This document discusses Cisco's Enterprise SDN solution and APIC-EM. It notes that digital business demands operational efficiency and agility, but that installing network circuits is still a manual process. It then introduces Cisco's Digital Network Architecture and APIC-EM, which provides automation, abstraction, policy control, and open programmability. APIC-EM applications can configure and provision network infrastructure in minutes rather than months through zero-touch deployment, accelerated roll-out of routers/switches/APs, and automated provisioning of solutions like IWAN with Cisco best practices.
Hope you did not miss our deep dive: Cisco APIC-EM: IT Speed and Simplicity Through Automation
Ronnie Ray walked through Cisco's purpose-built enterprise controller. Purpose build to help you move to software-defined networking (SDN) that works both on existing networks and on new infrastructure.
Watch and Listen to the workshop replay at cs.co/6017Bl8Kb
(check out the Digital Network Architecture episodes Part 1 and 2 at http://www.techwisetv.com)
You will learn how Cisco engineers created the world’s best network automation controller, which provides enterprise resiliency and scale, an open and extensible platform, and a full suite of policy-driven SDN applications.
You’ll learn about multiple time-saving apps that cover the complete network service lifecycle and drive policy enforcement consistently across the enterprise to make sure of zero-touch infrastructure deployment, quality of experience, and rapid troubleshooting.
Moving to software-driven networking is the future. Join us and find out how to start your journey today.
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
The document discusses Cisco's Application Policy Infrastructure Controller Enterprise Module (APIC-EM). It provides:
1) An overview of the APIC-EM architecture, which includes Cisco and third party applications, a network information database, policy infrastructure, and automation interfaces to simplify network management and expose network intelligence.
2) Examples of APIC-EM applications like path visualization, policy analysis, EasyQoS, Intelligent WAN, and Network Plug and Play that provide simplified management of networks, applications, and policies through an intuitive user interface and programming interfaces.
3) Details on how APIC-EM can integrate with Cisco Call Manager to dynamically insert and remove access control lists for voice and video calls to prioritize that traffic
Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
This session will cover new and upcoming innovations to our ISR4K routing platform, as well as introduce a new solution that simplifies operations and redefines architecture at the branch.
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
Yonatan Klein, Director of Product Management (AlgoSec)
While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.
Each part of your network estate is managed in its own independent silo instead of being holistically managed.
Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.
In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.
He covers how to:
- Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations
- Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices
- Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Canada
The document discusses how cyber attacks have evolved over time and how Cisco security solutions can help address modern threats. It provides examples of ransomware attacks and how Cisco mapped the attacker infrastructure involved. It then summarizes Cisco's Umbrella and Cloudlock solutions, emphasizing how Umbrella provides secure internet access and threat prevention through fast DNS resolution and intelligence-driven models, while Cloudlock focuses on securing usage of cloud apps and accounts.
Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends the security perimeter to the Internet - rendering network-centric security methods obsolete.
Hope you did not miss our deep dive: Cisco APIC-EM: IT Speed and Simplicity Through Automation
Ronnie Ray walked through Cisco's purpose-built enterprise controller. Purpose build to help you move to software-defined networking (SDN) that works both on existing networks and on new infrastructure.
Watch and Listen to the workshop replay at cs.co/6017Bl8Kb
(check out the Digital Network Architecture episodes Part 1 and 2 at http://www.techwisetv.com)
You will learn how Cisco engineers created the world’s best network automation controller, which provides enterprise resiliency and scale, an open and extensible platform, and a full suite of policy-driven SDN applications.
You’ll learn about multiple time-saving apps that cover the complete network service lifecycle and drive policy enforcement consistently across the enterprise to make sure of zero-touch infrastructure deployment, quality of experience, and rapid troubleshooting.
Moving to software-driven networking is the future. Join us and find out how to start your journey today.
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
The document discusses Cisco's Application Policy Infrastructure Controller Enterprise Module (APIC-EM). It provides:
1) An overview of the APIC-EM architecture, which includes Cisco and third party applications, a network information database, policy infrastructure, and automation interfaces to simplify network management and expose network intelligence.
2) Examples of APIC-EM applications like path visualization, policy analysis, EasyQoS, Intelligent WAN, and Network Plug and Play that provide simplified management of networks, applications, and policies through an intuitive user interface and programming interfaces.
3) Details on how APIC-EM can integrate with Cisco Call Manager to dynamically insert and remove access control lists for voice and video calls to prioritize that traffic
Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
This session will cover new and upcoming innovations to our ISR4K routing platform, as well as introduce a new solution that simplifies operations and redefines architecture at the branch.
