by Christopher Hitchens. Hitchens argues that religion is not only irrational but also harmful to individuals and societies. Through a mix of historical examples and contemporary observations, he explores how religion has been used to justify oppression, violence, and ignorance, while advocating for a secular and rational worldview. Why Read It? This book offers a thought-provoking and controversial perspective on religion and its influence on society. Hitchens' witty and incisive writing makes complex topics accessible, encouraging readers to critically evaluate the role of religion in the modern world. Money: The True Story of a Made-Up Thing Author: Jacob Goldstein Money by Jacob Goldstein explores the history of money, tracing how something that started as a way to trade goods and services has evolved into one of the most powerful forces in the modern world. Goldstein explains the origins, transformations, and significance of money in a way that is both engaging and informative, making complex financial concepts accessible to the general reader. Why Read It? This book offers a fascinating and easy-to-read history of money and its evolution. It’s a must-read for anyone interested in economics, history, or the way financial systems shape our world. Mind Body Problems: Science, Subjectivity, & Who We Really Are Author: John Horgan Mind Body Problems by John Horgan delves into the complex relationship between the mind and body, questioning how science, subjectivity, and consciousness intertwine. Horgan interviews leading scientists and philosophers to explore how they grapple with these fundamental questions, blending personal reflections with scientific insights to provide a thought-provoking examination of who we are. Why Read It? This book is ideal for those interested in the intersection of neuroscience, psychology, and philosophy. Horgan’s accessible writing style and exploration of deep, existential questions make it a compelling read for anyone curious about the mind-body problem. Impromptu: Amplifying Our Humanity Through AI Author: Reid Hoffman Impromptu by Reid Hoffman explores how artificial intelligence (AI) can be used to amplify human potential. Hoffman, a co-founder of LinkedIn and an advocate of AI, argues that AI will not replace humans but rather enhance creativity, productivity, and problem-solving. Through thoughtful analysis and practical examples, the book presents a positive outlook on AI's role in shaping the future. Why Read It? This book is a must-read for those interested in understanding the positive potential of AI. Hoffman provides a balanced, optimistic perspective on how AI can be harnessed to improve our personal and professional lives, making it ideal for tech enthusiasts and skeptics alike. Superintelligence: Paths, Dangers, Strategies Author: Nick Bostrom Superintelligence by Nick Bostrom investigates the future of artificial intelligence and the potential risks associated with the development of AI systems that surpass human intelligence. Bostrom discusses various paths that AI development could take, the dangers of uncontrolled superintelligence, and the strategies humanity can adopt to mitigate these risks. The book offers a comprehensive look at one of the most critical issues of our time. Why Read It? This book is essential for anyone interested in the future of AI and its implications for humanity. Bostrom’s deep exploration of AI risks and strategies makes it a must-read for technologists, philosophers, and policy makers alike. Glucose Revolution: The Life-Changing Power of Balancing Your Blood Sugar Author: Jessie Inchauspé Glucose Revolution by Jessie Inchauspé provides practical advice on how balancing your blood sugar can significantly improve your health, energy levels, and mood. Inchauspé explains the science behind blood sugar spikes and offers tips on how to manage them through simple changes in diet and lifestyle. The book is filled with actionable advice, making it accessible to anyone looking to take control of their health. Why Read It? This book is essential for those interested in health and nutrition, offering scientifically-backed strategies to manage blood sugar and improve well-being. It’s a practical guide that can make a lasting impact on your health. The Talent Code: Greatness Isn't Born. It's Grown. Here's How. Author: Daniel Coyle The Talent Code by Daniel Coyle explores the science behind talent development and how greatness is nurtured, not born. Coyle delves into how myelin (the insulation around nerve fibers) plays a critical role in skill development and offers insights into how anyone can improve their abilities through deep practice, motivation, and master coaching. Why Read It? This book is a must-read for anyone looking to understand how talent develops and how to improve personal skills. It’s perfect for athletes, musicians, educators, and anyone seeking to unlock their potential. Cosmos Author: Carl Sagan Cosmos by Carl Sagan is a groundbreaking work that explores the vastness of the universe and humanity’s place within it. Sagan eloquently discusses a range of topics from astronomy to the evolution of life, blending scientific knowledge with a sense of wonder and philosophical inquiry. The book is a companion to the acclaimed television series of the same name and is a must-read for anyone interested in science and our place in the cosmos. Why Read It? This book offers a profound and inspiring journey through the universe, combining scientific facts with philosophical reflections. Sagan’s writing makes complex ideas accessible to a wide audience, sparking curiosity and awe. The Hunter-Gatherer's Guide to the 21st Century: Evolution and the Challenges of Modern Life Authors: Heather Heying, Bret Weinstein The Hunter-Gatherer's Guide to the 21st Century explores how the human brain and body, shaped by millions of years of evolution, are poorly suited to the complexities of modern life. Heather Heying and Bret Weinstein, evolutionary biologists, examine how evolutionary mismatches between our hunter-gatherer ancestors and our high-tech society impact everything from relationships to health, offering practical insights for thriving in the modern world. Why Read It? This book offers a unique evolutionary perspective on the challenges of modern life. It’s a must-read for anyone interested in science, human behavior, and how our evolutionary past affects the present. Purchase The Hunter-Gatherer's Guide to the 21st Century on Amazon Build a Mathematical Mind: Even If You Think You Can't Author: Albert Rutherford Build a Mathematical Mind offers practical insights into how anyone can improve their mathematical thinking, even if they feel they lack natural talent in the subject. Albert Rutherford provides strategies and advice for overcoming math anxiety and building a stronger, more confident mathematical mindset, showing that everyone can learn to appreciate and excel in math. Why Read It? This book is perfect for anyone looking to boost their mathematical skills and mindset. Whether you're a student, educator, or someone who has struggled with math, Rutherford’s accessible approach makes math less intimidating and more engaging. The Coming Wave: Technology, Power, and the Twenty-First Century's Greatest Dilemma Author: Mustafa Suleyman The Coming Wave by Mustafa Suleyman examines how emerging technologies such as artificial intelligence, genetic engineering, and advanced computing will shape the 21st century. Suleyman explores the ethical and societal challenges that accompany these powerful innovations, arguing that humanity must learn to control the wave of technological change before it controls us. Why Read It? This book is a must-read for anyone interested in the future of technology, power, and ethics. Suleyman provides a nuanced look at the opportunities and risks posed by emerging technologies, making it a crucial resource for technologists, policymakers, and futurists alike. Enlightenment Now: The Case for Reason, Science, Humanism, and Progress Author: Steven Pinker Enlightenment Now by Steven Pinker argues that the ideals of the Enlightenment—reason, science, humanism, and progress—are the keys to continuing human advancement. Pinker presents data-driven evidence to show that, despite widespread pessimism, the world is improving in terms of health, prosperity, safety, and overall well-being, thanks to the principles of the Enlightenment. Why Read It? This book is a powerful and optimistic defense of modernity, ideal for readers who want a hopeful perspective on the future. Pinker’s work is a must-read for those interested in philosophy, science, and the forces that drive human progress. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power Author: Shoshana Zuboff The Age of Surveillance Capitalism by Shoshana Zuboff explores how modern tech companies harvest, exploit, and monetize personal data to create unprecedented power structures. Zuboff argues that surveillance capitalism represents a new form of economic order that challenges individual autonomy, democracy, and privacy. This deeply researched work is a wake-up call about the growing power of corporations in the digital age. Why Read It? This book is essential for anyone concerned about privacy, data exploitation, and the future of democracy in the digital era. Zuboff’s work provides a profound critique of the way modern capitalism operates through surveillance. In Search of Schrödinger's Cat: Quantum Physics and Reality Author: John Gribbin In Search of Schrödinger's Cat by John Gribbin is a classic introduction to quantum mechanics, explaining the bizarre and fascinating world of subatomic particles. Gribbin unpacks the famous Schrödinger's cat paradox and explores the implications of quantum theory for our understanding of reality, providing an accessible entry point into one of the most complex scientific fields. Why Read It? This book is perfect for readers who are curious about quantum physics and want a clear, engaging explanation of its concepts. Gribbin’s ability to make complex ideas understandable makes this a must-read for anyone interested in science and the nature of reality. Essentialism: The Disciplined Pursuit of Less Author: Greg McKeown Essentialism by Greg McKeown is a guide to focusing on what truly matters by eliminating the non-essential. McKeown encourages readers to adopt a mindset of doing less, but better, and offers practical advice on how to reclaim time, energy, and focus to achieve greater results. The book helps individuals identify and pursue their highest priorities, creating a life that is both meaningful and productive. Why Read It? This book is ideal for anyone feeling overwhelmed by modern life and looking for a way to simplify and focus on what truly matters. McKeown’s insights are valuable for improving both personal and professional effectiveness. The Chimp Paradox: The Mind Management Program to Help You Achieve Success, Confidence, and Happiness Author: Steve Peters The Chimp Paradox by Steve Peters introduces the concept of the "inner chimp" as a metaphor for the part of our brain that controls emotional impulses. Peters provides a framework for understanding how this emotional side of the brain works, helping readers learn how to manage their minds to achieve success, confidence, and happiness. The book offers practical strategies for improving emotional control, decision-making, and mental well-being. Why Read It? This book is ideal for anyone looking to better understand their own mind and improve their emotional and psychological well-being. Peters’ insights are valuable for personal growth, emotional resilience, and achieving success in both personal and professional life. Life Time: Your Body Clock and Its Essential Roles in Good Health and Sleep Author: Russell Foster Life Time by Russell Foster explores the science of circadian rhythms and how our body clock influences nearly every aspect of our health. Foster explains how aligning our daily routines with our natural biological rhythms can improve sleep, productivity, and overall well-being. The book provides actionable insights into managing sleep and adopting healthier lifestyle habits. Why Read It? This book is essential for anyone interested in improving their sleep and overall health. Foster’s deep dive into circadian biology makes it a practical guide for achieving better health through the power of timing. Quiet: The Power of Introverts in a World That Can't Stop Talking Author: Susan Cain Quiet by Susan Cain is a groundbreaking book that highlights the power and value of introverts in a society that often rewards extroversion. Cain explores the psychology of introverts, the unique strengths they bring to the table, and the ways in which our culture undervalues their contributions. Through research and personal stories, the book advocates for a better understanding and appreciation of introverts. Why Read It? This book is essential for introverts looking to embrace their strengths and for extroverts seeking to better understand their introverted peers. Cain’s work helps to redefine how we think about leadership, creativity, and social dynamics. Other Minds: The Octopus, the Sea, and the Deep Origins of Consciousness Author: Peter Godfrey-Smith Other Minds by Peter Godfrey-Smith explores the extraordinary intelligence of octopuses and what they can teach us about the evolution of consciousness. Godfrey-Smith, a philosopher and diver, takes readers on a journey through the world of cephalopods, offering insights into the nature of intelligence, mind, and the limits of human understanding. Why Read It? This book is perfect for anyone interested in the mysteries of consciousness and the evolution of intelligent life. It provides a fascinating exploration of animal minds, particularly those of creatures that are so different from us. Think Like an Engineer: Inside the Minds That Are Changing the World Author: Guru Madhavan Think Like an Engineer by Guru Madhavan offers readers a fascinating look into the minds of engineers and how they solve some of the world’s most complex problems. Madhavan shares insights from his experiences in various fields, highlighting the principles of engineering that can be applied to everyday challenges. Through real-world examples, he explains how engineering thinking can improve efficiency, innovation, and creativity. Why Read It? This book is perfect for anyone looking to develop problem-solving skills or gain a better understanding of how engineers approach challenges. It’s ideal for both professionals and those curious about the power of engineering thinking in daily life. Surrounded by Idiots: The Four Types of Human Behavior and How to Effectively Communicate with Each in Business (and in Life) Author: Thomas Erikson Surrounded by Idiots by Thomas Erikson presents a simple yet effective model for understanding different personality types. Using the DISC model, Erikson divides people into four types—Red, Yellow, Green, and Blue—each representing a different way of thinking and behaving. The book provides practical strategies for improving communication and understanding in both professional and personal interactions. Why Read It? This book is perfect for anyone looking to enhance their communication skills and better understand the people around them. Erikson’s engaging approach makes complex personality dynamics accessible and applicable to everyday life. Deep Utopia: The Meaning of Life Solved in a Technologically Mature World Author: Nick Bostrom Deep Utopia by Nick Bostrom explores the concept of a technologically mature society that has overcome existential risks. Bostrom reflects on the ethical, philosophical, and technological advancements necessary to reach a utopian future, delving into topics like superintelligence, moral enhancements, and humanity’s ultimate trajectory. Why Read It? This book is essential for those interested in futurism, ethics, and the long-term future of humanity. Bostrom’s thought-provoking analysis encourages readers to consider the possibilities and responsibilities of shaping a better future. AWS Networking Fundamentals: A Practical Guide to Understand How to Build a Virtual Datacenter into the AWS Cloud Author: Toni Pasanen AWS Networking Fundamentals by Toni Pasanen is a practical guide to understanding the networking aspects of Amazon Web Services (AWS). The book covers key topics such as VPC, VPNs, Subnets, and Load Balancers, helping readers build a virtual datacenter in the AWS cloud. It’s ideal for IT professionals who want to gain a deep understanding of AWS networking. Why Read It? This book is perfect for IT professionals, cloud engineers, and anyone looking to master AWS networking. It provides a clear, hands-on approach to building scalable and secure networks in the cloud. The End of the World Is Just the Beginning: Mapping the Collapse of Globalization Author: Peter Zeihan The End of the World Is Just the Beginning by Peter Zeihan explores the unraveling of global supply chains and the end of globalization as we know it. Zeihan provides an in-depth analysis of how the collapse of global interconnectedness will affect economies, industries, and societies. The book offers a glimpse into the future of regionalization and self-sufficiency. Why Read It? This book is essential for anyone interested in geopolitics, economics, and understanding the forces shaping the future. Zeihan’s insight into the complexities of globalization and its potential downfall makes this a thought-provoking read. Purchase The End of the World Is Just the Beginning on Amazon The SaaS Sales Method: Sales as a Science Authors: Jacco van der Kooij and Fernando Pizarro The SaaS Sales Method is a comprehensive guide to mastering sales in the software-as-a-service (SaaS) industry. Jacco van der Kooij and Fernando Pizarro provide a structured, data-driven approach to sales, making it accessible for both new and experienced sales professionals. This book breaks down the sales process into clear steps, making sales a repeatable and measurable science. Why Read It? This book is perfect for SaaS professionals looking to improve their sales techniques. It offers a data-backed method for increasing efficiency and results, essential for anyone working in enterprise sales. The Inner Game of Tennis: The Classic Guide to the Mental Side of Peak Performance Author: W. Timothy Gallwey The Inner Game of Tennis by W. Timothy Gallwey is a classic in sports psychology, offering insights into the mental aspects of performance. Gallwey focuses on the "inner game"—the mental obstacles we place in our own way—and how overcoming these challenges can lead to peak performance in tennis and beyond. The book has applications in sports, business, and personal development, making it timeless and widely applicable. Why Read It? This book is a must-read for anyone interested in improving their mental game, whether in sports or in everyday life. Gallwey’s strategies for overcoming mental barriers are practical and transformative. Waking Up: A Guide to Spirituality Without Religion Author: Sam Harris Waking Up by Sam Harris is a thought-provoking exploration of spirituality through the lens of neuroscience and philosophy. Harris argues that it’s possible to achieve spiritual experiences and insights without relying on religious belief. Blending neuroscience, meditation, and philosophy, Harris offers readers practical insights into mindfulness and personal transformation. Why Read It? This book is essential for those interested in the intersection of science and spirituality. Harris provides a secular guide to mindfulness and offers ways to achieve personal well-being without traditional religious frameworks. Read Write Own: The Path to Decentralized Digital Ownership Author: Chris Dixon Read Write Own by Chris Dixon explores the shift towards decentralized digital ownership through blockchain technology and Web3. Dixon delves into the history of the internet—from the read-only Web1, to the interactive Web2, and now the decentralized Web3 where individuals can truly own their digital content. The book offers insights into the transformative potential of decentralized technology for creators, entrepreneurs, and users. Why Read It? This book is essential for those looking to understand the future of the internet and digital ownership. Dixon’s deep knowledge of blockchain and Web3 technology makes this a critical read for tech enthusiasts and futurists. I'm Luke. A former Network Architect pursuing Technical Management opportunities in London. Here you will find my Resume, my new Blog, and some Network related content. I'm open to new and compelling opportunities in the Network Community. If you have a role I might be interested in, please get in touch. You have my thanks and appreciation. My door is open. You can Hire Me I'm open to new opportunities in London. Experience Distilled. Do What You Love. Some highlights you may consider: Or, for something even more frivolous: Here's my Book Recommendations And my Favourite Quotes & Words Other than that, these pages provide a rudiment of information covering my interests in Network Automation as a career journey captured by the Epics: This content is limited. It's less than MVP. And nothing close to MLP. It's Dev in progress. I have decided not to port any previous content to this site. I'm starting from scratch. The path to Network as Code. Some initial content you may consider: Introduction to Version Control ... These Pages are built with Mkdocs ... The Network Sources of Truth ... Technical Management Adventures Learning to lead - the hard way. Some initial content you may consider: Introduction to being Different ... Introduction to being Authentic ... Introduction to being Wrong ...
+ “It takes aeons of evolution and perpetual starvation" ... Work in progress
+ Not the most erudite or philosophically pertinent. But still, I wrote them down. Intuition is experience distilled. Unknown. When we have to change our mind about a person, we hold the inconvenience he causes us very much against him. Beyond Good and Evil Friedrich Nietzsche The human body is a network of tubes that exists to distribute resources efficiently. Some Podcast. One can adopt one set of principles in private and a different set in public without any inconsistency; all one has to do is make one’s overriding principle the pursuit of self-interest, and then use ethical reasoning in public situations for the purpose of impressing others with one’s impartiality, but not as a real guide to one’s actions. This is hypocritical, but the hypocrisy is part of a consistent design for promoting one’s own interests.” Expanding Circles Peter Singer Page 144 The trivial many and the vital few. Essentialist Book & Modern Wisdom Podcast The conversation we are having with ourselves we can’t have with others. Sam Harris Confidence is attractive. Confidence comes from results. And results come from skill acquisition. Unknown Don't worry everyone’s pretending. Steven Pemberton. Making mistakes makes you smarter. Really fast. Hedge Podcast on NAF Just be authentic in the moment and no one can fu*k you. Unknown. I 100% guarantee we will not pay more than 10% of that. Neil Schroeder. There is a way to catch your dreams without falling asleep. Seinabo Sey We all have multitudes. Unknown Everything fails all the time. Werner Vogels (Amazon CTO). We are all struggling mortals with fleeting lives trying to be right as often as we can. Bill Clinton. I think that I shall never see WeWork will fail in catastrophic fashion before June 2023. Luke Richardson December 2022. Let chaos reign. Then reign in chaos. Andy Grove, former CEO of Intel. It takes aeons of evolution and perpetual starvation. Unknown. Is there music and art and invention? I hope you are dancing in heaven. Cause here on earth something is missing. Dancing in the sky. I know people who graduated college at 21 and didn’t get a job until they were 27. I know people who graduated at 25 and got a job immediately. I know people who never went to university and found what they love at 18. I know people who have children and are single, I know people who are married and had to wait 8-10 years to be parents. I know people who are in a relationship and love someone else, I know people who love each other and aren’t together, there are people waiting to love and be loved. My point is, everything in life happens according to our time, our clock. You may look at your friends and some may seem to be ahead or behind you, but they are not, they are living according to the pace of their clock, so be patient. The Minds Journal. Nobody gets through this life unscathed. Are you going to drown in your grief? We are all going to die. So we may as-well live. Long story short... they forgot that they are all brothers and sisters, co-habiting the same planet, so they kinda became delusional and imagined these invisible borders, beliefs and structures separating them, and started destroying each other and the earth they live on ... instead of just living, sharing, creating and evolving together. Internet adage. Man is the most insane species. He worships an invisible God and destroys a visible Nature. Unaware that the Nature he is destroying is the God he is worshipping. Hert Reeves. I wish people cared as much about the earth as they did about who they think created it… Internet adage. Shakespeare said: I always feel happy, You know why? Because I don't expect anything from anyone, Expectations always hurt... Life is short, So love your life, Be happy... & Keep smiling. Just live for yourself & Before you speak, Listen. Before you write, Think. Before you spend, Earn. Before you pray, Forgive. Before you hurt, Feel. Before you hate, Love. Before you quit, Try. Before you die, Live. Be Happy & Smile. Listen, Think, Earn, Forgive, Feel, Love, Live. It all started with an argument over whose God was more peace-loving, kind, and forgiving. Internet adage with image of cartoon war chaos & destruction. I do not believe anything. Most people, even the educated, think that everybody must believe something or other, that if one is not a theist, one must be a dogmatic atheist, and if one does not think Capitalism is perfect, one must believe fervently in Socialism, and if one does not have blind faith in X one must alternatively have blind faith in not-X or the reverse of X. My own opinion is that belief is the death of intelligence. Robert Anton Wilson. Luke Comment I think belief is the distillation of others' intelligence. Humans categorize and simplify, which is likely why we are unable to perceive actual reality. Evolution has abstracted us from the complexity that lays beneath our perception. The one thing I know for sure is that feelings are rarely mutual, so when they are, drop everything, forget belongings and expectations, forget the games, the two days between texts, the hard-to-gets because this is it, this is what the entire world is after and you've stumbled upon it by chance, by accident--so take a deep breath, take a step forward, now run, collide like planets in the system of a dying sun, embrace each other with both arms and let all the rules, the opinions and common sense crash down around you. Because this is love, kid, and it’s all yours. Believe me, you're in for one hell of a ride, after all--this is the one thing I know for sure. Beau Taplin. I can bring you more misery than words can tell. Come take my hand, let me lead you to hell. Signed, Drugs. Do you know why I am stopping you? Well Officer, a crime requires an injured party. Seeing as there isn't one, I can assume you're attempting to manufacture my consent to a contract with the State's corporate policy in order to generate revenue as part of a racketeering scam. Police officer traffic stopping an astute person. The world is not divided between East & West. You are American, I am Iranian, we don't know each other, but we talk and we understand each other perfectly. The difference between you and your government is much bigger than the difference between you and me. And the difference between me and my government is much bigger than the difference between me and you. And our governments are very much the same. Marjane Satrapi, Iranian Graphic Novelist. The secret to finding all knowledge is to use exactly the right keywords when you google. Internet adage. I like weird people... the black sheep, the odd ducks, the rejects, the eccentrics, the loners, the lost and forgotten. More often than not, these people have the most beautiful souls. Internet adage. Only the cool kids are enlightened. Ironic Internet adage. Stress is caused by giving