Sunteți pe pagina 1din 3

Programming and Automating Cisco Networks

First Edition

Copyright © 2017 Cisco Systems, Inc.

ISBN-10: 1-58714-465-4
ISBN-13: 978-1-58714-465-3

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty
or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall
have neither liability nor responsibility to any person or entity with respect to any loss or damages arising
from the information contained in this book or from the use of the CD or programs accompanying it.

When reviewing corrections, always check the print number of your book. Corrections are made to printed
books with each subsequent printing.

First Printing: September 2016

Corrections for June 1, 2017

Pg Error – First Printing Correction


38 Chapter 2, Web Technologies- Data Should read:
Formatting, First Paragraph, Second
Sentence
Formatted data ensures proper type and
Reads: structure when working with a remote system.
Formatted data ensures proper type and
structure is when working with a remote
system.

Updated 06/01/2017
41 Chapter 2, Second Paragraph, Last Should read:
Sentence
Reads: The URL parameter is specified with the standard
The URL parameter is specified with http”?” followed by the data.
the standard http‘?” followed by the data.
41 Chapter 2, Note Should read:
Reads:

Note To find OpenWeatherMap city ids Note To find OpenWeatherMap city ids go
go,to http://openweathermap.org/find s to http://openweathermap.org/find search by zip
earch by zip code using “? code using “?zip=94040,us”
zip=94040,us”
44 Chapter 2, Note Should read:
Reads:
Note What is the “u”? The “u” Note What is the “u”? The “u” prefix signals that the
prefix signal that the following sting is following sting is encoded, or better said in this
encoded, or better said in this example, example, decoded in Unicode. Unicode is a widely
decoded in Unicode. Unicode is a widely accepted representation of text in a computer or
accepted representation of text in a protocol.
computer or protocol.
46 Chapter 2, Second Paragraph, Second Should read:
Sentence
Reads: A clone is a copy of the repository that is tracked for
A clone of a is a copy of the repository that changes.
is tracked for changes.

Updated 06/01/2017
70 Chapter 3, First Sentence after Figure 3-3 Should read:
Reads:
Some Nexus 9K device support ACI with a Some Nexus 9K devices support ACI with a simple
simple software change. software change.
73 Chapter 3, Third Paragraph, Fourth Should read:
Sentence
Reads: In the event the application moves, scales, or is
In the event the application moves, scales, removed, the APIC automatically reconfigures the
or is removed, the fabric automatically fabric.
reconfigures the fabric.
79 Chapter 3, First Paragraph, Fifth Sentence Should read:
Reads:
In many cases, troubleshooting an issues In many cases, troubleshooting issues related to path
related to path is useless because the path is useless because the path that caused the issue is
that caused the issue is no longer the no longer the current path, with no way to go back in
current path, with no way to go back in time and little indication of a reconvergence.
time and little indication of a
reconvergence.
79 Chapter 3, Third Paragraph Should read:
Reads:
There are two types of network engineers: There are two types of network engineers: those who
those who have experienced spanning tree have experienced spanning tree failure and those who
failure and those whot are about to! are about to!

This errata sheet is intended to provide updated technical information. Spelling and grammar misprints
are updated during the reprint process, but are not listed on this errata sheet.

Updated 06/01/2017

S-ar putea să vă placă și