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
Yonatan Klein, Director of Product Management (AlgoSec)
While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.
Each part of your network estate is managed in its own independent silo instead of being holistically managed.
Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.
In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.
He covers how to:
- Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations
- Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices
- Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Canada
The document discusses how cyber attacks have evolved over time and how Cisco security solutions can help address modern threats. It provides examples of ransomware attacks and how Cisco mapped the attacker infrastructure involved. It then summarizes Cisco's Umbrella and Cloudlock solutions, emphasizing how Umbrella provides secure internet access and threat prevention through fast DNS resolution and intelligence-driven models, while Cloudlock focuses on securing usage of cloud apps and accounts.
Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends the security perimeter to the Internet - rendering network-centric security methods obsolete.
"A session in the DevNet Zone at Cisco Live, Berlin. Analytics of network telemetry data (such as flow records, IPSLA measurements, and time series of MIB data) helps address many important operational problems. Traditional Big Data approaches run into limitations even as they push scale boundaries for processing data further. One reason for this is the fact that in many cases, the bottleneck for analytics is not analytics processing itself but the generation and export of the data on which analytics depends. Data does not come for free. The amount of data that can be reasonably collected from the network runs into inherent limitations due to bandwidth and processing constraints in the network itself. In addition, management tasks related to determining and configuring which data to generate lead to significant deployment challenges.
This presentation provides an overview of DNA (Distributed Network Analytics), a novel technology to analyze network telemetry data in distributed fashion at the network edge, allowing users to detect changes, predict trends, recognize anomalies, and identify hotspots in their network. Analytics processing occurs at the source of the data using an embedded DNA Agent App that dynamically configures data sources as needed and analyzes the data using an embedded analytics engine. This provides DNA with superior scaling characteristics while avoiding the significant operational and bandwidth overhead that is associated with centralized analytics solutions. An ODL-based SDN controller application orchestrates network analytics tasks across the network, providing a network analytics service that allows users to interact with the network as a whole instead of individual devices one at a time. DNA is enabled by the IOx App Hosting Framework and integrated with light-weight embedded analytics engines, CSA (Connected Service Analytics) and DMO (Data in Motion). "
The document discusses Cisco Meraki and how its cloud-managed networking solutions simplify IT. Meraki offers wireless, switching, security, and other products that are integrated and managed through a single cloud dashboard. It has over 140,000 customers and 2 million devices online. The cloud model provides benefits like easy management, scalability, cost savings, and rapid feature updates. Industry analysts predict growing adoption of cloud-based networking and software-defined WAN due to rising bandwidth needs, new applications, and the need to reduce complexity and improve agility.
Cisco Connect Toronto 2017 - Cisco meraki let simple work for youCisco Canada
The document discusses Cisco Meraki's cloud-managed networking solutions. It highlights that Meraki offers integrated hardware, software, and cloud services for wireless, switching, security, communications, and security cameras. The solutions simplify IT management by providing turnkey installation, remote management from the cloud, and automatic software updates. Customers can manage their entire network from a single dashboard interface in the cloud.
Cisco Connect Halifax 2018 Application agility and programmability with cis...Cisco Canada
This document discusses Cisco's Application Centric Infrastructure (ACI) architecture. It provides an overview of Cisco's data center strategy, use cases for ACI including multicloud, security, analytics and automation. It then details the Cisco Nexus platforms that support ACI software including the 9348GC-FXP leaf switch. The document outlines benefits of ACI such as policy-driven operations, visibility and security capabilities. It also discusses ACI integration with orchestration platforms and containers.
A New Approach to Continuous Monitoring in the CloudNETSCOUT
In this #CLUS 2019 session, you will learn how NETSCOUT’s smart data platform enables continuous monitoring in hybrid cloud environments to minimize risk and accelerate customer migration to the Cloud. You will review real-life examples of how businesses optimized their Cloud migration gaining visibility and deep insights, in both physical and virtual worlds, to maintain continuity and security of the services throughout the migration process.
The availability of innovative DDoS attack tools and techniques has lowered the barrier of entry, which means an increase in the number of attackers launching DDoS attacks. Attack targets have also diversified. It used to be that finance, gaming, and e-commerce verticals were likely targets. Today, any organization, for any real or perceived offense or affiliation, can become a target of a DDoS attack. This while APT group and crimeware activity continues to grow, as actors in this space develop and unleash increasingly sophisticated attacks worldwide.