a fuck. Internet adage. I want to be happy but something inside me screams that I do not deserve it. HealthyPlace.com Stars can't shine without darkness. Internet adage. Imperfection is beauty, madness is genius, and it's better to be absolutely ridiculous than absolutely boring. Internet adage. The scariest thing about distance is you don't know whether they'll miss you or forget about you. The Notebook, Internet adage. One awesome thing about Eeyore is that even though he is basically clinically depressed, he still gets invited to participate in adventures and shenanigans with all of his friends. And they never expect him to pretend to feel happy, they just love him anyway, and they never leave him behind or ask him to change. David Avocado Wolfe - re Winnie the Poo. Never apologize for what you feel. It’s like saying sorry for being real. Internet adage. The creative adult is the child who survived. Internet adage with image of man doing graffiti. We do not grow absolutely chronologically. We grow sometimes in one dimension, and not in another, unevenly. We grow partially. We are relative. We are mature in one realm, childish in another. The past, present and future mingle and pull us backward and forward. Or fix us in the present. We are made of layers, cells, constellations. Anais Nin. That's the way the cookie crumbles. James Rose 2003 Drawing of a cookie crumbling resin into a bed. Luke Comment James was my last remaining close friend. He died of heart failure in the year following the Covid pandemic. I miss him more than words can say. I hope everyone has or had a friend as wonderful as James. Techno-Feudalist. Yanis Varoufakis Forgetting is an essential complement to remembering. Vaclav Smil. Learning to learn. It is not enough to hear or read. You have to think it through. Broadly. This is data processing. Make and use associations. Create links between knowledge. Then you can retain information. Data processing is how to learn. Learning is about retaining. Retaining knowledge requires thought. Train your brain muscle. Improve your memory. Somewhat ironically - unknown. :material-smile:{ .bounce } There is nothing to do but take a moment to miss him. Sam Harris on Hitch. Atheism is clearing the space for better conversations. Science, Art, Culture, Philosophy. Sam Harris. A pact with the structure of existence. Jordan Peterson. We excuse ourselves into living mediocre lives. Unknown. If people knew how hard I had to work to gain this mastery, it would not seem so wonderful at all. Michelangelo. We know close to nothing, about everything. And if we embrace that we will have a better experience going through life. YouTube - From Lex I think. Or Sam Harris Pod. Nothing is true and everything is possible. Some interview - who? We should do politics specifically with a view to whats best for hundreds of years time. Nothing else. Politics for the species. Rather than generations. Luke Richardson 2023 Luke's Manifesto Maintain the status quo of Liberal Democratic Capitalism with a approximate split of 40% GNP to GDP. Spend my term preparing the institutional environment for much grander, but extremely slow burn, generational shifts. Basically do nothing remotely radical or change making. Then pass the work to the next government to implement the changes on which society has been educated, prepared for, and continuously consulted on. Reach for the lasers. Human Traffic. A salary is a drug they give you to forget your dreams. Unknown. All foundational technology gets cheaper and easier to use and ultimately proliferates far and wide. Mustafa Suleyman - DeepMind. When we have to change our mind about a person, we hold the inconvenience he causes us very much against him. Beyond Good and Evil Friedrich Nietzsche Enjoyment appears at the boundary between boredom and anxiety, when the challenges are just balanced with the persons capacity to act. Mihaly Csikszentmihalyi - Flow A man has as many social selves as there are distinct groups of persons about whose opinion he cares. He generally shows a different side of himself to each of these different groups. William James (derived from the book Quiet) The stories we tell ourselves. Dan Mcadmams Where we stumble is where our treasure lies. Besides black art, there is only automation and mechanization. Federico García Lorca (1898-1936), Spanish poet and playwright …people can be perfectly rational and yet perfectly self-interested. Gist I'm Luke. A former Network Architect pursuing Technical Management opportunities in London. Here you will find my Resume, my new Blog, and some Network related content. I'm open to new and compelling opportunities in the Network Community. If you have a role I might be interested in, please get in touch. You have my thanks and appreciation. My door is open. You can Hire Me I'm open to new opportunities in London. Luke's LinkedIn Luke's Mail Luke's GitHub Luke's Acclaim Resume Word Download Resume PDF Download Book a Meeting or Interview You can Read my Blog Experience Distilled. Do What You Love. Some highlights you may consider: NAF AutoCon Reflections My Life Story - Whoami The Greatest Shows on Earth Or, for something even more frivolous: Here's my Book Recommendations And my Favourite Quotes & Words Other than that, these pages provide a rudiment of information covering my interests in Network Automation as a career journey captured by the Epics: This content is limited. It's less than MVP. And nothing close to MLP. It's Dev in progress. I have decided not to port any previous content to this site. I'm starting from scratch. Network Automation Rudiments The path to Network as Code. Some initial content you may consider: Introduction to Version Control ... These Pages are built with Mkdocs ... The Network Sources of Truth ... Technical Management Adventures Learning to lead - the hard way. Some initial content you may consider: Introduction to being Different ... Introduction to being Authentic ... Introduction to being Wrong ... Welcome to My Book Shelf Here you'll find a collection of books that I've read and recommend. Top Shelf Summarised below -> Bottom Shelf pending! Team of Rivals: The Political Genius of Abraham Lincoln Author: Doris Kearns Goodwin Genre: Biography, History Team of Rivals explores the leadership and political acumen of Abraham Lincoln. Goodwin delves into Lincoln\u2019s relationships with his cabinet members, many of whom were former political rivals. The book showcases Lincoln\u2019s ability to bring together opposing figures and turn them into collaborators who helped guide the country through the Civil War. Why Read It? This book is a must-read for those interested in leadership, diplomacy, and history. It offers valuable insights into Lincoln\u2019s character and the power of collaboration in difficult times. Purchase Team of Rivals on Amazon Getting Better: Why Global Development Is Succeeding Author: Charles Kenny Genre: Self-Help, Psychology Getting Better challenges the common narrative of global poverty and pessimism by presenting evidence that the world is improving in many important areas. Focusing on health, education, and access to technology, Charles Kenny argues that, despite slow economic growth, quality of life worldwide has been dramatically improving. This optimistic take on global development is backed by thoughtful analysis and data. Why Read It? This book provides a refreshing, data-driven perspective on global development, offering hope for a better future. It's essential reading for anyone interested in economics, development, and policy. Purchase Getting Better on Amazon The Expanding Circle: Ethics, Evolution, and Moral Progress Author: Peter Singer Genre: Philosophy, Ethics The Expanding Circle is a thought-provoking exploration of the evolution of ethics and how humans have progressively expanded their moral concern beyond kin and tribe to include larger communities, animals, and even future generations. Peter Singer presents compelling insights into how reason drives the expansion of our moral circle, offering a roadmap for further moral progress. Why Read It? This book challenges readers to rethink the boundaries of their moral concern and provides a philosophical foundation for understanding moral progress. It's an essential read for those interested in ethics, philosophy, and human evolution. Purchase The Expanding Circle on Amazon Breaking Open the Head: A Psychedelic Journey into the Heart of Contemporary Shamanism Author: Daniel Pinchbeck Genre: Spirituality, Anthropology Breaking Open the Head takes readers on a deep exploration of the intersection between psychedelics and shamanism. Daniel Pinchbeck embarks on a journey through indigenous cultures and Western history, investigating the use of psychedelics as tools for spiritual awakening and healing. The book combines personal narrative with research on the cultural and scientific significance of psychedelics in the modern world. Why Read It? This book offers an immersive dive into the world of psychedelics, their historical and cultural significance, and their potential to transform consciousness. A must-read for those interested in spirituality, alternative therapies, and shamanistic practices. Purchase Breaking Open the Head on Amazon Lifespan: Why We Age\u2014and Why We Don\u2019t Have To Author: David A. Sinclair, PhD Genre: Science, Health, Longevity Lifespan presents groundbreaking research into the biological processes of aging and makes the argument that aging is a disease that can be treated and even reversed. David Sinclair explores the science behind longevity and discusses genetic, lifestyle, and medical interventions that may allow humans to live longer, healthier lives. The book presents a hopeful vision of the future of aging. Why Read It? This book is a must-read for anyone interested in the science of aging, biotechnology, and the future of human health. It challenges the inevitability of aging and offers insights into how we might drastically extend human life expectancy. Purchase Lifespan on Amazon Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones Author: James Clear Genre: Self-Help, Psychology Atomic Habits is a practical guide to building better habits and breaking bad ones, based on the science of behavior change. James Clear explains how small, incremental changes\u2014what he calls \"atomic habits\"\u2014can compound into remarkable improvements over time. The book provides actionable strategies for overcoming bad habits, building new ones, and making lasting changes in your life. Clear combines research with practical examples to help readers understand how habits work and how to harness them to achieve their goals. Why Read It? If you're looking for a systematic, research-backed approach to self-improvement and habit formation, Atomic Habits offers clear, actionable advice that can lead to significant personal and professional growth. Purchase Atomic Habits on Amazon Terraform: Up & Running (3rd Edition) Author: Yevgeniy Brikman Genre: Technology, DevOps Terraform: Up & Running is the definitive guide to using Terraform, the open-source infrastructure as code software tool, for building, managing, and scaling cloud infrastructure. Yevgeniy Brikman provides practical, hands-on examples to help readers understand how to use Terraform to automate infrastructure on AWS, Google Cloud, Azure, and more. The third edition includes updates for the latest features of Terraform and expands on how to integrate Terraform into the DevOps lifecycle. Why Read It? If you're working in cloud infrastructure or DevOps, this book provides a comprehensive, practical guide to mastering Terraform, enabling you to efficiently build, manage, and scale your infrastructure. Purchase Terraform Up & Running (3rd Edition) on Amazon Learning Go: An Idiomatic Approach to Real-World Go Programming Author: Jon Bodner Genre: Technology, Programming Learning Go provides a comprehensive and idiomatic introduction to the Go programming language, focusing on real-world programming practices. Jon Bodner walks readers through Go's unique features, from its concurrency model to how it handles errors. This book is ideal for developers with some experience in other languages who want to build robust applications in Go. Bodner provides practical examples and explains the key concepts in an easy-to-understand manner. Why Read It? This book is an essential resource for anyone looking to get started with Go, one of the most popular languages for building scalable and efficient systems. It's packed with practical tips and real-world examples to help you become proficient in Go programming. Purchase Learning Go on Amazon Network Programmability and Automation (2nd Edition): Skills for the Next-Generation Network Engineer Authors: Christian Adell,Jason Edelman, Scott Lowe, Matt Oswalt Genre: Technology, Networking Network Programmability and Automation (2nd Edition) is a must-have for network engineers looking to evolve their skills for modern, automated networks. This book covers a broad range of network automation techniques, tools, and best practices, helping readers embrace the future of network engineering. From Python scripting and API-driven automation to tools like Ansible this edition updates the foundational skills needed to automate network infrastructure at scale. Why Read It? This book is essential for network engineers who want to stay ahead of the curve by learning how to automate and program networks. It's packed with real-world examples and practical knowledge that can help you modernize your networking skills and infrastructure. Purchase Network Programmability and Automation (2nd Edition) on Amazon The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win Authors: Gene Kim, Kevin Behr, George Spafford Genre: Technology, DevOps, Business The Phoenix Project is a novel that introduces readers to the world of DevOps through a fictional narrative. It follows Bill, an IT manager tasked with saving a struggling project that is vital to the future of the business. As Bill implements DevOps principles, he and his team work to solve problems, streamline processes, and transform their organization. The book provides practical insights into how IT and business teams can collaborate more effectively to drive success. Why Read It? This book is perfect for anyone in IT or business leadership looking to understand how DevOps can drive efficiency and success. It provides a relatable, real-world application of DevOps principles in an engaging narrative format. Purchase The Phoenix Project on Amazon The Staff Engineer's Path: A Guide for Individual Contributors Navigating Growth and Change Author: Tanya Reilly Genre: Technology, Engineering Leadership The Staff Engineer's Path provides practical advice for engineers navigating the complex role of a staff engineer. Tanya Reilly shares insights on how to grow as an individual contributor while also taking on leadership responsibilities. The book addresses how to influence, make decisions, and lead projects without moving into a traditional management role. Why Read It? This book is essential for software engineers and technical leaders who want to stay on the technical track while expanding their impact and leadership skills. It provides clear guidance on how to grow into senior engineering roles without becoming a manager. Purchase The Staff Engineer's Path on Amazon Energy and Civilization: A History Author: Vaclav Smil Genre: History, Science Energy and Civilization is a sweeping narrative of how energy has shaped human history. Vaclav Smil traces how societies have used energy\u2014from human muscle and animal power to fossil fuels and modern renewables\u2014and how energy transitions have driven economic, political, and social change. The book provides a deep understanding of the central role of energy in human progress and challenges. Why Read It? This book offers an insightful exploration of the role of energy in shaping civilization. It's essential for anyone interested in history, energy policy, and the future of energy in a rapidly changing world. Purchase Energy and Civilization on Amazon The Progress Paradox: How Life Gets Better While People Feel Worse Author: Gregg Easterbrook Genre: Sociology, Psychology The Progress Paradox explores the paradoxical relationship between material prosperity and personal satisfaction. Gregg Easterbrook argues that, despite unprecedented advances in wealth, health, and technology, people in modern societies report feeling less happy and more dissatisfied. Through data, anecdotes, and social theory, the book challenges the reader to rethink their assumptions about progress and happiness. Why Read It? This book offers a thought-provoking take on why increased wealth and technological advancement don\u2019t always lead to greater happiness. It's essential reading for anyone interested in psychology, sociology, and the nature of human fulfillment. Purchase The Progress Paradox on Amazon The Rational Optimist: How Prosperity Evolves Author: Matt Ridley Genre: Economics, History, Sociology The Rational Optimist by Matt Ridley presents an argument for optimism about the future based on historical and contemporary trends. Ridley explains how human innovation, trade, and cooperation have consistently improved standards of living throughout history, and he suggests that this trend is likely to continue. The book challenges pessimistic views of the world and argues that, despite present challenges, the future holds even greater potential for prosperity. Why Read It? This book provides a refreshing and well-researched take on why humanity\u2019s long-term progress is reason for optimism. It's a must-read for those interested in economics, history, and the dynamics of human progress. Purchase The Rational Optimist on Amazon The Cosmic Serpent: DNA and the Origins of Knowledge Author: Jeremy Narby Genre: Anthropology, Biology, Spirituality The Cosmic Serpent explores the connection between shamanistic practices and molecular biology. Jeremy Narby draws on his experiences with indigenous shamans in the Amazon and suggests that DNA and life itself may be encoded in the visions induced by hallucinogenic plants. He provides a provocative theory linking ancient spiritual wisdom with modern biology, suggesting that shamans have been accessing knowledge about DNA for thousands of years. Why Read It? This book is a fascinating exploration of the intersection between science and spirituality. It's ideal for readers interested in anthropology, molecular biology, and alternative ways of understanding knowledge and consciousness. Purchase The Cosmic Serpent on Amazon The Greatest Show on Earth: The Evidence for Evolution Author: Richard Dawkins Genre: Science, Biology, Evolution The Greatest Show on Earth by Richard Dawkins is a comprehensive defense of the theory of evolution. Dawkins systematically presents the overwhelming evidence for evolution, from fossil records to molecular biology, showing that evolution is not just a theory but a well-supported fact. The book is both a scientific exploration and a passionate argument for understanding and appreciating the beauty of life's evolutionary history. Why Read It? This book is an essential read for anyone interested in understanding the evidence behind evolution. Richard Dawkins' clear, engaging writing makes complex scientific concepts accessible to a broad audience, offering both knowledge and inspiration. Purchase The Greatest Show on Earth on Amazon Sapiens: A Brief History of Humankind Author: Yuval Noah Harari Genre: History, Anthropology, Sociology Sapiens takes readers on a sweeping journey through the history of humanity, from the evolution of archaic human species to the present day. Yuval Noah Harari explores how Homo sapiens came to dominate the planet, the rise of civilizations, the development of religions, and the future challenges humanity faces. The book combines history, biology, anthropology, and sociology to offer a thought-provoking perspective on human progress. Why Read It? This book is a must-read for anyone interested in the history and future of humanity. Harari\u2019s engaging writing and broad scope make complex historical and scientific ideas accessible, sparking deep reflection on where we\u2019ve been and where we\u2019re headed. Purchase Sapiens on Amazon The Ten Types of Human: Who We Are and Who We Can Be Author: Dexter Dias Genre: Psychology, Sociology, Anthropology The Ten Types of Human by Dexter Dias is a fascinating exploration of the human mind and behavior. Dias combines stories from across the globe with cutting-edge research to explore ten fundamental types of human behavior and personality. He delves into the psychology of empathy, cruelty, courage, and fear, presenting a powerful reflection on what it means to be human and how understanding these traits can help us navigate our modern world. Why Read It? This book provides deep insights into human nature and behavior, offering readers a unique way to understand themselves and others. It's ideal for those interested in psychology, sociology, and anthropology. Purchase The Ten Types of Human on Amazon On Anarchism Author: Noam Chomsky Genre: Politics, Philosophy On Anarchism is a collection of writings by Noam Chomsky that explores the principles and philosophy of anarchism. Chomsky presents a compelling case for anarchism as a way of organizing society that emphasizes freedom, equality, and opposition to all forms of unjust authority. The book serves as both an introduction to anarchist thought and a deep dive into Chomsky\u2019s own views on the subject. Why Read It? This book offers a thought-provoking perspective on political theory and anarchism, especially for readers interested in alternative political philosophies. Chomsky\u2019s clear and powerful writing makes complex ideas accessible, providing insight into one of the most influential political thinkers of our time. Purchase On Anarchism on Amazon God Is Not Great: How Religion Poisons Everything Author: Christopher Hitchens Genre: Religion, Philosophy God Is Not Great is a sharp critique of organized religion by Christopher Hitchens. Hitchens argues that religion is not only irrational but also harmful to individuals and societies. Through a mix of historical examples and contemporary observations, he explores how religion has been used to justify oppression, violence, and ignorance, while advocating for a secular and rational worldview. Why Read It? This book offers a thought-provoking and controversial perspective on religion and its influence on society. Hitchens' witty and incisive writing makes complex topics accessible, encouraging readers to critically evaluate the role of religion in the modern world. Purchase God Is Not Great on Amazon Money: The True Story of a Made-Up Thing Author: Jacob Goldstein Genre: Economics, History Money by Jacob Goldstein explores the history of money, tracing how something that started as a way to trade goods and services has evolved into one of the most powerful forces in the modern world. Goldstein explains the origins, transformations, and significance of money in a way that is both engaging and informative, making complex financial concepts accessible to the general reader. Why Read It? This book offers a fascinating and easy-to-read history of money and its evolution. It\u2019s a must-read for anyone interested in economics, history, or the way financial systems shape our world. Purchase Money on Amazon Mind Body Problems: Science, Subjectivity, & Who We Really Are Author: John Horgan Genre: Psychology, Neuroscience, Philosophy Mind Body Problems by John Horgan delves into the complex relationship between the mind and body, questioning how science, subjectivity, and consciousness intertwine. Horgan interviews leading scientists and philosophers to explore how they grapple with these fundamental questions, blending personal reflections with scientific insights to provide a thought-provoking examination of who we are. Why Read It? This book is ideal for those interested in the intersection of neuroscience, psychology, and philosophy. Horgan\u2019s accessible writing style and exploration of deep, existential questions make it a compelling read for anyone curious about the mind-body problem. Purchase Mind Body Problems on Amazon Impromptu: Amplifying Our Humanity Through AI Author: Reid Hoffman Genre: Technology, Artificial Intelligence Impromptu by Reid Hoffman explores how artificial intelligence (AI) can be used to amplify human potential. Hoffman, a co-founder of LinkedIn and an advocate of AI, argues that AI will not replace humans but rather enhance creativity, productivity, and problem-solving. Through thoughtful analysis and practical examples, the book presents a positive outlook on AI's role in shaping the future. Why Read It? This book is a must-read for those interested in understanding the positive potential of AI. Hoffman provides a balanced, optimistic perspective on how AI can be harnessed to improve our personal and professional lives, making it ideal for tech enthusiasts and skeptics alike. Purchase Impromptu on Amazon Superintelligence: Paths, Dangers, Strategies Author: Nick Bostrom Genre: Artificial Intelligence, Philosophy, Future Studies Superintelligence by Nick Bostrom investigates the future of artificial intelligence and the potential risks associated with the development of AI systems that surpass human intelligence. Bostrom discusses various paths that AI development could take, the dangers of uncontrolled superintelligence, and the strategies humanity can adopt to mitigate these risks. The book offers a comprehensive look at one of the most critical issues of our time. Why Read It? This book is essential for anyone interested in the future of AI and its implications for humanity. Bostrom\u2019s deep exploration of AI risks and strategies makes it a must-read for technologists, philosophers, and policy makers alike. Purchase Superintelligence on Amazon Glucose Revolution: The Life-Changing Power of Balancing Your Blood Sugar Author: Jessie Inchausp\u00e9 Genre: Health, Nutrition Glucose Revolution by Jessie Inchausp\u00e9 provides practical advice on how balancing your blood sugar can significantly improve your health, energy levels, and mood. Inchausp\u00e9 explains the science behind blood sugar spikes and offers tips on how to manage them through simple changes in diet and lifestyle. The book is filled with actionable advice, making it accessible to anyone looking to take control of their health. Why Read It? This book is essential for those interested in health and nutrition, offering scientifically-backed strategies to manage blood sugar and improve well-being. It\u2019s a practical guide that can make a lasting impact on your health. Purchase Glucose Revolution on Amazon The Talent Code: Greatness Isn't Born. It's Grown. Here's How. Author: Daniel Coyle Genre: Psychology, Personal Development The Talent Code by Daniel Coyle explores the science behind talent development and how greatness is nurtured, not born. Coyle delves into how myelin (the insulation around nerve fibers) plays a critical role in skill development and offers insights into how anyone can improve their abilities through deep practice, motivation, and master coaching. Why Read It? This book is a must-read for anyone looking to understand how talent develops and how to improve personal skills. It\u2019s perfect for athletes, musicians, educators, and anyone seeking to unlock their potential. Purchase The Talent Code on Amazon Cosmos Author: Carl Sagan Genre: Science, Astronomy, Philosophy Cosmos by Carl Sagan is a groundbreaking work that explores the vastness of the universe and humanity\u2019s place within it. Sagan eloquently discusses a range of topics from astronomy to the evolution of life, blending scientific knowledge with a sense of wonder and philosophical inquiry. The book is a companion to the acclaimed television series of the same name and is a must-read for anyone interested in science and our place in the cosmos. Why Read It? This book offers a profound and inspiring journey through the universe, combining scientific facts with philosophical reflections. Sagan\u2019s writing makes complex ideas accessible to a wide audience, sparking curiosity and awe. Purchase Cosmos on Amazon The Hunter-Gatherer's Guide to the 21st Century: Evolution and the Challenges of Modern Life Authors: Heather Heying, Bret Weinstein Genre: Science, Evolution, Social Commentary The Hunter-Gatherer's Guide to the 21st Century explores how the human brain and body, shaped by millions of years of evolution, are poorly suited to the complexities of modern life. Heather Heying and Bret Weinstein, evolutionary biologists, examine how evolutionary mismatches between our hunter-gatherer ancestors and our high-tech society impact everything from relationships to health, offering practical insights for thriving in the modern world. Why Read It? This book offers a unique evolutionary perspective on the challenges of modern life. It\u2019s a must-read for anyone interested in science, human behavior, and how our evolutionary past affects the present. Purchase The Hunter-Gatherer's Guide to the 21st Century on Amazon Build a Mathematical Mind: Even If You Think You Can't Author: Albert Rutherford Genre: Education, Mathematics, Self-Help Build a Mathematical Mind offers practical insights into how anyone can improve their mathematical thinking, even if they feel they lack natural talent in the subject. Albert Rutherford provides strategies and advice for overcoming math anxiety and building a stronger, more confident mathematical mindset, showing that everyone can learn to appreciate and excel in math. Why Read It? This book is perfect for anyone looking to boost their mathematical skills and mindset. Whether you're a student, educator, or someone who has struggled with math, Rutherford\u2019s accessible approach makes math less intimidating and more engaging. Purchase Build a Mathematical Mind on Amazon The Coming Wave: Technology, Power, and the Twenty-First Century's Greatest Dilemma Author: Mustafa Suleyman Genre: Technology, Futurism The Coming Wave by Mustafa Suleyman examines how emerging technologies such as artificial intelligence, genetic engineering, and advanced computing will shape the 21st century. Suleyman explores the ethical and societal challenges that accompany these powerful innovations, arguing that humanity must learn to control the wave of technological change before it controls us. Why Read It? This book is a must-read for anyone interested in the future of technology, power, and ethics. Suleyman provides a nuanced look at the opportunities and risks posed by emerging technologies, making it a crucial resource for technologists, policymakers, and futurists alike. Purchase The Coming Wave on Amazon Enlightenment Now: The Case for Reason, Science, Humanism, and Progress Author: Steven Pinker Genre: Science, Philosophy, History Enlightenment Now by Steven Pinker argues that the ideals of the Enlightenment\u2014reason, science, humanism, and progress\u2014are the keys to continuing human advancement. Pinker presents data-driven evidence to show that, despite widespread pessimism, the world is improving in terms of health, prosperity, safety, and overall well-being, thanks to the principles of the Enlightenment. Why Read It? This book is a powerful and optimistic defense of modernity, ideal for readers who want a hopeful perspective on the future. Pinker\u2019s work is a must-read for those interested in philosophy, science, and the forces that drive human progress. Purchase Enlightenment Now on Amazon The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power Author: Shoshana Zuboff Genre: Technology, Politics, Economics The Age of Surveillance Capitalism by Shoshana Zuboff explores how modern tech companies harvest, exploit, and monetize personal data to create unprecedented power structures. Zuboff argues that surveillance capitalism represents a new form of economic order that challenges individual autonomy, democracy, and privacy. This deeply researched work is a wake-up call about the growing power of corporations in the digital age. Why Read It? This book is essential for anyone concerned about privacy, data exploitation, and the future of democracy in the digital era. Zuboff\u2019s work provides a profound critique of the way modern capitalism operates through surveillance. Purchase The Age of Surveillance Capitalism on Amazon In Search of Schr\u00f6dinger's Cat: Quantum Physics and Reality Author: John Gribbin Genre: Science, Physics, Quantum Mechanics In Search of Schr\u00f6dinger's Cat by John Gribbin is a classic introduction to quantum mechanics, explaining the bizarre and fascinating world of subatomic particles. Gribbin unpacks the famous Schr\u00f6dinger's cat paradox and explores the implications of quantum theory for our understanding of reality, providing an accessible entry point into one of the most complex scientific fields. Why Read It? This book is perfect for readers who are curious about quantum physics and want a clear, engaging explanation of its concepts. Gribbin\u2019s ability to make complex ideas understandable makes this a must-read for anyone interested in science and the nature of reality. Purchase In Search of Schr\u00f6dinger's Cat on Amazon Essentialism: The Disciplined Pursuit of Less Author: Greg McKeown Genre: Personal Development, Self-Help, Productivity Essentialism by Greg McKeown is a guide to focusing on what truly matters by eliminating the non-essential. McKeown encourages readers to adopt a mindset of doing less, but better, and offers practical advice on how to reclaim time, energy, and focus to achieve greater results. The book helps individuals identify and pursue their highest priorities, creating a life that is both meaningful and productive. Why Read It? This book is ideal for anyone feeling overwhelmed by modern life and looking for a way to simplify and focus on what truly matters. McKeown\u2019s insights are valuable for improving both personal and professional effectiveness. Purchase Essentialism on Amazon The Chimp Paradox: The Mind Management Program to Help You Achieve Success, Confidence, and Happiness Author: Steve Peters Genre: Psychology, Personal Development The Chimp Paradox by Steve Peters introduces the concept of the \"inner chimp\" as a metaphor for the part of our brain that controls emotional impulses. Peters provides a framework for understanding how this emotional side of the brain works, helping readers learn how to manage their minds to achieve success, confidence, and happiness. The book offers practical strategies for improving emotional control, decision-making, and mental well-being. Why Read It? This book is ideal for anyone looking to better understand their own mind and improve their emotional and psychological well-being. Peters\u2019 insights are valuable for personal growth, emotional resilience, and achieving success in both personal and professional life. Purchase The Chimp Paradox on Amazon Life Time: Your Body Clock and Its Essential Roles in Good Health and Sleep Author: Russell Foster Genre: Health, Science, Sleep Life Time by Russell Foster explores the science of circadian rhythms and how our body clock influences nearly every aspect of our health. Foster explains how aligning our daily routines with our natural biological rhythms can improve sleep, productivity, and overall well-being. The book provides actionable insights into managing sleep and adopting healthier lifestyle habits. Why Read It? This book is essential for anyone interested in improving their sleep and overall health. Foster\u2019s deep dive into circadian biology makes it a practical guide for achieving better health through the power of timing. Purchase Life Time on Amazon Quiet: The Power of Introverts in a World That Can't Stop Talking Author: Susan Cain Genre: Psychology, Personal Development Quiet by Susan Cain is a groundbreaking book that highlights the power and value of introverts in a society that often rewards extroversion. Cain explores the psychology of introverts, the unique strengths they bring to the table, and the ways in which our culture undervalues their contributions. Through research and personal stories, the book advocates for a better understanding and appreciation of introverts. Why Read It? This book is essential for introverts looking to embrace their strengths and for extroverts seeking to better understand their introverted peers. Cain\u2019s work helps to redefine how we think about leadership, creativity, and social dynamics. Purchase Quiet on Amazon Other Minds: The Octopus, the Sea, and the Deep Origins of Consciousness Author: Peter Godfrey-Smith Genre: Science, Philosophy, Biology Other Minds by Peter Godfrey-Smith explores the extraordinary intelligence of octopuses and what they can teach us about the evolution of consciousness. Godfrey-Smith, a philosopher and diver, takes readers on a journey through the world of cephalopods, offering insights into the nature of intelligence, mind, and the limits of human understanding. Why Read It? This book is perfect for anyone interested in the mysteries of consciousness and the evolution of intelligent life. It provides a fascinating exploration of animal minds, particularly those of creatures that are so different from us. Purchase Other Minds on Amazon Think Like an Engineer: Inside the Minds That Are Changing the World Author: Guru Madhavan Genre: Engineering, Personal Development, Problem Solving Think Like an Engineer by Guru Madhavan offers readers a fascinating look into the minds of engineers and how they solve some of the world\u2019s most complex problems. Madhavan shares insights from his experiences in various fields, highlighting the principles of engineering that can be applied to everyday challenges. Through real-world examples, he explains how engineering thinking can improve efficiency, innovation, and creativity. Why Read It? This book is perfect for anyone looking to develop problem-solving skills or gain a better understanding of how engineers approach challenges. It\u2019s ideal for both professionals and those curious about the power of engineering thinking in daily life. Purchase Think Like an Engineer on Amazon Surrounded by Idiots: The Four Types of Human Behavior and How to Effectively Communicate with Each in Business (and in Life) Author: Thomas Erikson Genre: Psychology, Communication, Self-Help Surrounded by Idiots by Thomas Erikson presents a simple yet effective model for understanding different personality types. Using the DISC model, Erikson divides people into four types\u2014Red, Yellow, Green, and Blue\u2014each representing a different way of thinking and behaving. The book provides practical strategies for improving communication and understanding in both professional and personal interactions. Why Read It? This book is perfect for anyone looking to enhance their communication skills and better understand the people around them. Erikson\u2019s engaging approach makes complex personality dynamics accessible and applicable to everyday life. Purchase Surrounded by Idiots on Amazon Deep Utopia: The Meaning of Life Solved in a Technologically Mature World Author: Nick Bostrom Genre: Philosophy, Futurism, Ethics Deep Utopia by Nick Bostrom explores the concept of a technologically mature society that has overcome existential risks. Bostrom reflects on the ethical, philosophical, and technological advancements necessary to reach a utopian future, delving into topics like superintelligence, moral enhancements, and humanity\u2019s ultimate trajectory. Why Read It? This book is essential for those interested in futurism, ethics, and the long-term future of humanity. Bostrom\u2019s thought-provoking analysis encourages readers to consider the possibilities and responsibilities of shaping a better future. Purchase Deep Utopia on Amazon AWS Networking Fundamentals: A Practical Guide to Understand How to Build a Virtual Datacenter into the AWS Cloud Author: Toni Pasanen Genre: Cloud Computing, Networking, Technology AWS Networking Fundamentals by Toni Pasanen is a practical guide to understanding the networking aspects of Amazon Web Services (AWS). The book covers key topics such as VPC, VPNs, Subnets, and Load Balancers, helping readers build a virtual datacenter in the AWS cloud. It\u2019s ideal for IT professionals who want to gain a deep understanding of AWS networking. Why Read It? This book is perfect for IT professionals, cloud engineers, and anyone looking to master AWS networking. It provides a clear, hands-on approach to building scalable and secure networks in the cloud. Purchase AWS Networking Fundamentals on Amazon The End of the World Is Just the Beginning: Mapping the Collapse of Globalization Author: Peter Zeihan Genre: Geopolitics, Economics, Future Studies The End of the World Is Just the Beginning by Peter Zeihan explores the unraveling of global supply chains and the end of globalization as we know it. Zeihan provides an in-depth analysis of how the collapse of global interconnectedness will affect economies, industries, and societies. The book offers a glimpse into the future of regionalization and self-sufficiency. Why Read It? This book is essential for anyone interested in geopolitics, economics, and understanding the forces shaping the future. Zeihan\u2019s insight into the complexities of globalization and its potential downfall makes this a thought-provoking read. Purchase The End of the World Is Just the Beginning on Amazon The SaaS Sales Method: Sales as a Science Authors: Jacco van der Kooij and Fernando Pizarro Genre: Business, Sales, SaaS The SaaS Sales Method is a comprehensive guide to mastering sales in the software-as-a-service (SaaS) industry. Jacco van der Kooij and Fernando Pizarro provide a structured, data-driven approach to sales, making it accessible for both new and experienced sales professionals. This book breaks down the sales process into clear steps, making sales a repeatable and measurable science. Why Read It? This book is perfect for SaaS professionals looking to improve their sales techniques. It offers a data-backed method for increasing efficiency and results, essential for anyone working in enterprise sales. Purchase The SaaS Sales Method on Amazon The Inner Game of Tennis: The Classic Guide to the Mental Side of Peak Performance Author: W. Timothy Gallwey Genre: Sports Psychology, Self-Improvement The Inner Game of Tennis by W. Timothy Gallwey is a classic in sports psychology, offering insights into the mental aspects of performance. Gallwey focuses on the \"inner game\"\u2014the mental obstacles we place in our own way\u2014and how overcoming these challenges can lead to peak performance in tennis and beyond. The book has applications in sports, business, and personal development, making it timeless and widely applicable. Why Read It? This book is a must-read for anyone interested in improving their mental game, whether in sports or in everyday life. Gallwey\u2019s strategies for overcoming mental barriers are practical and transformative. Purchase The Inner Game of Tennis on Amazon Waking Up: A Guide to Spirituality Without Religion Author: Sam Harris Genre: Philosophy, Spirituality, Neuroscience Waking Up by Sam Harris is a thought-provoking exploration of spirituality through the lens of neuroscience and philosophy. Harris argues that it\u2019s possible to achieve spiritual experiences and insights without relying on religious belief. Blending neuroscience, meditation, and philosophy, Harris offers readers practical insights into mindfulness and personal transformation. Why Read It? This book is essential for those interested in the intersection of science and spirituality. Harris provides a secular guide to mindfulness and offers ways to achieve personal well-being without traditional religious frameworks. Purchase Waking Up on Amazon Read Write Own: The Path to Decentralized Digital Ownership Author: Chris Dixon Genre: Technology, Blockchain, Decentralization Read Write Own by Chris Dixon explores the shift towards decentralized digital ownership through blockchain technology and Web3. Dixon delves into the history of the internet\u2014from the read-only Web1, to the interactive Web2, and now the decentralized Web3 where individuals can truly own their digital content. The book offers insights into the transformative potential of decentralized technology for creators, entrepreneurs, and users. Why Read It? This book is essential for those looking to understand the future of the internet and digital ownership. Dixon\u2019s deep knowledge of blockchain and Web3 technology makes this a critical read for tech enthusiasts and futurists. Purchase Read Write Own on Amazon Not the most erudite or philosophically pertinent. But still, I wrote them down. Intuition is experience distilled. Unknown. When we have to change our mind about a person, we hold the inconvenience he causes us very much against him. Beyond Good and Evil Friedrich Nietzsche The human body is a network of tubes that exists to distribute resources efficiently. Some Podcast. One can adopt one set of principles in private and a different set in public without any inconsistency; all one has to do is make one\u2019s overriding principle the pursuit of self-interest, and then use ethical reasoning in public situations for the purpose of impressing others with one\u2019s impartiality, but not as a real guide to one\u2019s actions. This is hypocritical, but the hypocrisy is part of a consistent design for promoting one\u2019s own interests.\u201d Expanding Circles Peter Singer Page 144 The trivial many and the vital few. Essentialist Book & Modern Wisdom Podcast The conversation we are having with ourselves we can\u2019t have with others. Sam Harris Confidence is attractive. Confidence comes from results. And results come from skill acquisition. Unknown Don't worry everyone\u2019s pretending. Steven Pemberton. Making mistakes makes you smarter. Really fast. Hedge Podcast on NAF Just be authentic in the moment and no one can fu*k you. Unknown. I 100% guarantee we will not pay more than 10% of that. Neil Schroeder. There is a way to catch your dreams without falling asleep. Seinabo Sey We all have multitudes. Unknown Everything fails all the time. Werner Vogels (Amazon CTO). We are all struggling mortals with fleeting lives trying to be right as often as we can. Bill Clinton. I think that I shall never see A graph more lovely than a tree. A tree whose crucial property Is loop-free connectivity. A tree that must be sure to span So packets can reach every LAN. First, the root must be selected. By ID, it is elected. Least cost paths from root are traced. In the tree, these paths are placed. A mesh is made by folks like me, Then bridges find a spanning tree. Radia Perlman. WeWork will fail in catastrophic fashion before June 2023. Luke Richardson December 2022. Let chaos reign. Then reign in chaos. Andy Grove, former CEO of Intel. It takes aeons of evolution and perpetual starvation. Unknown. Is there music and art and invention? I hope you are dancing in heaven. Cause here on earth something is missing. Dancing in the sky. I know people who graduated college at 21 and didn\u2019t get a job until they were 27. I know people who graduated at 25 and got a job immediately. I know people who never went to university and found what they love at 18. I know people who have children and are single, I know people who are married and had to wait 8-10 years to be parents. I know people who are in a relationship and love someone else, I know people who love each other and aren\u2019t together, there are people waiting to love and be loved. My point is, everything in life happens according to our time, our clock. You may look at your friends and some may seem to be ahead or behind you, but they are not, they are living according to the pace of their clock, so be patient. The Minds Journal. Nobody gets through this life unscathed. Are you going to drown in your grief? We are all going to die. So we may as-well live. Long story short... they forgot that they are all brothers and sisters, co-habiting the same planet, so they kinda became delusional and imagined these invisible borders, beliefs and structures separating them, and started destroying each other and the earth they live on ... instead of just living, sharing, creating and evolving together. Internet adage. Man is the most insane species. He worships an invisible God and destroys a visible Nature. Unaware that the Nature he is destroying is the God he is worshipping. Hert Reeves. I wish people cared as much about the earth as they did about who they think created it\u2026 Internet adage. Shakespeare said: I always feel happy, You know why? Because I don't expect anything from anyone, Expectations always hurt... Life is short, So love your life, Be happy... & Keep smiling. Just live for yourself & Before you speak, Listen. Before you write, Think. Before you spend, Earn. Before you pray, Forgive. Before you hurt, Feel. Before you hate, Love. Before you quit, Try. Before you die, Live. Be Happy & Smile. Listen, Think, Earn, Forgive, Feel, Love, Live. It all started with an argument over whose God was more peace-loving, kind, and forgiving. Internet adage with image of cartoon war chaos & destruction. I do not believe anything. Most people, even the educated, think that everybody must believe something or other, that if one is not a theist, one must be a dogmatic atheist, and if one does not think Capitalism is perfect, one must believe fervently in Socialism, and if one does not have blind faith in X one must alternatively have blind faith in not-X or the reverse of X. My own opinion is that belief is the death of intelligence. Robert Anton Wilson. Luke Comment I think belief is the distillation of others' intelligence. Humans categorize and simplify, which is likely why we are unable to perceive actual reality. Evolution has abstracted us from the complexity that lays beneath our perception. The one thing I know for sure is that feelings are rarely mutual, so when they are, drop everything, forget belongings and expectations, forget the games, the two days between texts, the hard-to-gets because this is it, this is what the entire world is after and you've stumbled upon it by chance, by accident--so take a deep breath, take a step forward, now run, collide like planets in the system of a dying sun, embrace each other with both arms and let all the rules, the opinions and common sense crash down around you. Because this is love, kid, and it\u2019s all yours. Believe me, you're in for one hell of a ride, after all--this is the one thing I know for sure. Beau Taplin. I can bring you more misery than words can tell. Come take my hand, let me lead you to hell. Signed, Drugs. Do you know why I am stopping you? Well Officer, a crime requires an injured party. Seeing as there isn't one, I can assume you're attempting to manufacture my consent to a contract with the State's corporate policy in order to generate revenue as part of a racketeering scam. Police officer traffic stopping an astute person. The world is not divided between East & West. You are American, I am Iranian, we don't know each other, but we talk and we understand each other perfectly. The difference between you and your government is much bigger than the difference between you and me. And the difference between me and my government is much bigger than the difference between me and you. And our governments are very much the same. Marjane Satrapi, Iranian Graphic Novelist. The secret to finding all knowledge is to use exactly the right keywords when you google. Internet adage. I like weird people... the black sheep, the odd ducks, the rejects, the eccentrics, the loners, the lost and forgotten. More often than not, these people have the most beautiful souls. Internet adage. Only the cool kids are enlightened. Ironic Internet adage. Stress is caused by giving a fuck. Internet adage. I want to be happy but something inside me screams that I do not deserve it. HealthyPlace.com Stars can't shine without darkness. Internet adage. Imperfection is beauty, madness is genius, and it's better to be absolutely ridiculous than absolutely boring. Internet adage. The scariest thing about distance is you don't know whether they'll miss you or forget about you. The Notebook, Internet adage. One awesome thing about Eeyore is that even though he is basically clinically depressed, he still gets invited to participate in adventures and shenanigans with all of his friends. And they never expect him to pretend to feel happy, they just love him anyway, and they never leave him behind or ask him to change. David Avocado Wolfe - re Winnie the Poo. Never apologize for what you feel. It\u2019s like saying sorry for being real. Internet adage. The creative adult is the child who survived. Internet adage with image of man doing graffiti. We do not grow absolutely chronologically. We grow sometimes in one dimension, and not in another, unevenly. We grow partially. We are relative. We are mature in one realm, childish in another. The past, present and future mingle and pull us backward and forward. Or fix us in the present. We are made of layers, cells, constellations. Anais Nin. That's the way the cookie crumbles. James Rose 2003 Drawing of a cookie crumbling resin into a bed. Luke Comment James was my last remaining close friend. He died of heart failure in the year following the Covid pandemic. I miss him more than words can say. I hope everyone has or had a friend as wonderful as James. Techno-Feudalist. Yanis Varoufakis Forgetting is an essential complement to remembering. Vaclav Smil. Learning to learn. It is not enough to hear or read. You have to think it through. Broadly. This is data processing. Make and use associations. Create links between knowledge. Then you can retain information. Data processing is how to learn. Learning is about retaining. Retaining knowledge requires thought. Train your brain muscle. Improve your memory. Somewhat ironically - unknown. :material-smile:{ .bounce } There is nothing to do but take a moment to miss him. Sam Harris on Hitch. Atheism is clearing the space for better conversations. Science, Art, Culture, Philosophy. Sam Harris. A pact with the structure of existence. Jordan Peterson. We excuse ourselves into living mediocre lives. Unknown. If people knew how hard I had to work to gain this mastery, it would not seem so wonderful at all. Michelangelo. We know close to nothing, about everything. And if we embrace that we will have a better experience going through life. YouTube - From Lex I think. Or Sam Harris Pod. Nothing is true and everything is possible. Some interview - who? We should do politics specifically with a view to whats best for hundreds of years time. Nothing else. Politics for the species. Rather than generations. Luke Richardson 2023 Luke's Manifesto Maintain the status quo of Liberal Democratic Capitalism with a approximate split of 40% GNP to GDP. Spend my term preparing the institutional environment for much grander, but extremely slow burn, generational shifts. Basically do nothing remotely radical or change making. Then pass the work to the next government to implement the changes on which society has been educated, prepared for, and continuously consulted on. Reach for the lasers. Human Traffic. A salary is a drug they give you to forget your dreams. Unknown. All foundational technology gets cheaper and easier to use and ultimately proliferates far and wide. Mustafa Suleyman - DeepMind. When we have to change our mind about a person, we hold the inconvenience he causes us very much against him. Beyond Good and Evil Friedrich Nietzsche Enjoyment appears at the boundary between boredom and anxiety, when the challenges are just balanced with the persons capacity to act. Mihaly Csikszentmihalyi - Flow A man has as many social selves as there are distinct groups of persons about whose opinion he cares. He generally shows a different side of himself to each of these different groups. William James (derived from the book Quiet) The stories we tell ourselves. Dan Mcadmams Where we stumble is where our treasure lies. Besides black art, there is only automation and mechanization. Federico Garc\u00eda Lorca (1898-1936), Spanish poet and playwright \u2026people can be perfectly rational and yet perfectly self-interested. Gist Semantics: The study of meaning in language. Semantics focuses on how words, phrases, and sentences convey meaning. Grammar: The set of rules that govern the structure of sentences in a language, including word order, tense, and punctuation. Proper grammar helps ensure that language is clear and consistent. Syntax: The arrangement of words and phrases to create well-formed sentences in a language. Syntax refers to the structure of sentences and how different parts of speech are ordered. Understanding these terms helps you grasp the function of words in language, allowing you to communicate more effectively and appreciate the intricacies of how meaning is constructed. By knowing the types of words and concepts like grammar and syntax, you can better analyse, create, and