Learn about:
•Understand what is happening on the DDoS Landscape – the largest attacks and what is driving them
•How Nation-State activity is going ‘internet-scale’
•Botnets, crimeware, intrusions – how these facets of the threat landscape tie in together
This document discusses improving meeting experiences. It describes challenges with current meeting tools such as difficult scheduling, joining, and content sharing. It then introduces Cisco's single meeting engine and innovations to provide a simplified, video-first experience across devices. These include easy scheduling from any device, big join buttons, and seeing who is talking. The document also presents Cisco Spark and room devices that optimize meetings in all spaces with features like in-room controls and wireless content sharing. It concludes by encouraging readers to enhance their meeting experience through Cisco tools and services.
Hope, fear, and the data center time machineCisco Canada
The document discusses Cisco's vision for application-centric infrastructure (ACI) which provides policy-driven automation across networks, compute, storage and security to enable agility. ACI uses concepts like endpoint groups, policies and profiles to simplify management and deliver applications securely on premises or across hybrid clouds. The document also highlights Cisco technologies that integrate with ACI like Tetration for network analytics, Cisco CloudCenter for hybrid cloud orchestration, and Cisco UCS for converged infrastructure.
Bring Your Own Automation: An Integrated Approach to Managing Your NetworkItential
In this webinar you will learn how to:
- Understand the network domains and the typical path for network automation adoption, using the right tool for the right job
- Move toward a modern approach to network automation using your existing infrastructure and investments
- Normalize your scripting efforts for standardized and repeatable API consumption with Itential’s Automation Gateway
- Use enhanced scripts in end-to-end network automation workflows within Itential’s Automation Platform
- Future proof your investment in network automation with unified models and an API first approach
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
The presentation provided an overview of Cisco Meraki's intelligent network and SD-WAN capabilities. It discussed Meraki's large customer base of over 250,000 organizations using its cloud-managed solutions. Examples of Meraki's network monitoring and troubleshooting tools like Wireless Health and Insight were also reviewed. The presentation concluded with a demo of how Meraki's SD-WAN and security configurations can optimize network and application performance across hybrid WANs.
With over 10,000 users and 900 locations across 22 countries, Kelly Services exemplifies the diversified multinational organization. But as Kelly Services looked to standardize on Office 365, it became apparent that full application support across the Office 365 suite would require a complete network transformation, from a legacy hub-and-spoke network to a modern direct-to-cloud architecture.
Join this session to hear first-hand how Kelly Services was able to drive down MPLS and networking costs, deliver a fast Office 365 application experience to users around the globe, and fundamentally transform its network infrastructure.
A day in the life of an enterprise CIO can be daunting—challenges such as managing complex environments, security and ongoing TCO pressures face us everyday. Addressing these challenges offer opportunities to significantly improve operations, productivity and have an impact on the bottom line if done successfully. To learn more please visit our website here: http://www.cisco.com/web/CA/index.html
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
This document discusses NETSCOUT's ASI solution for providing visibility and troubleshooting of applications in VMware NSX-T environments. It describes how NETSCOUT partners with VMware to provide smart visibility using NSX-T service insertion. The NETSCOUT vSTREAM appliances are deployed as a partner service in NSX-T and use NSX-T network introspection policies to monitor traffic. The smart data is then analyzed in NETSCOUT's nGeniusONE platform to provide application troubleshooting, including dependency mapping, performance monitoring, and packet-level analysis. This helps support agile operations across hybrid and multi-cloud environments.
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
Replay the live event: http://cs.co/90008z2Ar
Learn how your existing Cisco network can help you to know exactly who is doing what on the network with end-to-end visibility, differentiate anomalies from normal behavior with contextual threat intelligence and stop threats and mitigate risk with one-click containment of users and devices.
It’s time for the network to protect itself. Please make time for this important workshop.
Resources:
Watch the Cisco Stealthwatch and ISE full episode: http://cs.co/90008z24M
Network as a Sensor-Enforcer on CCO:
http://www.cisco.com/c/en/us/solutions/enterprise-networks/enterprise-network-security/net-sensor.html
Cisco ISE Community
http://cs.co/ise-community
Cisco Connect Halifax 2018 Optimizing your client's wi-fi experienceCisco Canada
This document discusses techniques for optimizing a client's Wi-Fi experience, including improving channel efficiency, minimizing cell size, using band selection and load balancing, and leveraging standards like 802.11k/v/r to improve roaming. It also covers using the right antennas and Cisco's solutions for Wi-Fi assurance and analytics to gain visibility and automate remediation.