understand the beauty of language. Luke Richardson is currently employed as Network Architect in London. Network Architect Hello@Lukeoson.com Linkedin +447376209455 lukeoson Acclaim Please don't hesitate to book time with my Fantasical. Book a meeting or interview with my Fantasical. Thank you. Just want to chat? I'm always happy to meet people and discuss Technology. Scheduling an interview? Awesome. Thanks. Evenings are best. Arranging a paid consulting call? My rate is $500 per hour for Network Assurance. Need a speaker for your event? I'm ready. Please reach out! Want to discuss a potential collaboration? I'm always open to new opportunities. Want to talk about climbing? Don't be silly. See you at the crag! Anything regarding my current employment at Lloret? Please contact me directly. Getting deep and meaningful? You will need to agree that... ... NOTHING is CERTAIN and EVERYTHING is POSSIBLE. \ud83c\udf89 Zoom Meeting with Luke NOW > 320 876 8436 Google Meeting with Luke NOW > Reach me at lukeoson@gmail.com or 07376 209455 Thank you. Your convenience is my priority So feel free to use any other preferred method to reach out and conduct interviews or meetings. I cancelled my subscription. If you choose to Zoom it's 40mins on free tier. Luke Richardson is currently employed as a Network Architect in London. Network Architect Hello@Lukeoson.com Linkedin +447376209455 lukeoson Acclaim Please don't hesitate to book time with my Fantasical. Luke's Employment in the Technology Industry includes WeWork & Dimension Data. Luke's Education includes a BA in Politics prior to his various Tech Industry roles. This chart shows a timeline of Luke's Professional Certifications and upcoming expiry. Luke's Career story is of ascending rigour & complexity (1) Smartly Summarised Lloret Control Systems Cisco & Aruba Greenfield Enterprise Systems Architecture. Smart Buildings & IoT. I made the decision for move on from Lloret. I'm looking for something more inspiring that embraces the paradigm shift toward Automated Infrastructure as Code. Network Design mapping Client Specifications to constraints. Requirements delivered in strict adherence to defined budget. Managed multitudinous stakeholders expectations. Built a frame of reference for future project pipelines. Delivered in strict adherence to defined timeline. WeWork Key contributor to the global Network Architecture. Circa 750 Branches spanning >100 Countries with x4 Data Centres in x3 Continents. Transition the Global Branch Network to Juniper Full Stack. Radically reduced outages & increased network performance. Accommodations for budget & logistics constraints. Enabled the Golden Config for global standardisation. Completed refresh of First Generation Branches by 2023. Key contributor to the global Network Automation & Orchestration Strategy. Much nuance here, lessons learnt and all that jazz. Incorporate the Branch Network into a code pipeline. Reduce the time to deploy a change from days to minutes. Built block by block. Source of Truth & Assurance first. Radically reduce team toil & increased Member MPS. Complete the transition to Infrastructure as Code by 2023. Owner & Keeper of Nautobot & Netbox Sources of Truth & IPFabric Network Assurance. Network to Code & IPFabric are wonderful companies - I joyfully advocate for! Built Nautobot in AWS & IPFabric as distributed On-Premise. Accurate Database of >10,000 network devices. No Diff. Cross Functional collaboration with DevOps & Security. Ensure we have viable Sources of Truth both actual & desired. Complete the transition to Infrastructure as Code by 2023. Administrative duties of Splunk Cloud Observability & Okta SSO. An unexpected void following Layoffs - I was eager to help! Be the gateway for SSO configuration & access in Network Systems. Configuration & Access verified by Cyber Compliance Team. Training & Documentation for Okta & Splunk. Ensured the Network Team had the correct access to the correct systems. Completed the transition to SSO Okta for capable Systems by 2023. Luke's Hobbies occupied much of his twenties as he pursued adventure sports. Alas, time flies, he is now 38 years old and primarily focused on his career. Luke's life tree looks like this: Luke's 2022 WeWork Performance Review If you would like a reference, Brandon Ross would be a useful starting point. Describe how Luke has successfully delivered business impact: \"Luke is exceptionally good at identifying technology business opportunities and delivering on them. Luke's management of IPFabric and Netbox have been stellar.\" Brandon Ross, Network Architecture Director, WeWork Describe how Luke could work to further elevate their business impact: \"Luke should continue his excellent progress at building relationships with other stakeholders around Wework.\" Brandon Ross, Network Architecture Director, WeWork Categorize Luke's proficiency across each impact driver: Thanks for taking the time to read my resume. Please get in touch. \ud83c\udf89 Luke's Employment in the Technology Industry includes WeWork & Dimension Data. pending pending +-------------------+ +--------------------+ | Clone Repo |-----> | Create New Branch | +-------------------+ +--------------------+ | v +--------------------+ | Make Changes | +--------------------+ | v +--------------------+ | Commit Changes | +--------------------+ | v +--------------------+ | Push to Remote | +--------------------+ | v +--------------------+ | Merge to Main/Prod| +--------------------+ pending pending pending pending pending pending pending pending IPv4 addresses are assigned by IANA (Internet Assigned Numbers Authority). They allocate routable IP addresses to ISPs (Internet Service Providers). ISPs assign routable IP addresses to customers. Google IPv6 Adoption Tracker Example IPv6 Address: Note Dropping leading zeros in IPv6 addresses still makes sense because each field in an IPv6 address is understood to be a fixed size of 16 bits, represented in hexadecimal. When you see a field like 0db8, it's clear that it represents four hexadecimal digits, even if it's written as db8. The leading zero doesn't add any additional information because the size of the field is already established. Network Congestion: Broadcast packets are sent to all devices on a network segment, regardless of whether they're the intended recipient. This means every device has to process these packets, even if they're irrelevant. On a busy network, this can lead to a lot of unnecessary data traffic, congesting the network. Resource Drain: Each device on the network must process and determine the relevance of broadcast packets. This can be a drain on resources, especially on devices that might already be running heavy tasks. It's like getting a bunch of irrelevant group emails; you have to check each one, just in case. Reduced Performance: High levels of broadcast traffic can slow down the overall network performance. Devices spend time and processing power handling these broadcasts, which could be better spent on actual data transmission relevant to their tasks. Security Concerns: Broadcasts can be a security risk. They can potentially be used for malicious activities like broadcast storms or as a method to discover devices on a network by an attacker. The goal in network design and management is, therefore, to keep broadcast traffic as minimal as possible. This can be achieved by: In essence, minimizing broadcast packets helps maintain a smoother, faster, and more secure network. It's like keeping public announcements in a big building to only the floors that need to hear them, rather than blasting them everywhere! CIDR stands for \"Classless Inter-Domain Routing.\" It's a method used for allocating IP addresses and routing Internet Protocol packets. CIDR replaced the older system based on classes A, B, and C in the 1990s. We call slash notation \"CIDR notation\" because it's a key component of Classless Inter-Domain Routing (CIDR), which is a method for allocating IP addresses and routing decisions. The slash notation is a concise way to represent an IP address and its associated routing prefix. Class A: Large networks, 0-126. 0xxxxxxx | First bit is OFF. Class B: Medium networks, 128-191. 10xxxxxx | First bit is ON, Second bit is OFF. Class C: Small networks, 192-223. 110xxxxx | First two bits are ON, Third bit is OFF. Class D: Multicast groups, 224-239. 1110xxxx | First three bits are ON, Fourth bit is OFF. Class E: Experimental use, 240-255. 1111xxxx | First four bits are ON. Luke's favourite Visual Subnet Calc from davidc.net. A common Book and associated YouTube. A common introductory source of info at How to Network.com. Lets start with a Class C network stealing 2 bits from Hosts. How about 192.168.100.0/26 Let's start with a Class B network stealing 3 bits from Hosts. How about 172.16.0.0/19 Let's start with a Class A network stealing 4 bits from Hosts. How about 10.0.0.0/12 MAC Addresses are 48 bits long. IPv6 Addresses are 128 bits long. Made of 16 Symbols More User-Friendly Than Binary Base-16 Numbering System: Hexadecimal is a base-16 system. Power of 16. Binary is Base-2: Binary is a base-2 system. Power of 2. Decimal is Base-10: Power of 10. 10 Digits! Caveman Counting. b){var w=i.offsetWidth,T=i.offsetHeight,C=o/T,k={width:w*C,height:T*C};i.parentNode.setAttribute("style","max-width: ".concat(k.width,"px")),r&&s.setAttribute("style","max-width: ".concat(k.width,"px;"))}else i.parentNode.style.maxWidth="".concat(x),r&&s.setAttribute("style","max-width: ".concat(x,";"))}}}}},{key:"reload",value:function(){this.init()}},{key:"updateNavigationClasses",value:function(){var e=this.loop();d(this.nextButton,"disabled"),d(this.prevButton,"disabled"),0==this.index&&this.elements.length-1==0?(h(this.prevButton,"disabled"),h(this.nextButton,"disabled")):0!==this.index||e?this.index!==this.elements.length-1||e||h(this.nextButton,"disabled"):h(this.prevButton,"disabled")}},{key:"loop",value:function(){var e=O(this.settings,"loopAtEnd")?this.settings.loopAtEnd:null;return e=O(this.settings,"loop")?this.settings.loop:e,e}},{key:"close",value:function(){var e=this;if(!this.lightboxOpen){if(this.events){for(var t in this.events)this.events.hasOwnProperty(t)&&this.events[t].destroy();this.events=null}return!1}if(this.closing)return!1;this.closing=!0,this.slidePlayerPause(this.activeSlide),this.fullElementsList&&(this.elements=this.fullElementsList),this.bodyHiddenChildElms.length&&o(this.bodyHiddenChildElms,(function(e){e.removeAttribute("aria-hidden")})),h(this.modal,"glightbox-closing"),g(this.overlay,"none"==this.settings.openEffect?"none":this.settings.cssEfects.fade.out),g(this.activeSlide,this.settings.cssEfects[this.settings.closeEffect].out,(function(){if(e.activeSlide=null,e.prevActiveSlideIndex=null,e.prevActiveSlide=null,e.built=!1,e.events){for(var t in e.events)e.events.hasOwnProperty(t)&&e.events[t].destroy();e.events=null}var i=document.body;d(Q,"glightbox-open"),d(i,"glightbox-open touching gdesc-open glightbox-touch glightbox-mobile gscrollbar-fixer"),e.modal.parentNode.removeChild(e.modal),e.trigger("close"),T(e.settings.onClose)&&e.settings.onClose();var n=document.querySelector(".gcss-styles");n&&n.parentNode.removeChild(n),e.lightboxOpen=!1,e.closing=null}))}},{key:"destroy",value:function(){this.close(),this.clearAllEvents(),this.baseEvents&&this.baseEvents.destroy()}},{key:"on",value:function(e,t){var i=arguments.length>2&&void 0!==arguments[2]&&arguments[2];if(!e||!T(t))throw new TypeError("Event name and callback must be defined");this.apiEvents.push({evt:e,once:i,callback:t})}},{key:"once",value:function(e,t){this.on(e,t,!0)}},{key:"trigger",value:function(e){var t=this,i=arguments.length>1&&void 0!==arguments[1]?arguments[1]:null,n=[];o(this.apiEvents,(function(t,s){var l=t.evt,o=t.once,r=t.callback;l==e&&(r(i),o&&n.push(s))})),n.length&&o(n,(function(e){return t.apiEvents.splice(e,1)}))}},{key:"clearAllEvents",value:function(){this.apiEvents.splice(0,this.apiEvents.length)}},{key:"version",value:function(){return"3.1.1"}}]),e}();return function(){var e=arguments.length>0&&void 0!==arguments[0]?arguments[0]:{},t=new te(e);return t.init(),t}}));
diff --git a/assets/javascripts/lunr/min/lunr.ar.min.js b/assets/javascripts/lunr/min/lunr.ar.min.js
new file mode 100644
index 00000000..9b06c26c
--- /dev/null
+++ b/assets/javascripts/lunr/min/lunr.ar.min.js
@@ -0,0 +1 @@
+!function(e,r){"function"==typeof define&&define.amd?define(r):"object"==typeof exports?module.exports=r():r()(e.lunr)}(this,function(){return function(e){if(void 0===e)throw new Error("Lunr is not present. Please include / require Lunr before this script.");if(void 0===e.stemmerSupport)throw new Error("Lunr stemmer support is not present. Please include / require Lunr stemmer support before this script.");e.ar=function(){this.pipeline.reset(),this.pipeline.add(e.ar.trimmer,e.ar.stopWordFilter,e.ar.stemmer),this.searchPipeline&&(this.searchPipeline.reset(),this.searchPipeline.add(e.ar.stemmer))},e.ar.wordCharacters="ء-ٛٱـ",e.ar.trimmer=e.trimmerSupport.generateTrimmer(e.ar.wordCharacters),e.Pipeline.registerFunction(e.ar.trimmer,"trimmer-ar"),e.ar.stemmer=function(){var e=this;return e.result=!1,e.preRemoved=!1,e.sufRemoved=!1,e.pre={pre1:"ف ك ب و س ل ن ا ي ت",pre2:"ال لل",pre3:"بال وال فال تال كال ولل",pre4:"فبال كبال وبال وكال"},e.suf={suf1:"ه ك ت ن ا ي",suf2:"نك نه ها وك يا اه ون ين تن تم نا وا ان كم كن ني نن ما هم هن تك ته ات يه",suf3:"تين كهم نيه نهم ونه وها يهم ونا ونك وني وهم تكم تنا تها تني تهم كما كها ناه نكم هنا تان يها",suf4:"كموه ناها ونني ونهم تكما تموه تكاه كماه ناكم ناهم نيها وننا"},e.patterns=JSON.parse('{"pt43":[{"pt":[{"c":"ا","l":1}]},{"pt":[{"c":"ا,ت,ن,ي","l":0}],"mPt":[{"c":"ف","l":0,"m":1},{"c":"ع","l":1,"m":2},{"c":"ل","l":2,"m":3}]},{"pt":[{"c":"و","l":2}],"mPt":[{"c":"ف","l":0,"m":0},{"c":"ع","l":1,"m":1},{"c":"ل","l":2,"m":3}]},{"pt":[{"c":"ا","l":2}]},{"pt":[{"c":"ي","l":2}],"mPt":[{"c":"ف","l":0,"m":0},{"c":"ع","l":1,"m":1},{"c":"ا","l":2},{"c":"ل","l":3,"m":3}]},{"pt":[{"c":"م","l":0}]}],"pt53":[{"pt":[{"c":"ت","l":0},{"c":"ا","l":2}]},{"pt":[{"c":"ا,ن,ت,ي","l":0},{"c":"ت","l":2}],"mPt":[{"c":"ا","l":0},{"c":"ف","l":1,"m":1},{"c":"ت","l":2},{"c":"ع","l":3,"m":3},{"c":"ا","l":4},{"c":"ل","l":5,"m":4}]},{"pt":[{"c":"ا","l":0},{"c":"ا","l":2}],"mPt":[{"c":"ا","l":0},{"c":"ف","l":1,"m":1},{"c":"ع","l":2,"m":3},{"c":"ل","l":3,"m":4},{"c":"ا","l":4},{"c":"ل","l":5,"m":4}]},{"pt":[{"c":"ا","l":0},{"c":"ا","l":3}],"mPt":[{"c":"ف","l":0,"m":1},{"c":"ع","l":1,"m":2},{"c":"ل","l":2,"m":4}]},{"pt":[{"c":"ا","l":3},{"c":"ن","l":4}]},{"pt":[{"c":"ت","l":0},{"c":"ي","l":3}]},{"pt":[{"c":"م","l":0},{"c":"و","l":3}]},{"pt":[{"c":"ا","l":1},{"c":"و","l":3}]},{"pt":[{"c":"و","l":1},{"c":"ا","l":2}]},{"pt":[{"c":"م","l":0},{"c":"ا","l":3}]},{"pt":[{"c":"م","l":0},{"c":"ي","l":3}]},{"pt":[{"c":"ا","l":2},{"c":"ن","l":3}]},{"pt":[{"c":"م","l":0},{"c":"ن","l":1}],"mPt":[{"c":"ا","l":0},{"c":"ن","l":1},{"c":"ف","l":2,"m":2},{"c":"ع","l":3,"m":3},{"c":"ا","l":4},{"c":"ل","l":5,"m":4}]},{"pt":[{"c":"م","l":0},{"c":"ت","l":2}],"mPt":[{"c":"ا","l":0},{"c":"ف","l":1,"m":1},{"c":"ت","l":2},{"c":"ع","l":3,"m":3},{"c":"ا","l":4},{"c":"ل","l":5,"m":4}]},{"pt":[{"c":"م","l":0},{"c":"ا","l":2}]},{"pt":[{"c":"م","l":1},{"c":"ا","l":3}]},{"pt":[{"c":"ي,ت,ا,ن","l":0},{"c":"ت","l":1}],"mPt":[{"c":"ف","l":0,"m":2},{"c":"ع","l":1,"m":3},{"c":"ا","l":2},{"c":"ل","l":3,"m":4}]},{"pt":[{"c":"ت,ي,ا,ن","l":0},{"c":"ت","l":2}],"mPt":[{"c":"ا","l":0},{"c":"ف","l":1,"m":1},{"c":"ت","l":2},{"c":"ع","l":3,"m":3},{"c":"ا","l":4},{"c":"ل","l":5,"m":4}]},{"pt":[{"c":"ا","l":2},{"c":"ي","l":3}]},{"pt":[{"c":"ا,ي,ت,ن","l":0},{"c":"ن","l":1}],"mPt":[{"c":"ا","l":0},{"c":"ن","l":1},{"c":"ف","l":2,"m":2},{"c":"ع","l":3,"m":3},{"c":"ا","l":4},{"c":"ل","l":5,"m":4}]},{"pt":[{"c":"ا","l":3},{"c":"ء","l":4}]}],"pt63":[{"pt":[{"c":"ا","l":0},{"c":"ت","l":2},{"c":"ا","l":4}]},{"pt":[{"c":"ا,ت,ن,ي","l":0},{"c":"س","l":1},{"c":"ت","l":2}],"mPt":[{"c":"ا","l":0},{"c":"س","l":1},{"c":"ت","l":2},{"c":"ف","l":3,"m":3},{"c":"ع","l":4,"m":4},{"c":"ا","l":5},{"c":"ل","l":6,"m":5}]},{"pt":[{"c":"ا,ن,ت,ي","l":0},{"c":"و","l":3}]},{"pt":[{"c":"م","l":0},{"c":"س","l":1},{"c":"ت","l":2}],"mPt":[{"c":"ا","l":0},{"c":"س","l":1},{"c":"ت","l":2},{"c":"ف","l":3,"m":3},{"c":"ع","l":4,"m":4},{"c":"ا","l":5},{"c":"ل","l":6,"m":5}]},{"pt":[{"c":"ي","l":1},{"c":"ي","l":3},{"c":"ا","l":4},{"c":"ء","l":5}]},{"pt":[{"c":"ا","l":0},{"c":"ن","l":1},{"c":"ا","l":4}]}],"pt54":[{"pt":[{"c":"ت","l":0}]},{"pt":[{"c":"ا,ي,ت,ن","l":0}],"mPt":[{"c":"ا","l":0},{"c":"ف","l":1,"m":1},{"c":"ع","l":2,"m":2},{"c":"ل","l":3,"m":3},{"c":"ر","l":4,"m":4},{"c":"ا","l":5},{"c":"ر","l":6,"m":4}]},{"pt":[{"c":"م","l":0}],"mPt":[{"c":"ا","l":0},{"c":"ف","l":1,"m":1},{"c":"ع","l":2,"m":2},{"c":"ل","l":3,"m":3},{"c":"ر","l":4,"m":4},{"c":"ا","l":5},{"c":"ر","l":6,"m":4}]},{"pt":[{"c":"ا","l":2}]},{"pt":[{"c":"ا","l":0},{"c":"ن","l":2}]}],"pt64":[{"pt":[{"c":"ا","l":0},{"c":"ا","l":4}]},{"pt":[{"c":"م","l":0},{"c":"ت","l":1}]}],"pt73":[{"pt":[{"c":"ا","l":0},{"c":"س","l":1},{"c":"ت","l":2},{"c":"ا","l":5}]}],"pt75":[{"pt":[{"c":"ا","l":0},{"c":"ا","l":5}]}]}'),e.execArray=["cleanWord","removeDiacritics","cleanAlef","removeStopWords","normalizeHamzaAndAlef","removeStartWaw","removePre432","removeEndTaa","wordCheck"],e.stem=function(){var r=0;for(e.result=!1,e.preRemoved=!1,e.sufRemoved=!1;r=q){if(s=W.limit_backward,W.limit_backward=q,W.ket=W.cursor,e=W.find_among_b(P,7))switch(W.bra=W.cursor,e){case 1:if(l()){if(i=W.limit-W.cursor,!W.eq_s_b(1,"s")&&(W.cursor=W.limit-i,!W.eq_s_b(1,"t")))break;W.slice_del()}break;case 2:W.slice_from("i");break;case 3:W.slice_del();break;case 4:W.eq_s_b(2,"gu")&&W.slice_del()}W.limit_backward=s}}function b(){var e=W.limit-W.cursor;W.find_among_b(U,5)&&(W.cursor=W.limit-e,W.ket=W.cursor,W.cursor>W.limit_backward&&(W.cursor--,W.bra=W.cursor,W.slice_del()))}function d(){for(var e,r=1;W.out_grouping_b(F,97,251);)r--;if(r<=0){if(W.ket=W.cursor,e=W.limit-W.cursor,!W.eq_s_b(1,"é")&&(W.cursor=W.limit-e,!W.eq_s_b(1,"è")))return;W.bra=W.cursor,W.slice_from("e")}}function k(){if(!w()&&(W.cursor=W.limit,!f()&&(W.cursor=W.limit,!m())))return W.cursor=W.limit,void _();W.cursor=W.limit,W.ket=W.cursor,W.eq_s_b(1,"Y")?(W.bra=W.cursor,W.slice_from("i")):(W.cursor=W.limit,W.eq_s_b(1,"ç")&&(W.bra=W.cursor,W.slice_from("c")))}var p,g,q,v=[new r("col",-1,-1),new r("par",-1,-1),new r("tap",-1,-1)],h=[new r("",-1,4),new r("I",0,1),new r("U",0,2),new r("Y",0,3)],z=[new r("iqU",-1,3),new r("abl",-1,3),new r("Ièr",-1,4),new r("ièr",-1,4),new r("eus",-1,2),new r("iv",-1,1)],y=[new r("ic",-1,2),new r("abil",-1,1),new r("iv",-1,3)],C=[new r("iqUe",-1,1),new r("atrice",-1,2),new r("ance",-1,1),new r("ence",-1,5),new r("logie",-1,3),new r("able",-1,1),new r("isme",-1,1),new r("euse",-1,11),new r("iste",-1,1),new r("ive",-1,8),new r("if",-1,8),new r("usion",-1,4),new r("ation",-1,2),new r("ution",-1,4),new r("ateur",-1,2),new r("iqUes",-1,1),new r("atrices",-1,2),new r("ances",-1,1),new r("ences",-1,5),new r("logies",-1,3),new r("ables",-1,1),new r("ismes",-1,1),new r("euses",-1,11),new r("istes",-1,1),new r("ives",-1,8),new r("ifs",-1,8),new r("usions",-1,4),new r("ations",-1,2),new r("utions",-1,4),new r("ateurs",-1,2),new r("ments",-1,15),new r("ements",30,6),new r("issements",31,12),new r("ités",-1,7),new r("ment",-1,15),new r("ement",34,6),new r("issement",35,12),new r("amment",34,13),new r("emment",34,14),new r("aux",-1,10),new r("eaux",39,9),new r("eux",-1,1),new r("ité",-1,7)],x=[new r("ira",-1,1),new r("ie",-1,1),new r("isse",-1,1),new r("issante",-1,1),new r("i",-1,1),new r("irai",4,1),new r("ir",-1,1),new r("iras",-1,1),new r("ies",-1,1),new r("îmes",-1,1),new r("isses",-1,1),new r("issantes",-1,1),new r("îtes",-1,1),new r("is",-1,1),new r("irais",13,1),new r("issais",13,1),new r("irions",-1,1),new r("issions",-1,1),new r("irons",-1,1),new r("issons",-1,1),new r("issants",-1,1),new r("it",-1,1),new r("irait",21,1),new r("issait",21,1),new r("issant",-1,1),new r("iraIent",-1,1),new r("issaIent",-1,1),new r("irent",-1,1),new r("issent",-1,1),new r("iront",-1,1),new r("ît",-1,1),new r("iriez",-1,1),new r("issiez",-1,1),new r("irez",-1,1),new r("issez",-1,1)],I=[new r("a",-1,3),new r("era",0,2),new r("asse",-1,3),new r("ante",-1,3),new r("ée",-1,2),new r("ai",-1,3),new r("erai",5,2),new r("er",-1,2),new r("as",-1,3),new r("eras",8,2),new r("âmes",-1,3),new r("asses",-1,3),new r("antes",-1,3),new r("âtes",-1,3),new r("ées",-1,2),new r("ais",-1,3),new r("erais",15,2),new r("ions",-1,1),new r("erions",17,2),new r("assions",17,3),new r("erons",-1,2),new r("ants",-1,3),new r("és",-1,2),new r("ait",-1,3),new r("erait",23,2),new r("ant",-1,3),new r("aIent",-1,3),new r("eraIent",26,2),new r("èrent",-1,2),new r("assent",-1,3),new r("eront",-1,2),new r("ât",-1,3),new r("ez",-1,2),new r("iez",32,2),new r("eriez",33,2),new r("assiez",33,3),new r("erez",32,2),new r("é",-1,2)],P=[new r("e",-1,3),new r("Ière",0,2),new r("ière",0,2),new r("ion",-1,1),new r("Ier",-1,2),new r("ier",-1,2),new r("ë",-1,4)],U=[new r("ell",-1,-1),new r("eill",-1,-1),new r("enn",-1,-1),new r("onn",-1,-1),new r("ett",-1,-1)],F=[17,65,16,1,0,0,0,0,0,0,0,0,0,0,0,128,130,103,8,5],S=[1,65,20,0,0,0,0,0,0,0,0,0,0,0,0,0,128],W=new s;this.setCurrent=function(e){W.setCurrent(e)},this.getCurrent=function(){return W.getCurrent()},this.stem=function(){var e=W.cursor;return n(),W.cursor=e,u(),W.limit_backward=e,W.cursor=W.limit,k(),W.cursor=W.limit,b(),W.cursor=W.limit,d(),W.cursor=W.limit_backward,o(),!0}};return function(e){return"function"==typeof e.update?e.update(function(e){return i.setCurrent(e),i.stem(),i.getCurrent()}):(i.setCurrent(e),i.stem(),i.getCurrent())}}(),e.Pipeline.registerFunction(e.fr.stemmer,"stemmer-fr"),e.fr.stopWordFilter=e.generateStopWordFilter("ai aie aient aies ait as au aura aurai auraient aurais aurait auras aurez auriez aurions aurons auront aux avaient avais avait avec avez aviez avions avons ayant ayez ayons c ce ceci celà ces cet cette d dans de des du elle en es est et eu eue eues eurent eus eusse eussent eusses eussiez eussions eut eux eûmes eût eûtes furent fus fusse fussent fusses fussiez fussions fut fûmes fût fûtes ici il ils j je l la le les leur leurs lui m ma mais me mes moi mon même n ne nos notre nous on ont ou par pas pour qu que quel quelle quelles quels qui s sa sans se sera serai seraient serais serait seras serez seriez serions serons seront ses soi soient sois soit sommes son sont soyez soyons suis sur t ta te tes toi ton tu un une vos votre vous y à étaient étais était étant étiez étions été étée étées étés êtes".split(" ")),e.Pipeline.registerFunction(e.fr.stopWordFilter,"stopWordFilter-fr")}});
\ No newline at end of file
diff --git a/assets/javascripts/lunr/min/lunr.he.min.js b/assets/javascripts/lunr/min/lunr.he.min.js
new file mode 100644
index 00000000..b863d3ea
--- /dev/null
+++ b/assets/javascripts/lunr/min/lunr.he.min.js
@@ -0,0 +1 @@
+!function(e,r){"function"==typeof define&&define.amd?define(r):"object"==typeof exports?module.exports=r():r()(e.lunr)}(this,function(){return function(e){if(void 0===e)throw new Error("Lunr is not present. Please include / require Lunr before this script.");if(void 0===e.stemmerSupport)throw new Error("Lunr stemmer support is not present. Please include / require Lunr stemmer support before this script.");e.he=function(){this.pipeline.reset(),this.pipeline.add(e.he.trimmer,e.he.stopWordFilter,e.he.stemmer),this.searchPipeline&&(this.searchPipeline.reset(),this.searchPipeline.add(e.he.stemmer))},e.he.wordCharacters="֑-״א-תa-zA-Za-zA-Z0-90-9",e.he.trimmer=e.trimmerSupport.generateTrimmer(e.he.wordCharacters),e.Pipeline.registerFunction(e.he.trimmer,"trimmer-he"),e.he.stemmer=function(){var e=this;return e.result=!1,e.preRemoved=!1,e.sufRemoved=!1,e.pre={pre1:"ה ו י ת",pre2:"ב כ ל מ ש כש",pre3:"הב הכ הל המ הש בש לכ",pre4:"וב וכ ול ומ וש",pre5:"מה שה כל",pre6:"מב מכ מל ממ מש",pre7:"בה בו בי בת כה כו כי כת לה לו לי לת",pre8:"ובה ובו ובי ובת וכה וכו וכי וכת ולה ולו ולי ולת"},e.suf={suf1:"ך כ ם ן נ",suf2:"ים ות וך וכ ום ון ונ הם הן יכ יך ינ ים",suf3:"תי תך תכ תם תן תנ",suf4:"ותי ותך ותכ ותם ותן ותנ",suf5:"נו כם כן הם הן",suf6:"ונו וכם וכן והם והן",suf7:"תכם תכן תנו תהם תהן",suf8:"הוא היא הם הן אני אתה את אנו אתם אתן",suf9:"ני נו כי כו כם כן תי תך תכ תם תן",suf10:"י ך כ ם ן נ ת"},e.patterns=JSON.parse('{"hebrewPatterns": [{"pt1": [{"c": "ה", "l": 0}]}, {"pt2": [{"c": "ו", "l": 0}]}, {"pt3": [{"c": "י", "l": 0}]}, {"pt4": [{"c": "ת", "l": 0}]}, {"pt5": [{"c": "מ", "l": 0}]}, {"pt6": [{"c": "ל", "l": 0}]}, {"pt7": [{"c": "ב", "l": 0}]}, {"pt8": [{"c": "כ", "l": 0}]}, {"pt9": [{"c": "ש", "l": 0}]}, {"pt10": [{"c": "כש", "l": 0}]}, {"pt11": [{"c": "בה", "l": 0}]}, {"pt12": [{"c": "וב", "l": 0}]}, {"pt13": [{"c": "וכ", "l": 0}]}, {"pt14": [{"c": "ול", "l": 0}]}, {"pt15": [{"c": "ומ", "l": 0}]}, {"pt16": [{"c": "וש", "l": 0}]}, {"pt17": [{"c": "הב", "l": 0}]}, {"pt18": [{"c": "הכ", "l": 0}]}, {"pt19": [{"c": "הל", "l": 0}]}, {"pt20": [{"c": "המ", "l": 0}]}, {"pt21": [{"c": "הש", "l": 0}]}, {"pt22": [{"c": "מה", "l": 0}]}, {"pt23": [{"c": "שה", "l": 0}]}, {"pt24": [{"c": "כל", "l": 0}]}]}'),e.execArray=["cleanWord","removeDiacritics","removeStopWords","normalizeHebrewCharacters"],e.stem=function(){var r=0;for(e.result=!1,e.preRemoved=!1,e.sufRemoved=!1;r
=a&&(r=w.limit_backward,w.limit_backward=a,w.ket=w.cursor,e=w.find_among_b(m,29),w.limit_backward=r,e))switch(w.bra=w.cursor,e){case 1:w.slice_del();break;case 2:n=w.limit-w.cursor,w.in_grouping_b(c,98,122)?w.slice_del():(w.cursor=w.limit-n,w.eq_s_b(1,"k")&&w.out_grouping_b(d,97,248)&&w.slice_del());break;case 3:w.slice_from("er")}}function t(){var e,r=w.limit-w.cursor;w.cursor>=a&&(e=w.limit_backward,w.limit_backward=a,w.ket=w.cursor,w.find_among_b(u,2)?(w.bra=w.cursor,w.limit_backward=e,w.cursor=w.limit-r,w.cursor>w.limit_backward&&(w.cursor--,w.bra=w.cursor,w.slice_del())):w.limit_backward=e)}function o(){var e,r;w.cursor>=a&&(r=w.limit_backward,w.limit_backward=a,w.ket=w.cursor,e=w.find_among_b(l,11),e?(w.bra=w.cursor,w.limit_backward=r,1==e&&w.slice_del()):w.limit_backward=r)}var s,a,m=[new r("a",-1,1),new r("e",-1,1),new r("ede",1,1),new r("ande",1,1),new r("ende",1,1),new r("ane",1,1),new r("ene",1,1),new r("hetene",6,1),new r("erte",1,3),new r("en",-1,1),new r("heten",9,1),new r("ar",-1,1),new r("er",-1,1),new r("heter",12,1),new r("s",-1,2),new r("as",14,1),new r("es",14,1),new r("edes",16,1),new r("endes",16,1),new r("enes",16,1),new r("hetenes",19,1),new r("ens",14,1),new r("hetens",21,1),new r("ers",14,1),new r("ets",14,1),new r("et",-1,1),new r("het",25,1),new r("ert",-1,3),new r("ast",-1,1)],u=[new r("dt",-1,-1),new r("vt",-1,-1)],l=[new r("leg",-1,1),new r("eleg",0,1),new r("ig",-1,1),new r("eig",2,1),new r("lig",2,1),new r("elig",4,1),new r("els",-1,1),new r("lov",-1,1),new r("elov",7,1),new r("slov",7,1),new r("hetslov",9,1)],d=[17,65,16,1,0,0,0,0,0,0,0,0,0,0,0,0,48,0,128],c=[119,125,149,1],w=new n;this.setCurrent=function(e){w.setCurrent(e)},this.getCurrent=function(){return w.getCurrent()},this.stem=function(){var r=w.cursor;return e(),w.limit_backward=r,w.cursor=w.limit,i(),w.cursor=w.limit,t(),w.cursor=w.limit,o(),!0}};return function(e){return"function"==typeof e.update?e.update(function(e){return i.setCurrent(e),i.stem(),i.getCurrent()}):(i.setCurrent(e),i.stem(),i.getCurrent())}}(),e.Pipeline.registerFunction(e.no.stemmer,"stemmer-no"),e.no.stopWordFilter=e.generateStopWordFilter("alle at av bare begge ble blei bli blir blitt både båe da de deg dei deim deira deires dem den denne der dere deres det dette di din disse ditt du dykk dykkar då eg ein eit eitt eller elles en enn er et ett etter for fordi fra før ha hadde han hans har hennar henne hennes her hjå ho hoe honom hoss hossen hun hva hvem hver hvilke hvilken hvis hvor hvordan hvorfor i ikke ikkje ikkje ingen ingi inkje inn inni ja jeg kan kom korleis korso kun kunne kva kvar kvarhelst kven kvi kvifor man mange me med medan meg meget mellom men mi min mine mitt mot mykje ned no noe noen noka noko nokon nokor nokre nå når og også om opp oss over på samme seg selv si si sia sidan siden sin sine sitt sjøl skal skulle slik so som som somme somt så sånn til um upp ut uten var vart varte ved vere verte vi vil ville vore vors vort vår være være vært å".split(" ")),e.Pipeline.registerFunction(e.no.stopWordFilter,"stopWordFilter-no")}});
\ No newline at end of file
diff --git a/assets/javascripts/lunr/min/lunr.pt.min.js b/assets/javascripts/lunr/min/lunr.pt.min.js
new file mode 100644
index 00000000..6c16996d
--- /dev/null
+++ b/assets/javascripts/lunr/min/lunr.pt.min.js
@@ -0,0 +1,18 @@
+/*!
+ * Lunr languages, `Portuguese` language
+ * https://github.com/MihaiValentin/lunr-languages
+ *
+ * Copyright 2014, Mihai Valentin
+ * http://www.mozilla.org/MPL/
+ */
+/*!