1. The document discusses how Zscaler Private Access (ZPA) can simplify security for mergers and acquisitions by providing zero trust network access without requiring changes to the existing network infrastructure.
2. Traditionally, integrating an acquired company's network required ordering new circuits, complex IP addressing schemes, and coordinating firewall changes which could take years.
3. With ZPA, a company can subscribe and instantly provide any user with secure access to approved internal applications from any device without requiring network access. This accelerates the integration of acquired companies while standardizing security policies.
Gain Insight and Programmability with Cisco DC NetworkingCisco Canada
This document discusses Cisco's data center networking strategy, with a focus on the Nexus 9000 series switches and Cisco Application Centric Infrastructure (ACI). Key points include:
- The Nexus 9000 series are Cisco's newest data center switches, featuring the CloudScale ASIC for improved performance, visibility, and encryption capabilities.
- Cisco ACI is a software-defined networking solution that provides policy-based automation and visibility across the data center network. ACI supports multi-cloud environments and integrates with orchestration tools.
- Recent innovations to ACI include expanded hardware support, improved security features, increased scale, and enhanced multi-site capabilities. Cisco is also working to extend ACI policies
2021 01-27 reducing risk of ransomware webinarAlgoSec
Micro-segmentation protects your network by limiting the lateral movement of ransomware and other threats in your network. Yet successfully implementing a defense-in-depth strategy using micro-segmentation may be complicated.
In this second webinar in a series of two webinars about ransomware, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and Jan Heijdra, Cisco Security Specialist, will provide a blueprint to implementing micro-segmentation using Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec Network Security Policy Management.
Join our live webinar to learn:
• Why micro-segmentation is critical to fighting ransomware
• Understand your business applications to create your micro-segmentation policy
• Validate your micro-segmentation policy is accurate
• Enforce these granular policies on workloads and summarized policies across your infrastructure
• Use risk and vulnerability analysis to tighten your workload and network security
• Identify and manage security risk and compliance in your micro-segmented environment
Intent Based Networking: turning intentions into reality with network securit...shira koper
The next big thing in networking, Intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.
Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.
In this webinar, Edy will explain how:
• Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security
• AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)
• AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
CL2015 - Datacenter and Cloud Strategy and PlanningCisco
This document discusses strategies for data center and cloud transformation over the next 5 years. It outlines key digital business trends like data growth, cloud adoption, and security threats that are driving organizations' IT initiatives. These include managing increased data and applications, optimizing cloud strategies, addressing disruptive business models, and securing distributed data and applications. The document advocates adopting flexible consumption models, automation, and supporting edge/IoT applications. It positions Cisco as uniquely able to enable digital transformations through its portfolio of networking, compute, storage, automation, analytics, and security solutions.
Cisco connect winnipeg 2018 introducing the network intuitiveCisco Canada
Cisco's Digital Network Architecture (DNA) offers a new holistic approach to meet the requirements of the digitized enterprise. DNA Center provides automation, analytics, identity services and policy-based networking capabilities. The session introduces DNA Center and its ability to automate network operations through the use of templates, profiles and workflows. Examples of automation use cases included deploying standard network settings, custom configurations, wireless deployments, application policies and software lifecycle management.
"A session in the DevNet Zone at Cisco Live, Berlin. Analytics of network telemetry data (such as flow records, IPSLA measurements, and time series of MIB data) helps address many important operational problems. Traditional Big Data approaches run into limitations even as they push scale boundaries for processing data further. One reason for this is the fact that in many cases, the bottleneck for analytics is not analytics processing itself but the generation and export of the data on which analytics depends. Data does not come for free. The amount of data that can be reasonably collected from the network runs into inherent limitations due to bandwidth and processing constraints in the network itself. In addition, management tasks related to determining and configuring which data to generate lead to significant deployment challenges.
This presentation provides an overview of DNA (Distributed Network Analytics), a novel technology to analyze network telemetry data in distributed fashion at the network edge, allowing users to detect changes, predict trends, recognize anomalies, and identify hotspots in their network. Analytics processing occurs at the source of the data using an embedded DNA Agent App that dynamically configures data sources as needed and analyzes the data using an embedded analytics engine. This provides DNA with superior scaling characteristics while avoiding the significant operational and bandwidth overhead that is associated with centralized analytics solutions. An ODL-based SDN controller application orchestrates network analytics tasks across the network, providing a network analytics service that allows users to interact with the network as a whole instead of individual devices one at a time. DNA is enabled by the IOx App Hosting Framework and integrated with light-weight embedded analytics engines, CSA (Connected Service Analytics) and DMO (Data in Motion). "
The document discusses Cisco Meraki and how its cloud-managed networking solutions simplify IT. Meraki offers wireless, switching, security, and other products that are integrated and managed through a single cloud dashboard. It has over 140,000 customers and 2 million devices online. The cloud model provides benefits like easy management, scalability, cost savings, and rapid feature updates. Industry analysts predict growing adoption of cloud-based networking and software-defined WAN due to rising bandwidth needs, new applications, and the need to reduce complexity and improve agility.