+ * based on
+ * Snowball JavaScript Library v0.3
+ * http://code.google.com/p/urim/
+ * http://snowball.tartarus.org/
+ *
+ * Copyright 2010, Oleg Mazko
+ * http://www.mozilla.org/MPL/
+ */
+
+!function(e,r){"function"==typeof define&&define.amd?define(r):"object"==typeof exports?module.exports=r():r()(e.lunr)}(this,function(){return function(e){if(void 0===e)throw new Error("Lunr is not present. Please include / require Lunr before this script.");if(void 0===e.stemmerSupport)throw new Error("Lunr stemmer support is not present. Please include / require Lunr stemmer support before this script.");e.pt=function(){this.pipeline.reset(),this.pipeline.add(e.pt.trimmer,e.pt.stopWordFilter,e.pt.stemmer),this.searchPipeline&&(this.searchPipeline.reset(),this.searchPipeline.add(e.pt.stemmer))},e.pt.wordCharacters="A-Za-zªºÀ-ÖØ-öø-ʸˠ-ˤᴀ-ᴥᴬ-ᵜᵢ-ᵥᵫ-ᵷᵹ-ᶾḀ-ỿⁱⁿₐ-ₜKÅℲⅎⅠ-ↈⱠ-ⱿꜢ-ꞇꞋ-ꞭꞰ-ꞷꟷ-ꟿꬰ-ꭚꭜ-ꭤff-stA-Za-z",e.pt.trimmer=e.trimmerSupport.generateTrimmer(e.pt.wordCharacters),e.Pipeline.registerFunction(e.pt.trimmer,"trimmer-pt"),e.pt.stemmer=function(){var r=e.stemmerSupport.Among,s=e.stemmerSupport.SnowballProgram,n=new function(){function e(){for(var e;;){if(z.bra=z.cursor,e=z.find_among(k,3))switch(z.ket=z.cursor,e){case 1:z.slice_from("a~");continue;case 2:z.slice_from("o~");continue;case 3:if(z.cursor>=z.limit)break;z.cursor++;continue}break}}function n(){if(z.out_grouping(y,97,250)){for(;!z.in_grouping(y,97,250);){if(z.cursor>=z.limit)return!0;z.cursor++}return!1}return!0}function i(){if(z.in_grouping(y,97,250))for(;!z.out_grouping(y,97,250);){if(z.cursor>=z.limit)return!1;z.cursor++}return g=z.cursor,!0}function o(){var e,r,s=z.cursor;if(z.in_grouping(y,97,250))if(e=z.cursor,n()){if(z.cursor=e,i())return}else g=z.cursor;if(z.cursor=s,z.out_grouping(y,97,250)){if(r=z.cursor,n()){if(z.cursor=r,!z.in_grouping(y,97,250)||z.cursor>=z.limit)return;z.cursor++}g=z.cursor}}function t(){for(;!z.in_grouping(y,97,250);){if(z.cursor>=z.limit)return!1;z.cursor++}for(;!z.out_grouping(y,97,250);){if(z.cursor>=z.limit)return!1;z.cursor++}return!0}function a(){var e=z.cursor;g=z.limit,b=g,h=g,o(),z.cursor=e,t()&&(b=z.cursor,t()&&(h=z.cursor))}function u(){for(var e;;){if(z.bra=z.cursor,e=z.find_among(q,3))switch(z.ket=z.cursor,e){case 1:z.slice_from("ã");continue;case 2:z.slice_from("õ");continue;case 3:if(z.cursor>=z.limit)break;z.cursor++;continue}break}}function w(){return g<=z.cursor}function m(){return b<=z.cursor}function c(){return h<=z.cursor}function l(){var e;if(z.ket=z.cursor,!(e=z.find_among_b(F,45)))return!1;switch(z.bra=z.cursor,e){case 1:if(!c())return!1;z.slice_del();break;case 2:if(!c())return!1;z.slice_from("log");break;case 3:if(!c())return!1;z.slice_from("u");break;case 4:if(!c())return!1;z.slice_from("ente");break;case 5:if(!m())return!1;z.slice_del(),z.ket=z.cursor,e=z.find_among_b(j,4),e&&(z.bra=z.cursor,c()&&(z.slice_del(),1==e&&(z.ket=z.cursor,z.eq_s_b(2,"at")&&(z.bra=z.cursor,c()&&z.slice_del()))));break;case 6:if(!c())return!1;z.slice_del(),z.ket=z.cursor,e=z.find_among_b(C,3),e&&(z.bra=z.cursor,1==e&&c()&&z.slice_del());break;case 7:if(!c())return!1;z.slice_del(),z.ket=z.cursor,e=z.find_among_b(P,3),e&&(z.bra=z.cursor,1==e&&c()&&z.slice_del());break;case 8:if(!c())return!1;z.slice_del(),z.ket=z.cursor,z.eq_s_b(2,"at")&&(z.bra=z.cursor,c()&&z.slice_del());break;case 9:if(!w()||!z.eq_s_b(1,"e"))return!1;z.slice_from("ir")}return!0}function f(){var e,r;if(z.cursor>=g){if(r=z.limit_backward,z.limit_backward=g,z.ket=z.cursor,e=z.find_among_b(S,120))return z.bra=z.cursor,1==e&&z.slice_del(),z.limit_backward=r,!0;z.limit_backward=r}return!1}function d(){var e;z.ket=z.cursor,(e=z.find_among_b(W,7))&&(z.bra=z.cursor,1==e&&w()&&z.slice_del())}function v(e,r){if(z.eq_s_b(1,e)){z.bra=z.cursor;var s=z.limit-z.cursor;if(z.eq_s_b(1,r))return z.cursor=z.limit-s,w()&&z.slice_del(),!1}return!0}function p(){var e;if(z.ket=z.cursor,e=z.find_among_b(L,4))switch(z.bra=z.cursor,e){case 1:w()&&(z.slice_del(),z.ket=z.cursor,z.limit-z.cursor,v("u","g")&&v("i","c"));break;case 2:z.slice_from("c")}}function _(){if(!l()&&(z.cursor=z.limit,!f()))return z.cursor=z.limit,void d();z.cursor=z.limit,z.ket=z.cursor,z.eq_s_b(1,"i")&&(z.bra=z.cursor,z.eq_s_b(1,"c")&&(z.cursor=z.limit,w()&&z.slice_del()))}var h,b,g,k=[new r("",-1,3),new r("ã",0,1),new r("õ",0,2)],q=[new r("",-1,3),new r("a~",0,1),new r("o~",0,2)],j=[new r("ic",-1,-1),new r("ad",-1,-1),new r("os",-1,-1),new r("iv",-1,1)],C=[new r("ante",-1,1),new r("avel",-1,1),new r("ível",-1,1)],P=[new r("ic",-1,1),new r("abil",-1,1),new r("iv",-1,1)],F=[new r("ica",-1,1),new r("ância",-1,1),new r("ência",-1,4),new r("ira",-1,9),new r("adora",-1,1),new r("osa",-1,1),new r("ista",-1,1),new r("iva",-1,8),new r("eza",-1,1),new r("logía",-1,2),new r("idade",-1,7),new r("ante",-1,1),new r("mente",-1,6),new r("amente",12,5),new r("ável",-1,1),new r("ível",-1,1),new r("ución",-1,3),new r("ico",-1,1),new r("ismo",-1,1),new r("oso",-1,1),new r("amento",-1,1),new r("imento",-1,1),new r("ivo",-1,8),new r("aça~o",-1,1),new r("ador",-1,1),new r("icas",-1,1),new r("ências",-1,4),new r("iras",-1,9),new r("adoras",-1,1),new r("osas",-1,1),new r("istas",-1,1),new r("ivas",-1,8),new r("ezas",-1,1),new r("logías",-1,2),new r("idades",-1,7),new r("uciones",-1,3),new r("adores",-1,1),new r("antes",-1,1),new r("aço~es",-1,1),new r("icos",-1,1),new r("ismos",-1,1),new r("osos",-1,1),new r("amentos",-1,1),new r("imentos",-1,1),new r("ivos",-1,8)],S=[new r("ada",-1,1),new r("ida",-1,1),new r("ia",-1,1),new r("aria",2,1),new r("eria",2,1),new r("iria",2,1),new r("ara",-1,1),new r("era",-1,1),new r("ira",-1,1),new r("ava",-1,1),new r("asse",-1,1),new r("esse",-1,1),new r("isse",-1,1),new r("aste",-1,1),new r("este",-1,1),new r("iste",-1,1),new r("ei",-1,1),new r("arei",16,1),new r("erei",16,1),new r("irei",16,1),new r("am",-1,1),new r("iam",20,1),new r("ariam",21,1),new r("eriam",21,1),new r("iriam",21,1),new r("aram",20,1),new r("eram",20,1),new r("iram",20,1),new r("avam",20,1),new r("em",-1,1),new r("arem",29,1),new r("erem",29,1),new r("irem",29,1),new r("assem",29,1),new r("essem",29,1),new r("issem",29,1),new r("ado",-1,1),new r("ido",-1,1),new r("ando",-1,1),new r("endo",-1,1),new r("indo",-1,1),new r("ara~o",-1,1),new r("era~o",-1,1),new r("ira~o",-1,1),new r("ar",-1,1),new r("er",-1,1),new r("ir",-1,1),new r("as",-1,1),new r("adas",47,1),new r("idas",47,1),new r("ias",47,1),new r("arias",50,1),new r("erias",50,1),new r("irias",50,1),new r("aras",47,1),new r("eras",47,1),new r("iras",47,1),new r("avas",47,1),new r("es",-1,1),new r("ardes",58,1),new r("erdes",58,1),new r("irdes",58,1),new r("ares",58,1),new r("eres",58,1),new r("ires",58,1),new r("asses",58,1),new r("esses",58,1),new r("isses",58,1),new r("astes",58,1),new r("estes",58,1),new r("istes",58,1),new r("is",-1,1),new r("ais",71,1),new r("eis",71,1),new r("areis",73,1),new r("ereis",73,1),new r("ireis",73,1),new r("áreis",73,1),new r("éreis",73,1),new r("íreis",73,1),new r("ásseis",73,1),new r("ésseis",73,1),new r("ísseis",73,1),new r("áveis",73,1),new r("íeis",73,1),new r("aríeis",84,1),new r("eríeis",84,1),new r("iríeis",84,1),new r("ados",-1,1),new r("idos",-1,1),new r("amos",-1,1),new r("áramos",90,1),new r("éramos",90,1),new r("íramos",90,1),new r("ávamos",90,1),new r("íamos",90,1),new r("aríamos",95,1),new r("eríamos",95,1),new r("iríamos",95,1),new r("emos",-1,1),new r("aremos",99,1),new r("eremos",99,1),new r("iremos",99,1),new r("ássemos",99,1),new r("êssemos",99,1),new r("íssemos",99,1),new r("imos",-1,1),new r("armos",-1,1),new r("ermos",-1,1),new r("irmos",-1,1),new r("ámos",-1,1),new r("arás",-1,1),new r("erás",-1,1),new r("irás",-1,1),new r("eu",-1,1),new r("iu",-1,1),new r("ou",-1,1),new r("ará",-1,1),new r("erá",-1,1),new r("irá",-1,1)],W=[new r("a",-1,1),new r("i",-1,1),new r("o",-1,1),new r("os",-1,1),new r("á",-1,1),new r("í",-1,1),new r("ó",-1,1)],L=[new r("e",-1,1),new r("ç",-1,2),new r("é",-1,1),new r("ê",-1,1)],y=[17,65,16,0,0,0,0,0,0,0,0,0,0,0,0,0,3,19,12,2],z=new s;this.setCurrent=function(e){z.setCurrent(e)},this.getCurrent=function(){return z.getCurrent()},this.stem=function(){var r=z.cursor;return e(),z.cursor=r,a(),z.limit_backward=r,z.cursor=z.limit,_(),z.cursor=z.limit,p(),z.cursor=z.limit_backward,u(),!0}};return function(e){return"function"==typeof e.update?e.update(function(e){return n.setCurrent(e),n.stem(),n.getCurrent()}):(n.setCurrent(e),n.stem(),n.getCurrent())}}(),e.Pipeline.registerFunction(e.pt.stemmer,"stemmer-pt"),e.pt.stopWordFilter=e.generateStopWordFilter("a ao aos aquela aquelas aquele aqueles aquilo as até com como da das de dela delas dele deles depois do dos e ela elas ele eles em entre era eram essa essas esse esses esta estamos estas estava estavam este esteja estejam estejamos estes esteve estive estivemos estiver estivera estiveram estiverem estivermos estivesse estivessem estivéramos estivéssemos estou está estávamos estão eu foi fomos for fora foram forem formos fosse fossem fui fôramos fôssemos haja hajam hajamos havemos hei houve houvemos houver houvera houveram houverei houverem houveremos houveria houveriam houvermos houverá houverão houveríamos houvesse houvessem houvéramos houvéssemos há hão isso isto já lhe lhes mais mas me mesmo meu meus minha minhas muito na nas nem no nos nossa nossas nosso nossos num numa não nós o os ou para pela pelas pelo pelos por qual quando que quem se seja sejam sejamos sem serei seremos seria seriam será serão seríamos seu seus somos sou sua suas são só também te tem temos tenha tenham tenhamos tenho terei teremos teria teriam terá terão teríamos teu teus teve tinha tinham tive tivemos tiver tivera tiveram tiverem tivermos tivesse tivessem tivéramos tivéssemos tu tua tuas tém tínhamos um uma você vocês vos à às éramos".split(" ")),e.Pipeline.registerFunction(e.pt.stopWordFilter,"stopWordFilter-pt")}});
\ No newline at end of file
diff --git a/assets/javascripts/lunr/min/lunr.ro.min.js b/assets/javascripts/lunr/min/lunr.ro.min.js
new file mode 100644
index 00000000..72771401
--- /dev/null
+++ b/assets/javascripts/lunr/min/lunr.ro.min.js
@@ -0,0 +1,18 @@
+/*!
+ * Lunr languages, `Romanian` language
+ * https://github.com/MihaiValentin/lunr-languages
+ *
+ * Copyright 2014, Mihai Valentin
+ * http://www.mozilla.org/MPL/
+ */
+/*!
+ * based on
+ * Snowball JavaScript Library v0.3
+ * http://code.google.com/p/urim/
+ * http://snowball.tartarus.org/
+ *
+ * Copyright 2010, Oleg Mazko
+ * http://www.mozilla.org/MPL/
+ */
+
+!function(e,i){"function"==typeof define&&define.amd?define(i):"object"==typeof exports?module.exports=i():i()(e.lunr)}(this,function(){return function(e){if(void 0===e)throw new Error("Lunr is not present. Please include / require Lunr before this script.");if(void 0===e.stemmerSupport)throw new Error("Lunr stemmer support is not present. Please include / require Lunr stemmer support before this script.");e.ro=function(){this.pipeline.reset(),this.pipeline.add(e.ro.trimmer,e.ro.stopWordFilter,e.ro.stemmer),this.searchPipeline&&(this.searchPipeline.reset(),this.searchPipeline.add(e.ro.stemmer))},e.ro.wordCharacters="A-Za-zªºÀ-ÖØ-öø-ʸˠ-ˤᴀ-ᴥᴬ-ᵜᵢ-ᵥᵫ-ᵷᵹ-ᶾḀ-ỿⁱⁿₐ-ₜKÅℲⅎⅠ-ↈⱠ-ⱿꜢ-ꞇꞋ-ꞭꞰ-ꞷꟷ-ꟿꬰ-ꭚꭜ-ꭤff-stA-Za-z",e.ro.trimmer=e.trimmerSupport.generateTrimmer(e.ro.wordCharacters),e.Pipeline.registerFunction(e.ro.trimmer,"trimmer-ro"),e.ro.stemmer=function(){var i=e.stemmerSupport.Among,r=e.stemmerSupport.SnowballProgram,n=new function(){function e(e,i){L.eq_s(1,e)&&(L.ket=L.cursor,L.in_grouping(W,97,259)&&L.slice_from(i))}function n(){for(var i,r;;){if(i=L.cursor,L.in_grouping(W,97,259)&&(r=L.cursor,L.bra=r,e("u","U"),L.cursor=r,e("i","I")),L.cursor=i,L.cursor>=L.limit)break;L.cursor++}}function t(){if(L.out_grouping(W,97,259)){for(;!L.in_grouping(W,97,259);){if(L.cursor>=L.limit)return!0;L.cursor++}return!1}return!0}function a(){if(L.in_grouping(W,97,259))for(;!L.out_grouping(W,97,259);){if(L.cursor>=L.limit)return!0;L.cursor++}return!1}function o(){var e,i,r=L.cursor;if(L.in_grouping(W,97,259)){if(e=L.cursor,!t())return void(h=L.cursor);if(L.cursor=e,!a())return void(h=L.cursor)}L.cursor=r,L.out_grouping(W,97,259)&&(i=L.cursor,t()&&(L.cursor=i,L.in_grouping(W,97,259)&&L.cursor=e;r--){var n=this.uncheckedNodes[r],i=n.child.toString();i in this.minimizedNodes?n.parent.edges[n.char]=this.minimizedNodes[i]:(n.child._str=i,this.minimizedNodes[i]=n.child),this.uncheckedNodes.pop()}};t.Index=function(e){this.invertedIndex=e.invertedIndex,this.fieldVectors=e.fieldVectors,this.tokenSet=e.tokenSet,this.fields=e.fields,this.pipeline=e.pipeline},t.Index.prototype.search=function(e){return this.query(function(r){var n=new t.QueryParser(e,r);n.parse()})},t.Index.prototype.query=function(e){for(var r=new t.Query(this.fields),n=Object.create(null),i=Object.create(null),s=Object.create(null),o=Object.create(null),a=Object.create(null),u=0;u
+
+
+
+
+
+
+
+
+
+
+
+
+
+ The Greatest Shows on Earth
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ My Life Story - Whoami
+
+My Life Story - Whoami - coming soon.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ .
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Behave: The Biology of Humans at Our Best and Worst
+Author: Robert Sapolsky
+Listen to Luke read this Post
+
+Gist
+
+
+Summary
+Terms & Concepts
+
+
+
+
+Ideas
+
+
+Thoughts
+
+
+Concluding Remark
+Whiteboard
+
+Quotes
+
+
+Reference Content
+Review Status
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Life As No One Knows It: The Physics of Life's Emergence
+Author: Sara Imari Walker
+Listen to Luke read this Post
+Gist
+
+
+Summary
+Terms & Concepts
+
+
+
+
+
+
+
+
+Ideas
+
+
+Thoughts
+
+
+Concluding Remark
+Whiteboard
+
+Quotes
+
+
+Reference Content
+Review Status
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ The Fourth Turning: An Analysis of Cyclical History
+Authors: William Strauss & Neil Howe
+Listen to Luke read this Post
+Gist
+
+
+Summary
+Terms & Concepts
+
+
+
+
+
+
+Ideas
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Thoughts
+
+
+Concluding Remark
+Whiteboard
+
+Quotes
+
+
+Reference Content
+Review Status
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ AutoCon Reflections
+
+
Side Note: Help Me Understand the Money Flow - RFC
+
+
+NAFs Central Premise
+
+
+graph LR
+ A[Plan] --> B[Build] --> C[Operate] --> D[BLAH] --> E[to Infinity & Back]
+Dinesh the Contrarian
+
+
+Tools 2.0
, a theme that continued in discussions throughout the conference. I presume his unsaid rift here is “Oh, SuzieQ, baby, (we should) love you”. And we really do, so Thank You!
+Claudia to the Moon
+
+
+
+Wim Kubed the Network
+
+
+
+
+
Automation - Lost in the Wash?
+
+Peter and the Pipedream
+An controversial take - I might get cancelled. It's supposed to be good natured. Trust.
+ There is loads more nuance as i'm well aware there is a small segment of our profession that actually build the products or engineer very large and crazy complex networks. But the vast swathe of network engineers are working for small time companies or public bodies flipping ports and tickets for a living. I suspect as people drift toward seniority much of this is lost. I think what i'm saying here is please bear in mind you lot are the cerebral few. (Although i'd also note many of the best minds likely consider NAF a community of trivialities so i do need to refine my arguments here.)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ 2021
+ The Greatest Shows on Earth
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ 2023
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ 2024
+ AutoCon Reflections
+
Side Note: Help Me Understand the Money Flow - RFC
+
+
+NAFs Central Premise
+The Fourth Turning: An Analysis of Cyclical History
+Authors: William Strauss & Neil Howe
+Listen to Luke read this Post
+Gist
+
+
+Summary
+Life As No One Knows It: The Physics of Life's Emergence
+Author: Sara Imari Walker
+Listen to Luke read this Post
+Gist
+
+
+Summary
+Behave: The Biology of Humans at Our Best and Worst
+Author: Robert Sapolsky
+Listen to Luke read this Post
+
+Gist
+
+
+Summary
+.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Book-Review
+ The Fourth Turning: An Analysis of Cyclical History
+Authors: William Strauss & Neil Howe
+Listen to Luke read this Post
+Gist
+
+
+Summary
+Life As No One Knows It: The Physics of Life's Emergence
+Author: Sara Imari Walker
+Listen to Luke read this Post
+Gist
+
+
+Summary
+Behave: The Biology of Humans at Our Best and Worst
+Author: Robert Sapolsky
+Listen to Luke read this Post
+
+Gist
+
+
+Summary
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Event-Review
+ AutoCon Reflections
+
Side Note: Help Me Understand the Money Flow - RFC
+
+
+NAFs Central Premise
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Media
+ The Greatest Shows on Earth
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Professional-Profile
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ AutoCon Reflections
+
Side Note: Help Me Understand the Money Flow - RFC
+
+
+NAFs Central Premise
+The Fourth Turning: An Analysis of Cyclical History
+Authors: William Strauss & Neil Howe
+Listen to Luke read this Post
+Gist
+
+
+Summary
+Life As No One Knows It: The Physics of Life's Emergence
+Author: Sara Imari Walker
+Listen to Luke read this Post
+Gist
+
+
+Summary
+Behave: The Biology of Humans at Our Best and Worst
+Author: Robert Sapolsky
+Listen to Luke read this Post
+
+Gist
+
+
+Summary
+.
+
+
+ The Greatest Shows on Earth
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ My Bookshelf
+
+
+Team of Rivals
+
+
+
+
+
+Genre: Biography, History
+
+
+
+Getting Better
+
+
+
+
+
+Genre: Self-Help, Psychology
+
+
+
+The Expanding Circle
+
+
+
+
+
+Genre: Philosophy, Ethics
+
+
+
+Breaking Open the Head
+
+
+
+
+
+Genre: Spirituality, Anthropology
+
+
+
+Lifespan
+
+
+
+
+
+Genre: Science, Health, Longevity
+
+
+
+Atomic Habits
+
+
+
+
+
+Genre: Self-Help, Psychology
+
+
+
+Terraform: Up & Running
+
+
+
+
+
+Genre: Technology, DevOps
+
+
+
+Learning Go
+
+
+
+
+
+Genre: Technology, Programming
+
+
+
+Network Programmability and Automation
+
+
+
+
+
+Genre: Technology, Networking
+
+
+The Phoenix Project
+
+
+
+
+
+Genre: Technology, DevOps, Business
+
+
+
+The Staff Engineer's Path
+
+
+
+
+
+Genre: Technology, Engineering Leadership
+
+
+
+Energy and Civilization
+
+
+
+
+
+Genre: History, Science
+
+
+
+The Progress Paradox
+
+
+
+
+
+Genre: Sociology, Psychology
+
+
+
+The Rational Optimist
+
+
+
+
+
+Genre: Economics, History, Sociology
+
+
+
+The Cosmic Serpent
+
+
+
+
+
+Genre: Anthropology, Biology, Spirituality
+
+
+
+The Greatest Show on Earth
+
+
+
+
+
+Genre: Science, Biology, Evolution
+
+
+
+Sapiens
+
+
+
+
+
+Genre: History, Anthropology, Sociology
+
+
+
+The Ten Types of Human
+
+
+
+
+
+Genre: Psychology, Sociology, Anthropology
+
+
+
+On Anarchism
+
+
+
+
+
+Genre: Politics, Philosophy
+
+
+
+God Is Not Great
+
+
+
+
+
+
+
+
+Money
+
+
+
+
+
+Genre: Economics, History
+
+
+
+Mind Body Problems
+
+
+
+
+
+Genre: Psychology, Neuroscience, Philosophy
+
+
+
+Impromptu
+
+
+
+
+
+Genre: Technology, Artificial Intelligence
+
+
+
+Superintelligence
+
+
+
+
+
+Genre: Artificial Intelligence, Philosophy, Future Studies
+
+
+
+Glucose Revolution
+
+
+
+
+
+Genre: Health, Nutrition
+
+
+
+The Talent Code
+
+
+
+
+
+Genre: Psychology, Personal Development
+
+
+
+Cosmos
+
+
+
+
+
+Genre: Science, Astronomy, Philosophy
+
+
+
+The Hunter-Gatherer's Guide to the 21st Century
+
+
+
+
+
+Genre: Science, Evolution, Social Commentary
+
+
+Build a Mathematical Mind
+
+
+
+
+
+Genre: Education, Mathematics, Self-Help
+
+
+
+The Coming Wave
+
+
+
+
+
+Genre: Technology, Futurism
+
+
+
+Enlightenment Now
+
+
+
+
+
+Genre: Science, Philosophy, History
+
+
+
+The Age of Surveillance Capitalism
+
+
+
+
+
+Genre: Technology, Politics, Economics
+
+
+
+In Search of Schrödinger's Cat
+
+
+
+
+
+Genre: Science, Physics, Quantum Mechanics
+
+
+
+Essentialism
+
+
+
+
+
+Genre: Personal Development, Self-Help, Productivity
+
+
+
+The Chimp Paradox
+
+
+
+
+
+Genre: Psychology, Personal Development
+
+
+
+Life Time
+
+
+
+
+
+Genre: Health, Science, Sleep
+
+
+
+Quiet
+
+
+
+
+
+Genre: Psychology, Personal Development
+
+
+
+Other Minds
+
+
+
+
+
+Genre: Science, Philosophy, Biology
+
+
+
+Think Like an Engineer
+
+
+
+
+
+Genre: Engineering, Personal Development, Problem Solving
+
+
+
+Surrounded by Idiots
+
+
+
+
+
+Genre: Psychology, Communication, Self-Help
+
+
+
+Deep Utopia
+
+
+
+
+
+Genre: Philosophy, Futurism, Ethics
+
+
+
+AWS Networking Fundamentals
+
+
+
+
+
+Genre: Cloud Computing, Networking, Technology
+
+
+
+The End of the World Is Just the Beginning
+
+
+
+
+
+Genre: Geopolitics, Economics, Future Studies
+
+
+The SaaS Sales Method
+
+
+
+
+
+Genre: Business, Sales, SaaS
+
+
+
+The Inner Game of Tennis
+
+
+
+
+
+Genre: Sports Psychology, Self-Improvement
+
+
+
+Waking Up
+
+
+
+
+
+Genre: Philosophy, Spirituality, Neuroscience
+
+
+
+Read Write Own
+
+
+
+
+
+Genre: Technology, Blockchain, Decentralization
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Luke Richardson is Available for Hire
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+While i have you, please do remember ...
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Welcome to Lukeoson Labs
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ My Quote Collection
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+A graph more lovely than a tree.
+A tree whose crucial property
+Is loop-free connectivity.
+A tree that must be sure to span
+So packets can reach every LAN.
+First, the root must be selected.
+By ID, it is elected.
+Least cost paths from root are traced.
+In the tree, these paths are placed.
+A mesh is made by folks like me,
+Then bridges find a spanning tree.
+Radia Perlman.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
While i have you, please do remember ...
"},{"location":"books/","title":"My Book Shelf","text":"
"},{"location":"books/#getting-better","title":"Getting Better","text":"
"},{"location":"books/#the-expanding-circle","title":"The Expanding Circle","text":"
"},{"location":"books/#breaking-open-the-head","title":"Breaking Open the Head","text":"
"},{"location":"books/#lifespan","title":"Lifespan","text":"
"},{"location":"books/#atomic-habits","title":"Atomic Habits","text":"
"},{"location":"books/#terraform-up-running","title":"Terraform: Up & Running","text":"
"},{"location":"books/#learning-go","title":"Learning Go","text":"
"},{"location":"books/#network-programmability-and-automation","title":"Network Programmability and Automation","text":"
"},{"location":"books/#the-phoenix-project","title":"The Phoenix Project","text":"
"},{"location":"books/#the-staff-engineers-path","title":"The Staff Engineer's Path","text":"
"},{"location":"books/#energy-and-civilization","title":"Energy and Civilization","text":"
"},{"location":"books/#the-progress-paradox","title":"The Progress Paradox","text":"
"},{"location":"books/#the-rational-optimist","title":"The Rational Optimist","text":"
"},{"location":"books/#the-cosmic-serpent","title":"The Cosmic Serpent","text":"
"},{"location":"books/#the-greatest-show-on-earth","title":"The Greatest Show on Earth","text":"
"},{"location":"books/#sapiens","title":"Sapiens","text":"
"},{"location":"books/#the-ten-types-of-human","title":"The Ten Types of Human","text":"
"},{"location":"books/#on-anarchism","title":"On Anarchism","text":"
"},{"location":"books/#god-is-not-great","title":"God Is Not Great","text":"
"},{"location":"books/#money","title":"Money","text":"
"},{"location":"books/#mind-body-problems","title":"Mind Body Problems","text":"
"},{"location":"books/#impromptu","title":"Impromptu","text":"
"},{"location":"books/#superintelligence","title":"Superintelligence","text":"
"},{"location":"books/#glucose-revolution","title":"Glucose Revolution","text":"
"},{"location":"books/#the-talent-code","title":"The Talent Code","text":"
"},{"location":"books/#cosmos","title":"Cosmos","text":"
"},{"location":"books/#the-hunter-gatherers-guide-to-the-21st-century","title":"The Hunter-Gatherer's Guide to the 21st Century","text":"
"},{"location":"books/#build-a-mathematical-mind","title":"Build a Mathematical Mind","text":"
"},{"location":"books/#the-coming-wave","title":"The Coming Wave","text":"
"},{"location":"books/#enlightenment-now","title":"Enlightenment Now","text":"
"},{"location":"books/#the-age-of-surveillance-capitalism","title":"The Age of Surveillance Capitalism","text":"
"},{"location":"books/#in-search-of-schrodingers-cat","title":"In Search of Schr\u00f6dinger's Cat","text":"
"},{"location":"books/#essentialism","title":"Essentialism","text":"
"},{"location":"books/#the-chimp-paradox","title":"The Chimp Paradox","text":"
"},{"location":"books/#life-time","title":"Life Time","text":"
"},{"location":"books/#quiet","title":"Quiet","text":"
"},{"location":"books/#other-minds","title":"Other Minds","text":"
"},{"location":"books/#think-like-an-engineer","title":"Think Like an Engineer","text":"
"},{"location":"books/#surrounded-by-idiots","title":"Surrounded by Idiots","text":"
"},{"location":"books/#deep-utopia","title":"Deep Utopia","text":"
"},{"location":"books/#aws-networking-fundamentals","title":"AWS Networking Fundamentals","text":"
"},{"location":"books/#the-end-of-the-world-is-just-the-beginning","title":"The End of the World Is Just the Beginning","text":"
"},{"location":"books/#the-saas-sales-method","title":"The SaaS Sales Method","text":"
"},{"location":"books/#the-inner-game-of-tennis","title":"The Inner Game of Tennis","text":"
"},{"location":"books/#waking-up","title":"Waking Up","text":"
"},{"location":"books/#read-write-own","title":"Read Write Own","text":"
"},{"location":"quotes/","title":"My Quote Collection","text":"
"},{"location":"tags/","title":"Tags","text":"
"},{"location":"tags/#tag:biography","title":"Biography","text":"
"},{"location":"tags/#tag:biology","title":"Biology","text":"
"},{"location":"tags/#tag:conference","title":"Conference","text":"
"},{"location":"tags/#tag:dna","title":"DNA","text":"
"},{"location":"tags/#tag:evolution","title":"Evolution","text":"
"},{"location":"tags/#tag:example","title":"Example","text":"
"},{"location":"tags/#tag:futurism","title":"Futurism","text":"
"},{"location":"tags/#tag:network-automation","title":"Network-Automation","text":"
"},{"location":"tags/#tag:network-community","title":"Network-Community","text":"
"},{"location":"tags/#tag:politics","title":"Politics","text":"
"},{"location":"tags/#tag:psychology","title":"Psychology","text":"
"},{"location":"tags/#tag:science","title":"Science","text":"
"},{"location":"tags/#tag:systems","title":"Systems","text":"
"},{"location":"tags/#tag:pending","title":"pending","text":"
"},{"location":"words/","title":"My Favorite Words","text":"Understanding Word Types and Language Concepts ...In case you are as dumb and forgetful as me. \ud83d\ude05"},{"location":"words/#types-of-words","title":"Types of Words","text":"
"},{"location":"words/#language-concepts","title":"Language Concepts","text":"
"},{"location":"words/#why-this-matters","title":"Why This Matters","text":"
"},{"location":"words/#affect-verb","title":"Affect (Verb)","text":"
"},{"location":"words/#allusion-noun","title":"Allusion (Noun)","text":"
"},{"location":"words/#archaic-adjective","title":"Archaic (Adjective)","text":"
"},{"location":"words/#altricial-adjective","title":"Altricial (Adjective)","text":"
"},{"location":"words/#altruism-noun","title":"Altruism (Noun)","text":"
"},{"location":"words/#autotelic-adjective","title":"Autotelic (Adjective)","text":"
"},{"location":"words/#automaticity-noun","title":"Automaticity (Noun)","text":"
"},{"location":"words/#axiom-noun","title":"Axiom (Noun)","text":"
"},{"location":"words/#axiomatic-adjective","title":"Axiomatic (Adjective)","text":"
"},{"location":"words/#bayesian-adjective","title":"Bayesian (Adjective)","text":"
"},{"location":"words/#beguiled-verb","title":"Beguiled (Verb)","text":"
"},{"location":"words/#belief-noun","title":"Belief (Noun)","text":"
"},{"location":"words/#bequeath-verb","title":"Bequeath (Verb)","text":"
"},{"location":"words/#betwixt-preposition","title":"Betwixt (Preposition)","text":"
"},{"location":"words/#cacophonous-adjective","title":"Cacophonous (Adjective)","text":"
"},{"location":"words/#cathartic-adjective","title":"Cathartic (Adjective)","text":"
"},{"location":"words/#conceit-noun","title":"Conceit (Noun)","text":"
"},{"location":"words/#catatonic-adjective","title":"Catatonic (Adjective)","text":"
"},{"location":"words/#cheek-by-jowl-adverb","title":"Cheek by Jowl (Adverb)","text":"
"},{"location":"words/#computational-irreducibility-noun","title":"Computational Irreducibility (Noun)","text":"
"},{"location":"words/#congenital-adjective","title":"Congenital (Adjective)","text":"
"},{"location":"words/#consciousness-noun","title":"Consciousness (Noun)","text":"
"},{"location":"words/#corrigibility-adjective","title":"Corrigibility (Adjective)","text":"
"},{"location":"words/#denizen-noun","title":"Denizen (Noun)","text":"
"},{"location":"words/#dissipation-noun","title":"Dissipation (Noun)","text":"
"},{"location":"words/#dualism-noun","title":"Dualism (Noun)","text":"
"},{"location":"words/#ebullient-adjective","title":"Ebullient (Adjective)","text":"
"},{"location":"words/#effect-noun","title":"Effect (Noun)","text":"
"},{"location":"words/#effrontery-noun","title":"Effrontery (Noun)","text":"
"},{"location":"words/#entropic-adjective","title":"Entropic (Adjective)","text":"
"},{"location":"words/#entropy-noun","title":"Entropy (Noun)","text":"
"},{"location":"words/#epiphany-noun","title":"Epiphany (Noun)","text":"
"},{"location":"words/#epistemology-noun","title":"Epistemology (Noun)","text":"
"},{"location":"words/#ephemeral-adjective","title":"Ephemeral (Adjective)","text":"
"},{"location":"words/#esoteric-adjective","title":"Esoteric (Adjective)","text":"
"},{"location":"words/#euphony-noun","title":"Euphony (Noun)","text":"
"},{"location":"words/#equanimity-noun","title":"Equanimity (Noun)","text":"
"},{"location":"words/#equanimous-adjective","title":"Equanimous (Adjective)","text":"
"},{"location":"words/#erudition-noun","title":"Erudition (Noun)","text":"
"},{"location":"words/#evanescent-adjective","title":"Evanescent (Adjective)","text":"
"},{"location":"words/#extensible-adjective","title":"Extensible (Adjective)","text":"
"},{"location":"words/#foibles-noun","title":"Foibles (Noun)","text":"
"},{"location":"words/#flops-noun","title":"FLOPS (Noun)","text":"
"},{"location":"words/#fractal-noun","title":"Fractal (Noun)","text":"
"},{"location":"words/#gaussian-adjective","title":"Gaussian (Adjective)","text":"
"},{"location":"words/#hedonism-noun","title":"Hedonism (Noun)","text":"
"},{"location":"words/#heuristic-adjective","title":"Heuristic (Adjective)","text":"
"},{"location":"words/#heterotrophs-noun","title":"Heterotrophs (Noun)","text":"
"},{"location":"words/#homeostasis-noun","title":"Homeostasis (Noun)","text":"
"},{"location":"words/#hubristic-adjective","title":"Hubristic (Adjective)","text":"
"},{"location":"words/#idealism-noun","title":"Idealism (Noun)","text":"
"},{"location":"words/#idempotent-adjective","title":"Idempotent (Adjective)","text":"
"},{"location":"words/#illusion-noun","title":"Illusion (Noun)","text":"
"},{"location":"words/#immutable-adjective","title":"Immutable (Adjective)","text":"
"},{"location":"words/#interoception-noun","title":"Interoception (Noun)","text":"
"},{"location":"words/#intractable-adjective","title":"Intractable (Adjective)","text":"
"},{"location":"words/#intrepid-adjective","title":"Intrepid (Adjective)","text":"
"},{"location":"words/#intrinsic-adjective","title":"Intrinsic (Adjective)","text":"
"},{"location":"words/#instrumental-adjective","title":"Instrumental (Adjective)","text":"
"},{"location":"words/#jalopy-noun","title":"Jalopy (Noun)","text":"
"},{"location":"words/#jettison-verb","title":"Jettison (Verb)","text":"
"},{"location":"words/#kaizen-noun","title":"Kaizen (Noun)","text":"
"},{"location":"words/#lineage-noun","title":"Lineage (Noun)","text":"
"},{"location":"words/#lucidity-noun","title":"Lucidity (Noun)","text":"
"},{"location":"words/#mastication-noun","title":"Mastication (Noun)","text":"
"},{"location":"words/#materialism-noun","title":"Materialism (Noun)","text":"
"},{"location":"words/#melancholy-noun","title":"Melancholy (Noun)","text":"
"},{"location":"words/#memetic-adjective","title":"Memetic (Adjective)","text":"
"},{"location":"words/#metanoia-noun","title":"Metanoia (Noun)","text":"
"},{"location":"words/#myelin-noun","title":"Myelin (Noun)","text":"
"},{"location":"words/#myopic-adjective","title":"Myopic (Adjective)","text":"
"},{"location":"words/#neologism-noun","title":"Neologism (Noun)","text":"
"},{"location":"words/#neuro-reductionism-noun","title":"Neuro-Reductionism (Noun)","text":"
"},{"location":"words/#neuroticism-noun","title":"Neuroticism (Noun)","text":"
"},{"location":"words/#nix-verb","title":"Nix (Verb)","text":"
"},{"location":"words/#non-sequitur-noun","title":"Non Sequitur (Noun)","text":"
"},{"location":"words/#obfuscate-verb","title":"Obfuscate (Verb)","text":"
"},{"location":"words/#oblique-adjective","title":"Oblique (Adjective)","text":"
"},{"location":"words/#obstinate-adjective","title":"Obstinate (Adjective)","text":"
"},{"location":"words/#oligodendrocytes-noun","title":"Oligodendrocytes (Noun)","text":"
"},{"location":"words/#ontology-noun","title":"Ontology (Noun)","text":"
"},{"location":"words/#orthogonal-adjective","title":"Orthogonal (Adjective)","text":"
"},{"location":"words/#oscillation-noun","title":"Oscillation (Noun)","text":"
"},{"location":"words/#otiose-adjective","title":"Otiose (Adjective)","text":"
"},{"location":"words/#panglossian-adjective","title":"Panglossian (Adjective)","text":"
"},{"location":"words/#panpsychism-noun","title":"Panpsychism (Noun)","text":"
"},{"location":"words/#parsimony-noun","title":"Parsimony (Noun)","text":"
"},{"location":"words/#pedagogy-noun","title":"Pedagogy (Noun)","text":"
"},{"location":"words/#pedology-noun","title":"Pedology (Noun)","text":"
"},{"location":"words/#phenomenology-noun","title":"Phenomenology (Noun)","text":"
"},{"location":"words/#phenomenon-noun","title":"Phenomenon (Noun)","text":"
"},{"location":"words/#plasma-noun","title":"Plasma (Noun)","text":"
"},{"location":"words/#platonic-adjective","title":"Platonic (Adjective)","text":"
"},{"location":"words/#polestar-noun","title":"Polestar (Noun)","text":"
"},{"location":"words/#postulate-noun","title":"Postulate (Noun)","text":"
"},{"location":"words/#prophecy-noun","title":"Prophecy (Noun)","text":"
"},{"location":"words/#prophesy-verb","title":"Prophesy (Verb)","text":"
"},{"location":"words/#prophylactic-adjective","title":"Prophylactic (Adjective)","text":"
"},{"location":"words/#protean-adjective","title":"Protean (Adjective)","text":"
"},{"location":"words/#psyche-noun","title":"Psyche (Noun)","text":"
"},{"location":"words/#qualia-noun","title":"Qualia (Noun)","text":"
"},{"location":"words/#quark-noun","title":"Quark (Noun)","text":"
"},{"location":"words/#quintessence-noun","title":"Quintessence (Noun)","text":"
"},{"location":"words/#recalcitrance-noun","title":"Recalcitrance (Noun)","text":"
"},{"location":"words/#recursion-noun","title":"Recursion (Noun)","text":"
"},{"location":"words/#renaissance-noun","title":"Renaissance (Noun)","text":"
"},{"location":"words/#risible-adjective","title":"Risible (Adjective)","text":"
"},{"location":"words/#sapient-adjective","title":"Sapient (Adjective)","text":"
"},{"location":"words/#sentient-adjective","title":"Sentient (Adjective)","text":"
"},{"location":"words/#sesquipedalian-adjective","title":"Sesquipedalian (Adjective)","text":"
"},{"location":"words/#shtick-noun","title":"Shtick (Noun)","text":"
"},{"location":"words/#sophism-noun","title":"Sophism (Noun)","text":"
"},{"location":"words/#solipsism-noun","title":"Solipsism (Noun)","text":"
"},{"location":"words/#spectroscopy-noun","title":"Spectroscopy (Noun)","text":"
"},{"location":"words/#spiritus-sancti-noun","title":"Spiritus Sancti (Noun)","text":"
"},{"location":"words/#stochastic-adjective","title":"Stochastic (Adjective)","text":"
"},{"location":"words/#syntax-noun","title":"Syntax (Noun)","text":"
"},{"location":"words/#semantics-noun","title":"Semantics (Noun)","text":"
"},{"location":"words/#stymied-verb","title":"Stymied (Verb)","text":"
"},{"location":"words/#sublime-adjective","title":"Sublime (Adjective)","text":"
"},{"location":"words/#substrate-noun","title":"Substrate (Noun)","text":"
"},{"location":"words/#synergy-noun","title":"Synergy (Noun)","text":"
"},{"location":"words/#taciturn-adjective","title":"Taciturn (Adjective)","text":"
"},{"location":"words/#taxonomy-noun","title":"Taxonomy (Noun)","text":"
"},{"location":"words/#teleology-noun","title":"Teleology (Noun)","text":"
"},{"location":"words/#tenacity-noun","title":"Tenacity (Noun)","text":"
"},{"location":"words/#theory-of-mind-noun","title":"Theory of Mind (Noun)","text":"
"},{"location":"words/#theory-of-knowledge-noun","title":"Theory of Knowledge (Noun)","text":"
"},{"location":"words/#trepidation-noun","title":"Trepidation (Noun)","text":"
"},{"location":"words/#truculent-adjective","title":"Truculent (Adjective)","text":"
"},{"location":"words/#valence-noun","title":"Valence (Noun)","text":"
"},{"location":"words/#varsity-noun","title":"Varsity (Noun)","text":"
"},{"location":"words/#vitriol-noun","title":"Vitriol (Noun)","text":"
"},{"location":"words/#voracious-adjective","title":"Voracious (Adjective)","text":"
"},{"location":"words/#whimsical-adjective","title":"Whimsical (Adjective)","text":"
"},{"location":"Contact/","title":"Contact","text":"
"},{"location":"Contact/#meet-with-luke","title":"Meet with Luke","text":"
"},{"location":"Contact/#instant-meeting","title":"Instant Meeting","text":"
"},{"location":"Contact/#schedule-meeting","title":"Schedule Meeting","text":"
"},{"location":"Hire-Me/#employment-history","title":"Employment History","text":"
"},{"location":"Hire-Me/#education","title":"Education","text":"
Where When What Why Available for Hire 2024 - Network Automation Bring it all together Lloret 2023 - Present Network Architect Rediscover my Roots WeWork 2019 - 2023 Network Architect - Global Build Complex Systems at Scale Redstone 2017 - 2018 Network Engineer & TPM Prove Myself Dimension Data 2012 - 2017 PM to Network Engineer Learn the Ropes gantt\ndateFormat YYYY\ntitle Luke's Career Path\n\nsection Dimension Data\nProject Management & Network Engineer :done, 2012, 2017\n\nsection Redstone\nNetwork Engineer :done, 2017, 2018\n\nsection Sabbatical\nPeace & Quiet :done, 2018, 2019\n\nsection WeWork\nNetwork Architect - Global :done, 2019, 2023\n\nsection Lloret Control Systems\nNetwork Architect :active, 2023, 2025
"},{"location":"Hire-Me/#career-achievements","title":"Career Achievements","text":"gantt\ndateFormat YYYY\ntitle Luke's Learning Path \n\nsection You Tube \nStay Curious :active, 2019, 2025\n\nsection CCNA \nCisco Route & Switch :done, 2019, 2022\n\nsection JNCIA-Junos \nJuniper Networks Certified Associate - Junos :active, 2020, 2025\n\nsection JNCIA-DevOps \nJuniper Networks Certified Associate - DevOps :active, 2020, 2025\n\nsection JNCIA-Secuirty \nJuniper Networks Certified Associate - Security :active, 2020, 2025\n\nsection JNCIA-Mist \nJuniper Networks Certified Associate - Mist :active, 2020, 2025\n\nsection Juniper Associate x 4 \nJuniper JNCIA x 4 :active, 2021, 2025 \n\nsection JNCIS-DevOps \nJuniper Networks Certified Specialist - DevOps :active, 2021, 2025 \n\nsection JNCIS-ENT \nJuniper Networks Certified Specialist - ENT :active, 2023, 2025 \n\nsection JNCIS-Mist \nJuniper Networks Certified Specialist - Mist :active, 2023, 2025 \n\nsection Juniper Specialist x3 \nJuniper JNCIS x 3 :active, 2023, 2025 \n\nsection Juniper Innovator\nJuniper Networks Innovator :done, 2023, 2024 \n\nsection GitLab Associate \nGitLab Certified Git Associate :active, 2021, 2025 \n\nsection AWS Certified Cloud\nAWS Certified Cloud :active, 2021, 2025 \n\nsection Okta Professional \nOkta Certified Professional :done, 2021, 2024 \n\nsection GitHub\nGitHub Foundations :active, 2023, 2025\n\nsection Allied Telesis \nAllied Telesis Professional ENT :active, 2023, 2025\n\nsection Lost to Time\nMultiple others not stored in Credly :done, 2020, 2025
"},{"location":"Hire-Me/#hobbies","title":"Hobbies","text":"
"},{"location":"Hire-Me/#testimonials","title":"Testimonials","text":"
\u279c Interests tree\n.\n\u251c\u2500\u2500 Adventure\n\u2502\u00a0\u00a0 \u251c\u2500\u2500 Mountains\n\u2502\u00a0\u00a0 \u2514\u2500\u2500 Rock-Climbing\n\u251c\u2500\u2500 Politics\n\u2502\u00a0\u00a0 \u251c\u2500\u2500 Influential-People\n\u2502\u00a0\u00a0 \u2514\u2500\u2500 Power-Structures \n\u2514\u2500\u2500 Technology\n \u251c\u2500\u2500 Infrastructure-as-Code\n \u2514\u2500\u2500 Network-Engineering\n
>>>>>>>>>>>>>>
Core Strength>>>>>>>>>>>>>>>>>>
Core Strength>>>>>>>>>>>>>>>>>>>>>>>>>>
Exceptional Skill>>>>>>>>>>>>>
Core Strength>>>>>>>>>>>>>>>>>>
Core Strength>>>>>>>>>>>>>>>>>
Exceptional Skill>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
High>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Maximum
","tags":["pending"]},{"location":"Placeholder-Content/DNS/placeholder/","title":"Placeholder","text":"<div data-iframe-width=\"150\" data-iframe-height=\"270\" data-share-badge-id=\"4e357c24-30e4-4379-8e20-54bedc6213dd\" data-share-badge-host=\"https://www.credly.com\"></div>\n<!-- Additional badges can be added here -->\n</div>\n<script type=\"text/javascript\" async src=\"//cdn.credly.com/assets/utilities/embed.js\"></script>\n
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/IPv4/#each-byte-has-a-value-between-0-and-255","title":"Each Byte has a value between 0 and 255","text":"
Octet Number Binary Format Decimal Equivalent 1st Octet 00000000 0 - 255 2nd Octet 00000000 0 - 255 3rd Octet 00000000 0 - 255 4th Octet 00000000 0 - 255","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/IPv4/#example-ipv4-addresses","title":"Example IPv4 Addresses:","text":"
Octet Number Binary Format Decimal Equivalent 1st Octet 11000000 192 2nd Octet 10101000 168 3rd Octet 00000001 1 4th Octet 00000010 2","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/IPv4/#bits-bytes-of-19216812","title":"Bits & Bytes of 192.168.1.2","text":"Component Description Details Octet An IPv4 address is divided into 4 octets. Each octet consists of 8 bits. Bit The basic unit of data in an IP address. There are 32 bits in total (8 bits per octet). Byte Equivalent to one octet. Each byte (or octet) ranges from 0 to 255. Example For the IP address 192.168.1.2: - 192 is the first octet (byte).- 168 is the second octet (byte).- 1 is the third octet (byte).- 2 is the fourth octet (byte).
Octet Number Binary Format Decimal Equivalent 1st Octet 00001010 10 2nd Octet 01000110 70 3rd Octet 00000011 3 4th Octet 01100100 100","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/IPv6/","title":"IPv6","text":"
Group Number Binary Format Hexadecimal Equivalent 1st Group 0000000000000000 0000 - FFFF 2nd Group 0000000000000000 0000 - FFFF 3rd Group 0000000000000000 0000 - FFFF 4th Group 0000000000000000 0000 - FFFF 5th Group 0000000000000000 0000 - FFFF 6th Group 0000000000000000 0000 - FFFF 7th Group 0000000000000000 0000 - FFFF 8th Group 0000000000000000 0000 - FFFF 2001:0db8:85a3:0000:0000:8a2e:0370:7334
2001:db8:85a3:0:0:8a2e:370:7334
2 Collapse consecutive blocks of zeros with ::
2001:db8:85a3::8a2e:370:7334
2001:db8:85a3::8a2e:370:7334
must remain as it is. ::
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/broadcast/","title":"Broadcast","text":"","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/broadcast/#why-minimize-broadcast-packets","title":"Why Minimize Broadcast Packets?","text":"graph LR\n A[IPv6 Address] --> B[Group 1]\n A --> C[Group 2]\n A --> D[Group 3]\n A --> E[Group 4]\n A --> F[Group 5]\n A --> G[Group 6]\n A --> H[Group 7]\n A --> I[Group 8]\n\n B --> B1[16 bits<br>Hex: 2001]\n C --> C1[16 bits<br>Hex: 0db8]\n D --> D1[16 bits<br>Hex: 85a3]\n E --> E1[16 bits<br>Hex: 0000]\n F --> F1[16 bits<br>Hex: 0000]\n G --> G1[16 bits<br>Hex: 8a2e]\n H --> H1[16 bits<br>Hex: 0370]\n I --> I1[16 bits<br>Hex: 7334]\n\n style A fill:#f9f,stroke:#333,stroke-width:4px\n style B fill:#ccf,stroke:#f66,stroke-width:2px\n style C fill:#ccf,stroke:#f66,stroke-width:2px\n style D fill:#ccf,stroke:#f66,stroke-width:2px\n style E fill:#ccf,stroke:#f66,stroke-width:2px\n style F fill:#ccf,stroke:#f66,stroke-width:2px\n style G fill:#ccf,stroke:#f66,stroke-width:2px\n style H fill:#ccf,stroke:#f66,stroke-width:2px\n style I fill:#ccf,stroke:#f66,stroke-width:2px
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/broadcast/#the-goal","title":"The Goal","text":"
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/cidr/#slash-the-decimals-decimate-to-slash","title":"Slash the Decimals. Decimate to Slash.","text":"
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/classy/#bits-specified-by-class","title":"Bits specified by Class","text":"Class Leading Bits Range of First Octet A 0xxxxxxx 0 - 127 B 10xxxxxx 128 - 191 C 110xxxxx 192 - 223 D 1110xxxx 224 - 239 E 1111xxxx 240 - 255","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/classy/#subnets-classy-cider","title":"Subnets - Classy Cider \ud83c\udf7b","text":"
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/documents/","title":"Helpful resources for learning to subnet","text":"
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/example/","title":"Subnetting Examples","text":"","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/example/#example-class-c-subnet","title":"Example Class C Subnet","text":"
What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 192.168.100.0 255.255.255.192 /26 11111111.11111111.11111111.11000000 How many subnets?
How many hosts per subnet?
What subnet is host 192.168.100.130 in?
What is the broadcast address of 192.168.100.130/26 host?
Example Class C Summary Concept Explanation Network Address 192.168.100.128 (192.168.100.130 falls in this range) CIDR Notation /26 (means 26 bits for network, remaining for host) Subnet Mask 255.255.255.192 (or /26) Binary Subnet Mask 11111111.11111111.11111111.11000000 Host Address Range 192.168.100.128 - 192.168.100.191 Next Network Address 192.168.100.192 (since /26 allows 64 addresses per subnet) Broadcast Address 192.168.100.191 (one less than the next network address)","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/example/#example-class-b-subnet","title":"Example Class B Subnet","text":"
What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 172.16.0.0 255.255.224.0 /19 11111111.11111111.11100000.00000000 How many subnets?
How many hosts per subnet?
What subnet is host 172.16.32.130 in?
What is the broadcast address of 172.16.32.130/19 host?
Example Class B Summary Concept Explanation Network Address 172.16.32.0 (172.16.32.130 falls in this range) CIDR Notation /19 (means 19 bits for network, remaining for host) Subnet Mask 255.255.224.0 (or /19) Binary Subnet Mask 11111111.11111111.11100000.00000000 Host Address Range 172.16.32.0 - 172.16.63.255 Next Network Address 172.16.64.0 (since /19 allows 8192 addresses per subnet) Broadcast Address 172.16.63.255 (one less than the next network address)","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/example/#example-class-a-subnet","title":"Example Class A Subnet","text":"
What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.0.0.0 255.240.0.0 /12 11111111.11110000.00000000.00000000 How many subnets?
How many hosts per subnet?
What subnet is host 10.16.0.130 in?
What is the broadcast address of 10.16.0.130/12 host?
Example Class A Summary Concept Explanation Network Address 10.16.0.0 (10.16.0.130 falls in this range) CIDR Notation /12 (means 12 bits for network, remaining for host) Subnet Mask 255.240.0.0 (or /12) Binary Subnet Mask 11111111.11110000.00000000.00000000 Host Address Range 10.16.0.0 - 10.31.255.255 Next Network Address 10.32.0.0 (since /12 allows 1,048,576 addresses per subnet) Broadcast Address 10.31.255.255 (one less than the next network address)","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/hex/","title":"Hex","text":"","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/hex/#what-is-hexadecimal","title":"What is Hexadecimal?","text":"
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/hex/#convert-binary-to-hexadecimal","title":"Convert Binary to Hexadecimal","text":"graph TD\n subgraph A[Decimal]\n A1[0]\n A2[1]\n A3[2]\n A4[3]\n A5[4]\n A6[5]\n A7[6]\n A8[7]\n A9[8]\n A10[9]\n A11[10]\n A12[11]\n A13[12]\n A14[13]\n A15[14]\n A16[15]\n end\n\n subgraph B[Hexadecimal]\n B1[0]\n B2[1]\n B3[2]\n B4[3]\n B5[4]\n B6[5]\n B7[6]\n B8[7]\n B9[8]\n B10[9]\n B11[A]\n B12[B]\n B13[C]\n B14[D]\n B15[E]\n B16[F]\n end\n\n A1 --> B1\n A2 --> B2\n A3 --> B3\n A4 --> B4\n A5 --> B5\n A6 --> B6\n A7 --> B7\n A8 --> B8\n A9 --> B9\n A10 --> B10\n A11 --> B11\n A12 --> B12\n A13 --> B13\n A14 --> B14\n A15 --> B15\n A16 --> B16
Decimal Hexadecimal Binary 0 0 0000 1 1 0001 2 2 0010 3 3 0011 4 4 0100 5 5 0101 6 6 0110 7 7 0111 8 8 1000 9 9 1001 10 A 1010 11 B 1011 12 C 1100 13 D 1101 14 E 1110 15 F 1111","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/lloret-nets/","title":"Lloret nets","text":"","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/lloret-nets/#lloret-networks","title":"Lloret Networks","text":"Network IP Address Subnet Mask Description LAN 10.1.0.1 255.255.0.0 LAN Network STAFF 10.70.0.1 255.255.0.0 Staff Network BYOD 10.110.0.1 255.255.0.0 BYOD Network GUEST 10.120.0.1 255.255.0.0 Guest Network Lloret Networks set ip 10.1.0.1 255.255.0.0 #LAN\nset ip 10.70.0.1 255.255.0.0 #STAFF\nset ip 10.110.0.1 255.255.0.0 #BYOD\nset ip 10.120.0.1 255.255.0.0 #GUEST\n
site002 $ get system arp \nAddress Age(min) Hardware Addr Interface\n10.70.3.5 0 64:79:f0:45:eb:56 lloret_staff\n10.70.3.72 15 c4:9d:ed:ad:27:d9 lloret_staff\n10.120.0.32 1 d2:eb:db:14:f6:d5 lloret_guest\n10.70.241.1 1 c0:56:e3:50:32:94 lloret_staff\n10.120.0.44 1 66:c9:6a:28:bd:73 lloret_guest\n10.70.3.29 0 d8:bb:c1:0e:e7:8e lloret_staff\n10.70.3.41 0 f4:a8:0d:5c:e5:82 lloret_staff\n10.120.0.68 1 ce:d9:90:ca:85:38 lloret_guest\n10.70.0.206 0 00:0c:29:95:86:5a lloret_staff\n10.70.0.17 0 00:11:32:b4:fd:93 lloret_staff\n10.70.3.53 3 e0:4f:43:e3:c0:b3 lloret_staff\n10.110.0.40 3 26:39:93:9a:9c:c0 lloret_byod\n10.70.240.100 12 6c:4b:90:6b:a1:d6 lloret_staff\n10.120.0.25 1 ce:91:23:e7:02:c0 lloret_guest\n10.70.3.10 3 d8:5e:d3:ae:d4:3c lloret_staff\n10.70.3.77 0 28:16:a8:04:d8:a7 lloret_staff\n10.70.3.22 0 08:3a:88:6d:d2:45 lloret_staff\n10.70.1.69 0 1c:69:7a:64:db:5f lloret_staff\n10.70.3.34 0 6c:24:08:2c:05:dd lloret_staff\n10.110.0.21 0 5a:20:ea:cb:62:b7 lloret_byod\n10.70.3.46 0 f8:75:a4:7f:21:f2 lloret_staff\n10.70.0.10 0 9c:8e:99:4b:9d:68 lloret_staff\n10.1.0.241 1 78:bc:1a:ad:ed:52 lan\n10.120.0.73 1 ba:cc:77:f4:f0:2b lloret_guest\n10.70.3.70 0 f8:75:a4:7f:40:25 lloret_staff\n10.120.0.30 1 0e:4a:68:ac:9d:e3 lloret_guest\n10.70.3.15 1 50:a4:d0:61:13:bd lloret_staff\n10.70.243.153 1 58:fd:b1:56:7c:81 lloret_staff\n10.1.0.21 3 24:9a:d8:2b:16:79 lan\n10.70.3.27 1 6c:4b:90:59:5e:b7 lloret_staff\n10.70.3.39 0 98:ee:cb:ea:0a:70 lloret_staff\n10.70.3.51 0 44:39:c4:34:ee:5c lloret_staff\n10.70.0.15 0 00:11:32:e9:02:2b lloret_staff\n10.1.0.246 1 08:4f:a9:fd:86:c4 lan\n10.120.0.23 0 a2:60:df:48:18:97 lloret_guest\n10.70.2.248 0 b8:27:eb:3f:36:43 lloret_staff\n10.70.3.8 0 50:a4:d0:61:3b:5f lloret_staff\n10.70.3.20 0 50:a4:d0:61:3b:68 lloret_staff\n10.70.3.32 0 04:ec:d8:26:6b:cd lloret_staff\n10.70.3.44 0 48:2a:e3:aa:f5:e4 lloret_staff\n10.70.3.56 1 50:a4:d0:61:3b:44 lloret_staff\n10.120.0.83 1 3e:93:08:cd:7d:00 lloret_guest\n10.70.3.13 1 50:a4:d0:61:3a:6c lloret_staff\n10.70.243.151 8794 88:c9:b3:d0:17:4f lloret_staff\n10.120.0.40 2 62:ca:9e:c2:99:c6 lloret_guest\n10.70.3.25 0 24:9a:d8:0d:1d:d1 lloret_staff\n10.70.3.49 0 28:16:a8:01:87:f5 lloret_staff\n10.1.0.244 1 5c:5a:c7:57:c4:20 lan\n10.70.3.61 0 a4:f9:33:4d:7c:68 lloret_staff\n10.70.3.6 0 f4:a8:0d:32:44:12 lloret_staff\n10.70.3.18 1 50:a4:d0:61:3a:e4 lloret_staff\n86.188.216.217 0 54:a2:74:27:f7:11 wan1\n10.120.0.45 2 56:c0:73:c9:11:da lloret_guest\n10.70.3.30 0 d8:5e:d3:ae:d4:3b lloret_staff\n10.70.243.101 3 00:0e:c6:d3:f1:e4 lloret_staff\n10.70.0.6 2670 9c:b6:54:74:9c:ca lloret_staff\n10.70.3.42 0 10:60:4b:68:0a:8f lloret_staff\n10.70.3.66 0 0c:37:96:15:9e:c7 lloret_staff\n10.70.3.11 0 10:b5:88:06:96:67 lloret_staff\n10.120.0.93 0 26:61:e0:70:54:60 lloret_guest\n10.120.0.38 3 5e:7e:9c:18:45:d0 lloret_guest\n10.70.3.23 3 02:11:32:2f:e9:be lloret_staff\n10.120.0.50 1 42:16:3f:ae:69:02 lloret_guest\n10.70.3.35 0 04:ec:d8:7c:db:de lloret_staff\n10.70.3.47 0 5c:e9:1e:6b:54:a9 lloret_staff\n10.70.0.11 0 02:11:32:27:bb:b6 lloret_staff\n10.1.0.242 1 10:b3:d6:46:49:ee lan\n10.70.3.83 1 e8:eb:1b:11:af:f7 lloret_staff\n10.70.3.28 0 00:0a:b0:07:25:83 lloret_staff\n10.70.3.40 22 40:16:3b:c1:a3:d1 lloret_staff\n10.70.3.52 0 e4:a8:df:95:98:b8 lloret_staff\n10.70.0.16 0 00:11:32:d2:1d:9e lloret_staff\n10.1.0.247 1 78:bc:1a:ad:ee:28 lan\n10.70.3.64 0 d4:3d:7e:7d:fa:89 lloret_staff\n10.70.2.249 0 b8:27:eb:9a:44:39 lloret_staff\n10.70.3.9 0 d8:5e:d3:ae:d2:34 lloret_staff\n10.70.3.21 1 44:39:c4:34:f8:28 lloret_staff\n10.70.3.33 0 14:d6:4d:1f:e5:fa lloret_staff\n10.70.3.45 0 f4:a8:0d:31:df:d1 lloret_staff\n10.70.242.100 52 00:80:f4:46:e9:a2 lloret_staff\n10.70.3.57 2 98:ee:cb:a5:d7:b6 lloret_staff\n10.1.1.12 4 30:b5:c2:cd:9c:6e lan\n10.70.3.2 8432 9c:50:d1:20:49:01 lloret_staff\n10.70.3.69 0 98:ee:cb:b7:23:61 lloret_staff\n10.120.0.29 0 a2:9b:d9:63:07:4f lloret_guest\n10.70.3.14 2 08:3a:88:69:34:be lloret_staff\n10.70.3.81 5 98:ee:cb:9c:3c:48 lloret_staff\n10.70.3.26 5 60:70:c0:48:f6:e4 lloret_staff\n10.70.3.38 0 d8:80:83:3f:58:fb lloret_staff\n10.70.0.14 5 00:11:32:8a:ac:85 lloret_staff\n10.1.0.245 1 08:4f:a9:ae:44:d4 lan\n10.70.3.62 1 8c:89:a5:3c:bf:bf lloret_staff\n192.168.1.1 0 00:1e:42:15:a3:64 wan2\n10.120.0.22 17 68:ec:c5:b1:8f:0f lloret_guest\n10.120.0.89 1 2a:2a:5d:c2:a0:82 lloret_guest\n10.70.3.74 0 cc:48:3a:c3:2a:67 lloret_staff\n10.70.3.19 0 08:3a:88:6d:6c:59 lloret_staff\n10.70.3.31 0 e0:4f:43:25:04:ab lloret_staff\n10.70.3.55 3 e8:ea:6a:83:df:49 lloret_staff\n10.120.0.82 2 4a:bc:2b:b8:12:89 lloret_guest\n10.120.0.27 0 ca:12:b5:1c:71:18 lloret_guest\n10.70.3.12 1 6c:3c:8c:7a:25:46 lloret_staff\n10.70.243.150 2 00:0a:b0:09:66:11 lloret_staff\n10.70.3.24 0 74:97:79:ec:a4:29 lloret_staff\n10.70.3.36 3 50:a4:d0:61:3b:62 lloret_staff\n10.70.0.12 2 02:11:32:27:ba:55 lloret_staff\n\nsite002 $ \n
This example is specific to the 10.1.0.1/16 subnet, detailing its characteristics and addressing within a Class A network.
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/lloret-nets/#lloret-staff-block","title":"Lloret Staff Block","text":"Binary: Base-2, uses 0 and 1.
Hexadecimal: Base-16, uses 0-9 and A-F.
Decimal: Base-10, uses 0-9.
What is The OSI Model by Cloudflare ?
The Open Systems Interconnect Model from the International Organization for Standardization
The OSI model was first defined in raw form in Washington, D.C., in February 1978 by French software engineer Hubert Zimmermann, and the refined but still draft standard was published by the ISO in 1980.
It is a reference model. Ultimately, the TCP/IP model is the more practical model for today's networks, but the OSI model is still used to describe network layers and protocols. The US DoD invented the TCP/IP model in the 1970s, and it was used to build the internet. The OSI model was created in the 1980s by the International Organization for Standardization (ISO), and it was designed to be an abstract model for describing network protocols, not a practical model for building networks.
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/osi/#from-binary-to-magic","title":"From Binary to Magic","text":"Layer Number Layer Name Function Examples 7 Application Provides network services directly to applications HTTP, FTP, SMTP 6 Presentation Translates data between the network and application formats SSL, TLS, JPEG, MPEG 5 Session Manages sessions between applications NetBIOS, RPC 4 Transport Provides reliable data transfer TCP, UDP 3 Network Handles addressing and routing of data packets IP, ICMP, IPSec 2 Data Link Transfers data between network and physical layers Ethernet, PPP, Switch, Bridge 1 Physical Deals with the physical connection to the network, data transmission Cables, Hubs, Repeaters, Network Cards","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/osi/#how-does-the-osi-reference-model-relate-to-tcpip","title":"How does the OSI Reference Model relate to TCP/IP?","text":"Layer Number Layer Name Function Examples 4 Application Handles high-level protocols, representation, encoding HTTP, SMTP, FTP, DNS 3 Transport Manages end-to-end data transmission TCP, UDP 2 Internet Determines the best path through the network IP (IPv4, IPv6), ICMP 1 Network Access (or Link) Deals with the physical aspects of data transmission Ethernet, Wi-Fi, ARP","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/osi/#in-case-you-were-wondering","title":"In case you were wondering...","text":"Protocol OSI Layer Description BACnet Application Provides rules for data representation and communication. Network BACnet/IP uses IP for networking. Physical/Data Link Uses Ethernet, ARCNET, or MSTP for physical communication. Modbus Application Defines its own data model and functions at this layer. Transport In Modbus TCP/IP, TCP is used for transport. Network Modbus TCP/IP uses IP. Physical/Data Link In Modbus Serial (RTU or ASCII), operates over RS-232 or RS-485 lines.","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/packet-life/","title":"The Life of a Packet","text":"","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/packet-life/#a-unholy-flow-of-complexity-to-deliver-a-payload-simplified","title":"A unholy flow of complexity to deliver a Payload - Simplified","text":"Stage Description 1. Generation Data is generated or requested by an application. 2. Encapsulation Data is encapsulated into packets with headers. 3. Transmission Packets are transmitted over the network. 4. Routing Routers forward packets based on destination. 5. Switching Switches forward packets within local networks. 6. Arrival Packets arrive at their destination. 7. Decapsulation Packets are decapsulated to retrieve data. 8. Delivery Data is delivered to the destination app.","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/packet-life/#data-journey-through-the-osi-model","title":"Data Journey Through the OSI Model","text":" +-----------------------------------+\n | Layer 7: Application |\n | - Data generated by app |\n +-----------------------------------+\n | Layer 6: Presentation |\n | - Data conversion and encoding|\n +-----------------------------------+\n | Layer 5: Session |\n | - Session management |\n +-----------------------------------+\n | Layer 4: Transport |\n | - Segmentation/Reassembly |\n | - Ports and error checking |\n +-----------------------------------+\n | Layer 3: Network |\n | - Routing |\n | - Logical addressing |\n +-----------------------------------+\n | Layer 2: Data Link |\n | - Frame creation/interpretation|\n | - MAC addressing |\n +-----------------------------------+\n | Layer 1: Physical |\n | - Transmission of raw bits |\n +-----------------------------------+\n
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/power2/","title":"The Power of 2","text":"Power of 2 Result 2^0 1 2^1 2 2^2 4 2^3 8 2^4 16 2^5 32 2^6 64 2^7 128 2^8 256 2^9 512 2^10 1,024 2^11 2,048 2^12 4,096 2^13 8,192 2^14 16,384 2^15 32,768 2^16 65,536 2^17 131,072 2^18 262,144 2^19 524,288 2^20 1,048,576 2^21 2,097,152 2^22 4,194,304 2^23 8,388,608 2^24 16,777,216 Bit Position Possible Values 1 128 2 192 3 224 4 240 5 248 6 252 7 254 8 255","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/subnetting-101/","title":"Subnetting 101","text":"\ud83d\udd15 Do not be alarmed. Most people use a subnet calculator in the real world. \ud83d\ude0c Here is my go to Visual Subnet Calc.
But it is handy to know the basic theory. \u2406
In most programming languages, arrays and sequences start at index 0. This convention carries over to how we count positions in a binary number. It aligns with the way memory addresses and offsets are calculated in computer systems.
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/subnetting-101/#an-octets-decimal-values","title":"An Octets Decimal Values \u266b","text":"When we talk about aggregating subnets, we're basically trying to find a bigger subnet that can neatly fit all these smaller subnets inside it.
We're looking for the common ground here, the starting point that fits all these ranges. If we look closely, all the addresses start with \"10.\", which is our first clue. After the \"10.\", things start to get different, so that's where we need to focus.
When we do a bit of magical binary conversion and comparison, we find that the common bits in all these addresses go up to the first 8 bits (that's the \"10\" part). After that, the bits start to differ.
So, if we were to aggregate these networks, our new subnet would start at 10.0.0.0. But what about the mask? Well, since we only have the first 8 bits in common, our new mask would be 255.0.0.0.
Therefore, your aggregated subnet would be 10.0.0.0 with a subnet mask of 255.0.0.0. This big subnet umbrella can cover all your smaller subnets like a cozy blanket! \ud83c\udf10\ud83d\udcbb\ud83c\udf89
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/super-lloret/#or-to-get-more-granular","title":"Or to get more granular...","text":"Network IP Address Binary Representation (First 10 bits) LAN 10.1.0.1 00001010.00 STAFF 10.70.0.1 00001010.01 BYOD 10.110.0.1 00001010.01 GUEST 10.120.0.1 00001010.01","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/trace/","title":"Trace","text":"traceroute bad.horse\ntraceroute to bad.horse (162.252.205.157), 64 hops max, 52 byte packets\n 1 192.168.200.254 (192.168.200.254) 2.121 ms 2.470 ms 2.295 ms\n 2 79.173.166.153 (79.173.166.153) 2.599 ms 3.316 ms 2.614 ms\n 3 195.167.176.78 (195.167.176.78) 3.516 ms 3.514 ms 3.220 ms\n 4 lon00-br0.as5631.net (83.143.228.238) 4.232 ms 3.710 ms 3.021 ms\n 5 xe-9-1-2.edge3.london2.level3.net (212.113.9.201) 3.169 ms 3.103 ms 2.936 ms\n 6 ae1.8.bar4.toronto1.level3.net (4.69.218.54) 90.796 ms 90.944 ms 90.892 ms\n 7 level3-gw.core02.tor1.prioritycolo.com (4.16.51.30) 91.740 ms 91.998 ms 91.592 ms\n 8 67.223.96.90 (67.223.96.90) 91.401 ms 91.863 ms 91.377 ms\n 9 bad.horse (162.252.205.130) 91.974 ms 91.953 ms 91.525 ms\n10 bad.horse (162.252.205.131) 97.062 ms 96.838 ms 98.465 ms\n11 bad.horse (162.252.205.132) 101.131 ms 98.995 ms 99.642 ms\n12 bad.horse (162.252.205.133) 106.636 ms 106.428 ms 106.886 ms\n13 he.rides.across.the.nation (162.252.205.134) 111.930 ms 112.171 ms 131.932 ms\n14 the.thoroughbred.of.sin (162.252.205.135) 116.678 ms 116.763 ms 116.639 ms\n15 he.got.the.application (162.252.205.136) 129.628 ms 121.732 ms 119.512 ms\n16 that.you.just.sent.in (162.252.205.137) 127.010 ms 127.023 ms 125.168 ms\n17 it.needs.evaluation (162.252.205.138) 129.663 ms 131.599 ms 131.342 ms\n18 so.let.the.games.begin (162.252.205.139) 137.167 ms 136.652 ms 134.110 ms\n19 a.heinous.crime (162.252.205.140) 142.548 ms 140.485 ms 141.390 ms\n20 a.show.of.force (162.252.205.141) 146.570 ms * 146.862 ms\n21 a.murder.would.be.nice.of.course (162.252.205.142) 150.387 ms 152.285 ms 148.757 ms\n22 bad.horse (162.252.205.143) 156.445 ms 156.839 ms 156.380 ms\n23 bad.horse (162.252.205.144) 161.859 ms 161.328 ms 161.561 ms\n24 bad.horse (162.252.205.145) 167.209 ms 166.741 ms 165.658 ms\n25 he-s.bad (162.252.205.146) 171.489 ms 169.464 ms 169.579 ms\n26 the.evil.league.of.evil (162.252.205.147) 175.822 ms 176.793 ms 176.918 ms\n27 is.watching.so.beware (162.252.205.148) 181.350 ms 181.487 ms 181.877 ms\n28 the.grade.that.you.receive (162.252.205.149) 186.980 ms 186.881 ms 183.815 ms\n29 will.be.your.last.we.swear (162.252.205.150) 191.504 ms 192.136 ms 191.605 ms\n30 so.make.the.bad.horse.gleeful (162.252.205.151) 194.137 ms 196.883 ms 196.596 ms\n31 or.he-ll.make.you.his.mare (162.252.205.152) 201.546 ms 201.798 ms 201.274 ms\n32 o_o (162.252.205.153) 206.265 ms 207.723 ms 206.742 ms\n33 you-re.saddled.up (162.252.205.154) 323.803 ms 211.544 ms 211.737 ms\n34 there-s.no.recourse (162.252.205.155) 216.559 ms 217.206 ms 216.652 ms\n35 it-s.hi-ho.silver (162.252.205.156) 223.292 ms 333.837 ms 248.602 ms\n36 signed.bad.horse (162.252.205.157) 221.292 ms 221.970 ms 297.960 ms\n
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/whoami/","title":"Whoami","text":"Here is an image showing a group of diverse cavemen inventing the decimal system, with thought bubbles depicting their dreams of future computers, branded with \"Lloret Control Systems\", and used for counting a vast number of antelopes. The scenes blend primitive settings with futuristic elements.
","tags":["pending","Example"]},{"location":"Placeholder-Content/Subnetting/wild/","title":"Wildcards","text":"Aspect Wildcard Mask Subnet Mask Purpose Used in Access Control Lists (ACLs) to specify which IP addresses to permit or deny access to. Used in IP addressing to divide a network into subnetworks and determine the network and host portions of an IP address. Format Inverse of subnet mask. It marks the bits that are to be matched with the corresponding bits in an IP address. Binary mask with 1s indicating the network portion and 0s indicating the host portion. Representation Typically represented with the \"wildcard bits\" keyword in ACLs, followed by a series of four octets with values between 0 and 255 separated by dots. Example:0.0.0.255
Represented using the same dotted decimal format as IP addresses, with a varying number of bits set to 1. Example: 255.255.255.0
Usage Example To permit access to IP addresses within a specific range, specify the wildcard mask in an ACL entry. Example: permit 192.168.1.0 0.0.0.255
allows all addresses in the 192.168.1.0/24
subnet. To define network boundaries within an IP address range, apply the subnet mask to the IP addresses. Example: 192.168.1.0/24
represents a subnet with a subnet mask of 255.255.255.0
. Network Calculation To calculate the network ID from an IP address, perform a bitwise AND operation with the IP address and the wildcard mask. To calculate the network ID from an IP address, perform a bitwise AND operation with the IP address and the subnet mask.","tags":["pending","Example"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/","title":"Allied Telesis","text":"pending
","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/documents/","title":"Documents","text":"CAT-ENT Training
The Training Instructions 2020 - Student 4 from Allied Telesis.
The CAT-ENT.pptx from Allied Telesis.
The CAT-ENT-INTRO from Allied Telesis.
CAP-ENT Training
The Training Instructions 2020 - Student 4 from Allied Telesis.
The CAP-ENT.pptx from Allied Telesis.
The CAP-ENT-INTRO).pdf from Allied Telesis.
The CAP-ENT-EXTENDED.pdf from Allied Telesis.
pending
","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/training/","title":"Introduction","text":"Alas, my Company has a preference for Allied Telesis, as a cheaper alternative.
Value Engineering, so they say.
So I have to learn it.
Manager Friendly
I have touched Allied Telesis before. My former employer had a lucky dip smattering of Allied Telesis in the Network i would occasionally stumble upon. I remember them well because they were known by the slang manager friendly due to the default credentials being manager:friend
! that chimed with the lower price point... to the chagrin of the Network Team.
The CAP/ENT training course provides knowledge of the AlliedWare Plus operating system.
The course ends with an open-book multiple-choice exam.
Monday 5th February 2024 - Wednesday 7th February 2024
A remote lab is provided for the course. You SHH to a Linux box and onward to the console of the Allied Telesis Firewall & Switches.
No StackHost AT-LAB-FW\n Hostname uk-1.training.alliedtelesis.com\n User training41\n # Welcome 4 (1)\n # manager (2)\n # friend (3)\n\nHost AT-LAB-530-ONE\n Hostname uk-1.training.alliedtelesis.com\n User training42\n\nHost AT-LAB-530-TWO\n Hostname uk-1.training.alliedtelesis.com\n User training43\n
Use lsof -i tcp:22
to see the SSH sessions to the lab devices. In our case we have x2 per lab device as we are passing a linux jump box to reach the device console.
The command lsof -i tcp:22
is used in Unix-like operating systems to list open files and network connections. The components of this command (lsof, -i, tcp:22) each have specific meanings:
lsof
: This stands for \"List Open Files\". lsof is a command-line utility that provides information about files that are opened by processes. In Unix and Linux systems, almost everything is treated as a file, including physical devices, directories, and network sockets.
-i
: This option tells lsof to show network connections. When used without any additional parameters, -i lists all network files. However, it can be further narrowed down with additional parameters like protocol type (TCP or UDP) and port numbers.
tcp:22
: This further filters the lsof output to show only TCP connections (due to tcp) that are using port 22. Port 22 is the default port for SSH (Secure Shell) connections, which are used for securely accessing remote machines.
\u279c ~ lsof -i tcp:22\n\nCOMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME\nssh 94715 lukeoson 4u IPv4 0x52af948b88c31015 0t0 TCP 192.168.1.108:61894->194.73.86.54:ssh (ESTABLISHED)\nssh 94715 lukeoson 5u IPv4 0x52af948b88c31015 0t0 TCP 192.168.1.108:61894->194.73.86.54:ssh (ESTABLISHED)\nssh 94838 lukeoson 4u IPv4 0x52af948b8986327d 0t0 TCP 192.168.1.108:61928->194.73.86.54:ssh (ESTABLISHED)\nssh 94838 lukeoson 5u IPv4 0x52af948b8986327d 0t0 TCP 192.168.1.108:61928->194.73.86.54:ssh (ESTABLISHED)\nssh 94938 lukeoson 4u IPv4 0x52af948b8862e705 0t0 TCP 192.168.1.108:61965->194.73.86.54:ssh (ESTABLISHED)\nssh 94938 lukeoson 5u IPv4 0x52af948b8862e705 0t0 TCP 192.168.1.108:61965->194.73.86.54:ssh (ESTABLISHED)\n
And you get a topology like this:
","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/training/#at-trn-capent-training","title":"AT-TRN-CAP/ENT Training","text":"","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/training/#stacking","title":"Stacking","text":"The first thing we did was unstack the switches. Couple of reboots required to remove the provisioned devices and renumber to 1. This exercise was to prepare the lab for the content to follow.
No Stackawplus(config)#no stack 1 enable\nawplus(config)#no switch 2 provision\nawplus(config)#end\nawplus#write memory\nawplus#reload # (1)\n
With the devices unstacked we can proceed to the course content.
","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/training/#spanning-tree","title":"Spanning Tree","text":"The first module covered some Spanning Tree features.
awplus# configure terminal\nawplus(config)# interface port1.0.1\nawplus(config-if)# spanning-tree guard root # (1)\n
Verify with show spanning-tree brief
.
awplus# configure terminal\nawplus(config)# interface port1.1.2\nawplus(config)# spanning-tree portfast\nawplus(config-if)# spanning-tree portfast bpdu-guard enable (1)\n
awplus# configure terminal\nawplus(config)# spanning-tree errdisable-timeout enable (1)\nawplus(config)# spanning-tree errdisable-timeout interval 50 (2)\n
Usage:
specifies the time interval after which a port is brought back up when it has been disabled by the BPDU guard feature
awplus(config)# loop-protection loop-detect ldf-interval 5 (1)\nawplus(config-if)# loop-protection action link-down (2)\nawplus(config-if)# loop-protection timeout 10 (3)\n
Warning
Always remove loop-protection loop-detect ldf-interval 5
when enabling EPSR.
2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on port2.0.26 by 0202.0ayy.xxxx on VLAN 20\n2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on port1.0.25 by 0202.0ayy.xxxx on VLAN 2\n2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on sa50 by 0202.0ayy.xxxx on VLAN 2\n
","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/training/#advanced-vlan","title":"Advanced VLAN","text":"","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/training/#espr-diable-loop-prevention","title":"ESPR - diable loop prevention!","text":"","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/training/#acl","title":"ACL","text":"","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/training/#lldp","title":"LLDP","text":"Spanning tree Ports blocked by a spanning tree protocol can still transmit and receive LLDP advertisements. 802.1x Ports blocked by 802.1x port authorization cannot transmit or receive LLDP advertisements. If LLDP has stored information for a neighbor on the port before it was blocked, this information will eventually time out and be discarded. VLAN tagging LLDP packets are untagged; they do not contain 802.1Q header information with VLAN identifier and priority tagging. Virtual Chassis Stacking (VCStack) resiliency link When a port is configured as a VCStack resiliency link port, LLDP does not operate on the port; LLDP neither transmits nor receives advertisements, and any LLDP configuration and data stored for the port, including counters, is discarded. Mirror ports * LLDP does not operate on mirror analyzer ports
``` py linenums=\"1\" title=\"LLDP\" hl_lines=\"1 2\"
","tags":["pending"]},{"location":"Placeholder-Content/Vendors/Allied-Telesis/training/#at-trn-capent-exam","title":"AT-TRN-CAP/ENT-EXAM","text":"","tags":["pending"]},{"location":"assets/icons/affinity-master/","title":"Affinity symbol set","text":"Free 2D symbols for computer network diagrams.
"},{"location":"assets/icons/affinity-master/#why","title":"Why?","text":"Simple. I wanted modern, crisp, pixel-perfect, printable, manufacturer independent symbols for computer-network topology that does not look like they were made in the 80s.
"},{"location":"assets/icons/affinity-master/#want-to-change-color","title":"Want to change color?","text":"sed -e \"s/rgb(77,77,77)/rgb(45,103,185)/\" c_shield_gray.svg > c_shield_blue.svg
Click the play button below to listen to the audio version of this post.
Whoops - Terrible Audio Quality! Update in Progress. Sorry.
Your browser sucks and does not support the audio element.
","tags":["Science","Biology","DNA","Evolution"]},{"location":"blog/2024/07/04/life-as-no-one-knows-it-the-physics-of-lifes-emergence/#gist","title":"Gist","text":"Assembly Theory. Life is complex molecular structures and pathways.
","tags":["Science","Biology","DNA","Evolution"]},{"location":"blog/2024/07/04/life-as-no-one-knows-it-the-physics-of-lifes-emergence/#summary","title":"Summary","text":"Life as No One Knows It: Assembly Theory and the Search for Life\u2019s Origins introduces a fresh perspective on life by focusing on the complexity of molecular assembly. By rethinking life as a continuum of assembly complexity rather than a strict category, Walker and Cronin challenge existing paradigms and open new avenues for understanding life\u2019s origins and detecting it in the universe. While their approach leans heavily towards complexity and speculative thinking, it provides a thought-provoking framework that could reshape the scientific and philosophical discourse on what it means to be alive.
","tags":["Science","Biology","DNA","Evolution"]},{"location":"blog/2024/07/04/life-as-no-one-knows-it-the-physics-of-lifes-emergence/#terms-concepts","title":"Terms & Concepts","text":"Helpful Context & Definitions
I can't decide if this is a theory of the intuitively obvious or a profound new imagining of... everything ever.
","tags":["Science","Biology","DNA","Evolution"]},{"location":"blog/2024/07/04/life-as-no-one-knows-it-the-physics-of-lifes-emergence/#whiteboard","title":"Whiteboard","text":"","tags":["Science","Biology","DNA","Evolution"]},{"location":"blog/2024/07/04/life-as-no-one-knows-it-the-physics-of-lifes-emergence/#quotes","title":"Quotes","text":"What modern science has taught us is that life is not a property of matter.
Physicists and chemists see very intimately what the rest of us who think life exists cannot: there is no magic transition point where a molecule or collection of molecules is suddenly \u201cliving.\u201d
Life is the vaporware of chemistry: a property so obvious in our day-to-day experience\u2014that we are living\u2014is nonexistent when you look at our parts.
","tags":["Science","Biology","DNA","Evolution"]},{"location":"blog/2024/07/04/life-as-no-one-knows-it-the-physics-of-lifes-emergence/#reference-content","title":"Reference Content","text":"Sara Imari Walker - Santa Fe Institute Profile
Sara Imari Walker - Google Scholar
Sara Imari Walker - Joe Rogan Experience #2184
","tags":["Science","Biology","DNA","Evolution"]},{"location":"blog/2024/07/04/life-as-no-one-knows-it-the-physics-of-lifes-emergence/#review-status","title":"Review Status","text":"Click the play button below to listen to the audio version of this post.
Your browser does not support the audio element.
","tags":["Systems","Futurism","Politics"]},{"location":"blog/2024/08/01/book-review-of-the-the-fourth-turning-by-william-strauss--neil-howe/#gist","title":"Gist","text":"Generational theory suggests that history moves in cycles. According to Strauss and Howe, we are currently in the Crisis phase of the Fourth Turning.
","tags":["Systems","Futurism","Politics"]},{"location":"blog/2024/08/01/book-review-of-the-the-fourth-turning-by-william-strauss--neil-howe/#summary","title":"Summary","text":"The Fourth Turning argues that history follows a predictable cycle, divided into four generational archetypes (Prophet, Nomad, Hero, Artist) and four turnings or stages (High, Awakening, Unraveling, Crisis). Each turning represents a different phase of social mood, driven by the behavior and values of the generations in power. Currently, we are in the \"Fourth Turning\" or Crisis phase, which will reshape society and create a new social order.
","tags":["Systems","Futurism","Politics"]},{"location":"blog/2024/08/01/book-review-of-the-the-fourth-turning-by-william-strauss--neil-howe/#terms-concepts","title":"Terms & Concepts","text":"Helpful Context & Definitions
The High: Societal rebuilding following a crisis (Prophet, Idealist Archetype)
The Awakening: Cultural upheaval (Nomad, Reactive Archetype)
The Unraveling: Fragmentation of society (Hero, Civic Archetype)
The Crisis: Systemic shock (Artist, Adaptive Archetype)
Relevance of Cycles in Modern Society: The cyclical nature of history is particularly relevant today, aligning with the current social and political tensions of the \"crisis\" phase. Will this crisis lead to structural reform or just reset the cycle?
Generational Leadership: Transitioning leadership from Baby Boomers (Prophet) to Generation X (Nomad) and Millennials (Hero) could influence the societal response to crises.
Predictive Power: While the book claims predictive accuracy, history is shaped by unpredictable factors (e.g., technological advancements, environmental shifts). The framework is useful but not absolute.
Crisis as a Catalyst for Innovation: Historically, crises have sparked technological and social advancements. The current crisis could drive breakthroughs in sustainability, AI, and governance.
Cross-Cultural Applicability: The theory primarily focuses on Western societies, particularly the U.S. Can it apply to other cultural and political systems? The universality of the theory is debatable.
The generational theory in The Fourth Turning provides a compelling framework for understanding society\u2019s recurring patterns and future shifts, emphasizing the importance of recognizing these cyclical changes.
","tags":["Systems","Futurism","Politics"]},{"location":"blog/2024/08/01/book-review-of-the-the-fourth-turning-by-william-strauss--neil-howe/#whiteboard","title":"Whiteboard","text":"","tags":["Systems","Futurism","Politics"]},{"location":"blog/2024/08/01/book-review-of-the-the-fourth-turning-by-william-strauss--neil-howe/#quotes","title":"Quotes","text":"History moves in cycles, and Winter is coming.
Each generation\u2019s response to the social moment shapes the next era.
","tags":["Systems","Futurism","Politics"]},{"location":"blog/2024/08/01/book-review-of-the-the-fourth-turning-by-william-strauss--neil-howe/#reference-content","title":"Reference Content","text":"The Fourth Turning - Wikipedia The Fourth Turning - YouTube
","tags":["Systems","Futurism","Politics"]},{"location":"blog/2024/08/01/book-review-of-the-the-fourth-turning-by-william-strauss--neil-howe/#review-status","title":"Review Status","text":"Your browser does not support the audio element.
","tags":["Biology","Evolution","Psychology"]},{"location":"blog/2024/05/13/book-review-of-behave-by-robert-sapolsky/#gist","title":"Gist","text":"Sapolsky presents a deterministic view rooted in biology and neuroscience. His approach emphasizes empathy and explores the ethical implications of human behavior, pushing us towards a nuanced, context-sensitive understanding of actions.
","tags":["Biology","Evolution","Psychology"]},{"location":"blog/2024/05/13/book-review-of-behave-by-robert-sapolsky/#summary","title":"Summary","text":"Behave: The Biology of Humans at Our Best and Worst is an intricate exploration of the myriad factors influencing human behavior. Sapolsky argues that behavior cannot be understood through a single lens but is shaped by a complex interplay of biological, environmental, and cultural factors. He blends reductionist explanations (biological mechanisms) with holistic perspectives (sociocultural influences), offering an in-depth view of why humans act the way they do.
","tags":["Biology","Evolution","Psychology"]},{"location":"blog/2024/05/13/book-review-of-behave-by-robert-sapolsky/#terms-concepts","title":"Terms & Concepts","text":"Helpful Context & Definitions
Sapolsky's deterministic view of human behavior, grounded in biology and neuroscience, is tempered by a commitment to empathy and the ethical implications of understanding behavior. He challenges readers to move beyond simple dichotomies like good and evil and to embrace a more integrated, context-sensitive view of human actions.
","tags":["Biology","Evolution","Psychology"]},{"location":"blog/2024/05/13/book-review-of-behave-by-robert-sapolsky/#whiteboard","title":"Whiteboard","text":"","tags":["Biology","Evolution","Psychology"]},{"location":"blog/2024/05/13/book-review-of-behave-by-robert-sapolsky/#quotes","title":"Quotes","text":"The brain is heavily influenced by genes. But from birth through young adulthood, the part of the human brain that most defines us (frontal cortex) is less a product of the genes with which you started life than of what life has thrown at you.
","tags":["Biology","Evolution","Psychology"]},{"location":"blog/2024/05/13/book-review-of-behave-by-robert-sapolsky/#reference-content","title":"Reference Content","text":"Robert Salpolsky - Wikipedia Robert Salpolsky talks Behave - YouTube
","tags":["Biology","Evolution","Psychology"]},{"location":"blog/2024/05/13/book-review-of-behave-by-robert-sapolsky/#review-status","title":"Review Status","text":"The AutoCon conferences have been remarkable gatherings of our network automation tribe. The Network Automation Forum (NAF) has fostered an engaged, curious community that's pushing toward what's possible in automated network infrastructure. We\u2019re all very thankful for the passion of Chris & Scott in their efforts to bring \u2018our people\u2019 together\u2026 and we hope they get very rich along the way! They deserve all the accolades, and more besides. Take a Bow.
Side Note: Help Me Understand the Money Flow - RFCThey say you should follow the money... and I\u2019m eager to better grasp the macro economics of our sector in transition. A theme I\u2019ll be exploring in more depth later. As my career progresses, i'm looking for ways to add extreme business value structurally - beyond incremental business efficiency in project delivery and design. I want to lead. My initial presumption is we are seeing a slow burn realignment of allocated capital that will be of great benefit to the thought leaders in our space. If anyone can help me understand this better\u2026 please reach out.
I\u2019m patient - but I too would like to be rich before I die:
Let\u2019s begin with the NAF's negatively framed tagline and central question: \"Why hasn't network automation seen full adoption yet?\u201d which is an appropriately provocative query but strikes me as somewhat out of whack. Mostly because I believe we are in the new golden era of networking, filled with the most exciting tools, systems, and platforms, and an unprecedented tolerance for experimentation and failure. It\u2019s ironic that many of the vendors we moan about as automation obstacles have, in their oligopolistic malaise, opened the market for the very companies sponsoring these conferences, allowing them to thrive in spaces previously under the iron fist of the big hardware players.
These conferences are for engineers rather than companies so its appropriate to interrogate that question with more regard to our professional fulfillment and joy as network tinkerers, as opposed to accrued business value as corporate stooges - ultimately crucial though that is! And from that perspective, as far as I can tell, everything is going great! But I\u2019m a moron so don\u2019t listen to me.
Let's get into what I\u2019ve gathered from these conferences, focusing on my favorite presentations from the most recent AutoCon1 in Amsterdam (because the content was much better than AutoCon0 in Denver), before placing all this in the context of where I see network automation heading and drawing a quasi analogy to the current intellectual zeitgeist of societal loops and The Four Turnings. It\u2019s a stretch... but it kinda fits.
The Cycle of Life (and Networks)
All that's old is new again. Plan, Build, Operate. Design, Implement, Maintain. Prepare, Deploy, Manage. Architect, Execute, Optimize. Observe, Engage, Act. We all have one of those circular diagrams. We've seen every iteration of them. We use them because they are true in some conceptual or actual sense. They're a compelling frame of reference for conveying what the hell is going on. And usually hide much murkiness.
graph LR\n A[Plan] --> B[Build] --> C[Operate] --> D[BLAH] --> E[to Infinity & Back]
Anyone noticed the migration back to CLI implementations abstracting new-fangled automation tools of late? All that's old is new again. Full circle. How Meta is that.
","tags":["Network-Automation","Network-Community","Conference"]},{"location":"blog/2024/09/16/autocon-reflections/#dinesh-the-contrarian","title":"Dinesh the Contrarian","text":"At AutoCon1, Dinesh delivered a compelling keynote with the tagline \"A Contrarian Perspective\". His use of the phrase, \u201cHistory doesn\u2019t repeat, but it certainly rhymes,\u201d set the tone for a talk that challenged some of the conventional wisdom in network automation. And will assist me in folding in the Four Turnings analogy later in this post.
My real time notes included:
Primordial Soup: He likened the rise of Network Engineers and Developers as evolving from the same \"primordial soup,\" yet diverging into different technical lineages. Different species can\u2019t reproduce!
Configuration Management \u2260 Automation: Dinesh emphasized that configuration management isn\u2019t real automation. Today, it\u2019s more about validation - automating the processes that ensure configurations are correct and in line with policy.
Python is the New OpenFlow: One provocative statements was, \"Python is the new OpenFlow.\" While Python has become a defacto tool for many, Dinesh warned that this won\u2019t be the endgame. He compared Python to OpenFlow\u2019s failure due to its high-level abstraction, implying that simply knowing Python isn\u2019t sufficient.
The Myth of a Uniform Data Model: He argued that the industry\u2019s dream of a uniform data model across vendors is a myth. Vendors will always vendor, meaning they\u2019ll continue to prioritize their own ecosystems over true interoperability. Broken hearts all round. More on this later.
Avoid the Go-Lang Bandwagon: Dinesh advised against pushing specific languages like Go-Lang without considering the bigger picture of where the industry came from versus where it\u2019s headed. He drew an empathetic cord that spoke to people like me that love our field of play but are not genetically built for it. We need tools that democratize the playing field and are accessible to amateurs as well as AutoGods. Praise be upon him.
This led to a deeper reflection on what the next generation of tools will be, coining the term Tools 2.0
, a theme that continued in discussions throughout the conference. I presume his unsaid rift here is \u201cOh, SuzieQ, baby, (we should) love you\u201d. And we really do, so Thank You!
Among all the speakers, Claudia De Luna of Gratuitous Arp, delivered what I believe was the best talk of the AutoCons to date. She drew a powerful analogy between the stages of network automation maturity and the space flight missions that led to the Apollo moon landing.
My real time notes included:
Mercury: The early days of automation\u2014akin to manually copying and pasting configurations. We were simply orbiting the earth, building basic scripts, and laying groundwork.
Gemini: This phase was about endurance\u2014engineers started creating automation scripts that could be triggered manually but in a reliable way, much like the longer-duration Gemini missions that bridged the path to Apollo.
Apollo: Full automation, akin to landing on the moon. Fully automated workflows are triggered with minimal human intervention, solving complex problems autonomously.
\u201cWho really needs Apollo-level automation?\u201d Claudia challenged us, pointing out that some businesses are aiming for complete automation when, in reality, a more practical level of automation may be sufficient right now while we figure things out as a community and refine corporate ecosystems.
It\u2019s a question worth pondering: How far do we actually need to go? And more importantly, what\u2019s the cost of pushing automation too far too soon in our current quasi nascent state?
Claudia is Awesome
I was fortunate to have the opportunity to interact with Claudia a bit during the Workshops in the days prior to the main conference. She was a stand out wonderful person I admired very much. She will be an essential resource and important player as we quest towards Mars. May the force be with her.
","tags":["Network-Automation","Network-Community","Conference"]},{"location":"blog/2024/09/16/autocon-reflections/#wim-kubed-the-network","title":"Wim Kubed the Network","text":"Thank You Nokia! By far the best of the Workshops was Nokia\u2019s Container Lab session delivered by our communities shining light, Roman. What an incredibly impressive person he is. Respect. We have much to thank Nokia and its exceptional people for. Their approach to open sourcing community tools that deliver outstanding value and assist in building the automation ecosystem is a credit to clever capitalism done right. Container Lab is very well covered in a million community posts so I won\u2019t spend any time on it here - other than to bridge this post toward Wim and Kubenet by linking to the latest iteration\u2026 Clabernetes. Check it out!
One of the most impressive takeaways from AutoCon1 was Wim's introduction of Kubenet, a new tool from Nokia. Wim, the Head of Technology and Architecture IP at Nokia, has been a shining light and thought leader within the NAF AutoCon community, much respected as an authority in the field.
Wim opened his session by noting how Nokia's approach to making tools like Container Lab and SR Linux freely available has been well-received by the community. He teased the audience by asking if we wanted more, to muted applause. Mostly because we are an introverted bunch incapable of expressing our emotions with appropriate flare. Inside we were all applauding rapturously, I\u2019m sure.
Wim\u2019s presentation was delightfully paced. He took us through Kubernetes as a reference framework for Network Automation before expounding in more detail on how our community can leverage the Kubernetes ecosystem to do more than orchestrate containers and explained the path to Kubenet as a new tool for configuring Network devices. This is the promised land for those us who have spent the last decade tinkering with field adjacent activities like Dev-Ops, Cloud, SRE, etc & infinity.
My real time notes included:
Wim began outlining Nokia\u2019s approach to network automation requirements, stipulating that the new era must be:
Wim then outlined what Kubernetes does for us to achieve our before stated aims. Kubernetes as the platform to do network automation because it is Open source, API Centric, Declarative, Extendable, Continuously Reconciliatory, Collaborative, Event Driven, AI Enabled, and has a Huge knowledge Base. Boom!
Wim tabled the current use cases of Kubernetes amongst our technical peers as a tool for automating and orchestrating Containers, VMs, Clouds, Bare metal, Storage, Server workloads, Applications, mobile core/RAN and emergent AI use cases\u2026 notice anything missing that is close to our hearts? Why can\u2019t we leverage the outstandingly mature ecosystem of Kubernetes to automate our Networks? Awkward pause... Wim is a practical guy - so he birthed and built KubeNet himself! And all glory goes to him.
All these industries use Kubernetes so why not Networks? Wim is on a mission so we can use Kubernetes to do just that. Dinesh would doubtless call this Tools 2.0. I would venture this is a giant leap, let\u2019s be conservative and say Tools 2.5. As we will touch upon later in this post\u2026 some of us still have hope!
Making networks consumable with Kubernetes:
As we\u2019ve seen, many other industries are adopting Kubernetes and we don\u2019t want networking to be left behind. Particularly given we have bunch of people on social media grabbing the limelight with the tagline takeaway from AutoCon0 in Denver: \u201cMake Network Engineering Cool Again!\u201d
Wim impressed upon us a new frame of reference. We can think of Kubernetes as a container life cycle management tool, sure - got it. Kubenet at is core is not focused on that! Rather than delivering containers Kubenet is delivering Network Artifacts. Using Vendor, Abstract, and Automation layer APIs. So rather than instantiating a POD we are configuring network devices. Using APIs constructs to generate and push config to network boxes. Whoa!
Kubenet will take our protocol abstract parameters which form our intent and then build what we need for our network to operate. Then provide a continuous reconciliation loop to check what we have against what we want and keep it in sync. Lovely.
I for one can\u2019t wait to see this project develop. I encourage people to keep a keen eye on (frankly everything Nokia is doing) but Wim & Roman in particular are just straight forwardly smashing it. Well done.
Kubenet is written in Go and will need a scaled out Kubernetes cluster in production - maybe you\u2019ll learn these skills (I\u2019m trying) or otherwise throw it over the fence to your Dev-Ops or SRE Team. But it\u2019s about time we leveraged the whole ecosystem from Kubernetes. And Kubenet will help us learn how to build APIs. As this is required to define new services in Kubernetes. But don\u2019t panic, Kubenet is an orchestrator so you can leverage Python, Ansible, Terraform from Kubenet to bring the Network change to life. Exciting times.
As Ethan said in the Packet Pushers interview that followed the presentation - this is A LOT!
Awe & Wonder Blooms
I\u2019m currently in the awe and wonder naive and blissfully ignorant stage. I\u2019m quite sure multitudinous skeptics and negative commentary will emerge that will prune my absurd expectations. I expect AutoCon2 in Denver this November to open my eyes to this project more. But right now I\u2019m just grateful for Wim and everything Nokia are doing to bridge the gap to our dreams. Thank you.
And now for my exquisitely profound (i\u2019m British) insight to bring this all together as we approach the \u201cmoment of the conference\u201d and the battle of accrued wisdom and naive hope. AutoCon folklore starts here.
","tags":["Network-Automation","Network-Community","Conference"]},{"location":"blog/2024/09/16/autocon-reflections/#automation-lost-in-the-wash","title":"Automation - Lost in the Wash?","text":"For those unfamiliar The Fourth Turning is a description of societal change through cycles. The intellectual zeitgeist posits we are currently living through the Crisis period where societies are forced to rebuild, new institutions are forged, and unity emerges from chaos. Is there an analogy to be drawn to our evolution from conventional Network Engineering to our new tribe of Network Automation professionals? Kind of. Shaky. But i\u2019ve started so I\u2019ll finish.
The High, The Awakening, The Unraveling, and The Crisis
Applying this to the networking industry, it's tempting to claim we're at the crisis point. But are we really there yet? Perhaps we're still in the Awakening or Unraveling phase? Opinions welcome!
The Awakening: Freedom-Seeking and Automation\u2019s Emergence
Currently, we see a surge in automation tools and a collective desire for freedom from traditional vendor constraints. Network engineers are actively experimenting with open-source projects and bespoke automation solutions, challenging the status quo. This mirrors the Awakening phase, where norms are questioned and innovation flourishes.
The Unraveling: Institutions Weaken, Networks Break
Alternatively, we might be in the Unraveling phase. Here, the institutions that once provided stability (traditional network vendors and their solutions) are weakening. We're witnessing the consequences of fragmented automation efforts, with individualized scripts and bespoke solutions leading to fragile networks.
Not Quite the Crisis Yet
While there's a palpable tension and concern about the future, it's arguable that we haven't hit the Crisis point. We\u2019re in the midst of a transformation where the old ways are being questioned, and new practices are being formed. The true crisis would come when the re-skilling becomes required, and network engineers find themselves needing to pivot significantly or face obsolescence. Right now we are very much flourishing as far as I can tell. It's a choose your own adventure landscape. At some future point those choices may depart the stage.
For now, we\u2019re navigating the complexities and contradictions of these transitions, but we haven\u2019t yet faced the full impact of what this automation-driven evolution will mean for the profession. I for one am totally cool with that. I suspect you are too.
","tags":["Network-Automation","Network-Community","Conference"]},{"location":"blog/2024/09/16/autocon-reflections/#peter-and-the-pipedream","title":"Peter and the Pipedream","text":"Towards the Moment of the Conference: \u201cI couldn't disagree with you more\u201d
The moment of the conference came at the very end of AutoCon1, in the questions following Peter's closing Keynote, which posed the question\u2026 \u201cAre we building Hall-9000 or Wall-E?\u201d
I was fortunate to attend the Workshops in the days proceeding the main conference. The Container Lab session from Nokia was the clear stand out. But Peter, who is the Tech Lead of the Workflow Orchestrator Program at SURF impressed with his demonstrable acumen and holistic orchestration perspective. Peter lives and breathes in the State sponsored and QANGO funded space. He is not subject to same commercial travails as most of us in the Enterprise & Telecoms money machines. Keep that in mind for later.
Peter's talk on the emergence of AIOPs referenced the desired architectural flow of Observe > Engage > Act. He explained the inherent need and urgency to lean into this ML & LLM assisted approach - as statistically evidenced by the lack of talent entering the networking profession. A timely reminder of that recurrent message that we need to Make Network Engineering Cool again. There are simply not enough of us.
An controversial take - I might get cancelled. It's supposed to be good natured. Trust.I have thoughts here - and a decidedly unpopular opinion I may develop another time\u2026 It\u2019s gone down like a lead balloon when I've brought it up in water cooler conversations at the AutoCons so far. Which makes me nervous to talk openly about it, but the gist is: We are no where close to as smart as we like to think we are! This field is full of comparatively poor technologists by reference to most other adjacent technical domains. Ut oh - I said it. To be clear - I'm in the bottom percentile, and, other than me, absolutely everyone that participates in NAF is to be excluded. This is the impressive tip of our community. But many in our profession would not be capable of transitioning to a legit development role. My argument being I'm of the few self aware or stupid enough to say it out loud. Note the ironically funny feedback loop there. There is loads more nuance as i'm well aware there is a small segment of our profession that actually build the products or engineer very large and crazy complex networks. But the vast swathe of network engineers are working for small time companies or public bodies flipping ports and tickets for a living. I suspect as people drift toward seniority much of this is lost. I think what i'm saying here is please bear in mind you lot are the cerebral few. (Although i'd also note many of the best minds likely consider NAF a community of trivialities so i do need to refine my arguments here.)
Peters point was that it\u2019s ridiculous to fear that AI will take our jobs. More likely, it will relieve some of the strain of an already lean and work burdened sector. We are all pretty bored of hearing this following the LLM early hype cycle so we can skip the detail.
When I saw the AutoCon1 speakers list Peter's talk title stood out as the most intriguing. I assumed it would elucidate a narrative questioning if we are building high performance intelligent compute capable of solving real world problems akin to Bostrom\u2019s 2014 SuperIntelligence predictions (Hall-9000) or if, in actuality, LLM models are just the first publicly notorious form of ML that can do a few fun and fluffy things and not much more (WALL-E). Alas, Peters talk did not pan out that way. My disappointment in the moment was ultimately salvaged by the debate that followed. Sweet!
But before we get to that, it\u2019s worth quickly summarizing Peter\u2019s take on Hollywood's historic commentary on AI themes.
My real time notes included:
Good vs Evil:
WALL-E is fluffy and nice:
Hall-9000 is something scary:
Peter declared that WALL-E & HALL-9000 started their life as good but malfunctioned into a stereotype. Before contextualising this to the here and now and our contemporary network automation agenda. So what now? Peter asked and answered - Intelligent Networks. AI will deliver the next paradigm.
Peter\u2019s conclusion was that Hollywood AI stereotypes should be avoided. (Shock horror. Not exactly the revelation I was hoping for. More a statement of the blindingly obvious.) Instead we need AIOPs for mundane tasks, so we can tackle more complex tasks. A perfectly fine perspective although I\u2019m intrigued to see how our definitions and conceptions of what complexity really is begin to break down in the coming years. Much is ponderously in flux right now.
SURF already have fully orchestrated provisioning. As displayed in their workshop of the Workflow Orchestrator they have built. You should check it out!
Peters description of what SURF are building for the next Network Iteration of their high performance network is:
Peters description of his aims designing and building SURFs next generation of networks was building toward his ultimate thesis:
It has to be open source and open standards. Therefore, Vendors need to provide us APIs that always look the same. Before declaring, with provocative emphasis, that Vendors need to support OpenConfig to enable multi vendor configuration.
In summing up, Peter said Automation enables Orchestration so we can unlock the potential of an Intelligent Network. It was a decent talk. Good points well made. He must have been feeling good about himself. Respect. Applause ensued. We had made it to the end of the conference and he must have had every expectation there would be a few soft ball questions and notional praise for all the great work he had done at SURF to build such a high performant network machine.
Then cometh Dinesh\u2026 \"I couldn\u2019t disagree with you more.\u201d
\u201cI couldn\u2019t disagree with you more. It\u2019s really important to understand the context in which we operate.\u201d
I\u2019ll paraphrase the rest of his awesome diatribe...
OpenConfig is zero. We have devices running that are a decades old. If it ain't broke don't fix mentalities mean these devices are not being replaced anytime soon. Dinesh insisted that the first thing we should stop as a community is continue our push to OpenConfig and other vendor agnostic plays. We need to stop harping on about the standard API because we are not going to get it. The longer we pursue this myth the longer we will be here asking why have we not seen full adoption of automation yet. We had the same problem from SNMP - it\u2019s not changed.
Of all the great lines being thrown back and forth during this wonderful exchange of frank opinions the most hilarious was:
Dinesh said:
\u201cWe somehow think we will tell the vendors to get together and sing Kumbaya - ain\u2019t happening!\u201d
To which Peter retorted:
\u201cMaybe I am naive and young - but I do have some hope.\u201d
Before Wim chimed in to provide a bridge between Dinesh & Peter by suggesting, in ways evocative of his prior KubeNet remarks, that perhaps we as a community could get together and build an abstraction layer, for at least some of it.
So what were we seeing here? People fighting for their Products. (Noting that their products are, of course, the product of their reasoned and considered thoughts) Just like every Vendor does
Dinesh has SuzieQ that is built around SSH discovery and interacting with Vendor CLI in order to be operable in the here and now.
Wim has KubeNet that will require the API abstraction layer to work.
Peter is building something shiny and new with vast quantities of public money that affords him the opportunity to think from first principles and behave aspiration-ally. And so he bloody should!
People have different motivations and contexts. I began this post by referencing the allocation of capital in our industry...
Dinesh & Peter are BOTH CORRECT
My thought here is they are obviously both correct. It\u2019s a question of perspective. The apparent disjunction between Dinesh & Peter is explained not just by the grizzled and wise vs young and hopeful thing. It\u2019s a function of the sectors in which they have built extraordinarily successful careers. Dinesh is in the brown trenches, and Peter is in the green clouds. All thats old is new again. And ultimately - follow the money.
We need more Peters. I'm proud of him for standing his ground to the extent he did. But, if it was me, i like to think I would have ripped Dinesh a new one - despite him being perfectly correct and sagely wise on the matter. If the University and Public sector is not pushing for Open Systems and vendor agnostic solutions then who the fuck is? In Peter we trust. The personification of a vitally important component of our wonderful technology ecosystem. After all, Elon built SpaceX off the back off NASA and Government funding. I wonder how long before Claudia gets to add the Mars mission to her space & automation analogies.
Whatever the truth and ultimate outcome\u2026 it was a great dialogue, as Scott made clear in his closing remark. A truly delightful exchange. Thanks much Claudia, Dinesh, Peter & Wim. I like to think we will reflect on this at AutoCon10. Or otherwise the robots at AutoCon1010. I wonder where we will be.
633ac91 (2024-09-17 19:54:58+01:00) by Luke Richardson
","tags":["Network-Automation","Network-Community","Conference"]},{"location":"blog/2021/01/01/the-greatest-shows-on-earth/","title":"The Greatest Shows on Earth","text":"","tags":["Network-Automation","Network-Community","Conference"]},{"location":"blog/archive/2024/","title":"2024","text":""},{"location":"blog/archive/2023/","title":"2023","text":""},{"location":"blog/archive/2021/","title":"2021","text":""},{"location":"blog/category/event-review/","title":"Event-Review","text":""},{"location":"blog/category/book-review/","title":"Book-Review","text":""},{"location":"blog/category/blog/","title":"Blog","text":""},{"location":"blog/category/professional-profile/","title":"Professional-Profile","text":""},{"location":"blog/category/media/","title":"Media","text":""}]} \ No newline at end of file diff --git a/sitemap.xml b/sitemap.xml new file mode 100644 index 00000000..6f996352 --- /dev/null +++ b/sitemap.xml @@ -0,0 +1,313 @@ + +Semantics: The study of meaning in language. Semantics focuses on how words, phrases, and sentences convey meaning.
+Grammar: The set of rules that govern the structure of sentences in a language, including word order, tense, and punctuation. Proper grammar helps ensure that language is clear and consistent.
+Syntax: The arrangement of words and phrases to create well-formed sentences in a language. Syntax refers to the structure of sentences and how different parts of speech are ordered.
+Understanding these terms helps you grasp the function of words in language, allowing you to communicate more effectively and appreciate the intricacies of how meaning is constructed. By knowing the types of words and concepts like grammar and syntax, you can better analyse, create, and understand the beauty of language.
+