Cisco Connect Toronto 2017 - Cisco meraki let simple work for youCisco Canada
The document discusses Cisco Meraki's cloud-managed networking solutions. It highlights that Meraki offers integrated hardware, software, and cloud services for wireless, switching, security, communications, and security cameras. The solutions simplify IT management by providing turnkey installation, remote management from the cloud, and automatic software updates. Customers can manage their entire network from a single dashboard interface in the cloud.
Cisco Connect Halifax 2018 Application agility and programmability with cis...Cisco Canada
This document discusses Cisco's Application Centric Infrastructure (ACI) architecture. It provides an overview of Cisco's data center strategy, use cases for ACI including multicloud, security, analytics and automation. It then details the Cisco Nexus platforms that support ACI software including the 9348GC-FXP leaf switch. The document outlines benefits of ACI such as policy-driven operations, visibility and security capabilities. It also discusses ACI integration with orchestration platforms and containers.
A New Approach to Continuous Monitoring in the CloudNETSCOUT
In this #CLUS 2019 session, you will learn how NETSCOUT’s smart data platform enables continuous monitoring in hybrid cloud environments to minimize risk and accelerate customer migration to the Cloud. You will review real-life examples of how businesses optimized their Cloud migration gaining visibility and deep insights, in both physical and virtual worlds, to maintain continuity and security of the services throughout the migration process.
The availability of innovative DDoS attack tools and techniques has lowered the barrier of entry, which means an increase in the number of attackers launching DDoS attacks. Attack targets have also diversified. It used to be that finance, gaming, and e-commerce verticals were likely targets. Today, any organization, for any real or perceived offense or affiliation, can become a target of a DDoS attack. This while APT group and crimeware activity continues to grow, as actors in this space develop and unleash increasingly sophisticated attacks worldwide.
Learn about:
•Understand what is happening on the DDoS Landscape – the largest attacks and what is driving them
•How Nation-State activity is going ‘internet-scale’
•Botnets, crimeware, intrusions – how these facets of the threat landscape tie in together
This document discusses improving meeting experiences. It describes challenges with current meeting tools such as difficult scheduling, joining, and content sharing. It then introduces Cisco's single meeting engine and innovations to provide a simplified, video-first experience across devices. These include easy scheduling from any device, big join buttons, and seeing who is talking. The document also presents Cisco Spark and room devices that optimize meetings in all spaces with features like in-room controls and wireless content sharing. It concludes by encouraging readers to enhance their meeting experience through Cisco tools and services.
Hope, fear, and the data center time machineCisco Canada
The document discusses Cisco's vision for application-centric infrastructure (ACI) which provides policy-driven automation across networks, compute, storage and security to enable agility. ACI uses concepts like endpoint groups, policies and profiles to simplify management and deliver applications securely on premises or across hybrid clouds. The document also highlights Cisco technologies that integrate with ACI like Tetration for network analytics, Cisco CloudCenter for hybrid cloud orchestration, and Cisco UCS for converged infrastructure.
Bring Your Own Automation: An Integrated Approach to Managing Your NetworkItential
In this webinar you will learn how to:
- Understand the network domains and the typical path for network automation adoption, using the right tool for the right job
- Move toward a modern approach to network automation using your existing infrastructure and investments
- Normalize your scripting efforts for standardized and repeatable API consumption with Itential’s Automation Gateway
- Use enhanced scripts in end-to-end network automation workflows within Itential’s Automation Platform
- Future proof your investment in network automation with unified models and an API first approach
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
The presentation provided an overview of Cisco Meraki's intelligent network and SD-WAN capabilities. It discussed Meraki's large customer base of over 250,000 organizations using its cloud-managed solutions. Examples of Meraki's network monitoring and troubleshooting tools like Wireless Health and Insight were also reviewed. The presentation concluded with a demo of how Meraki's SD-WAN and security configurations can optimize network and application performance across hybrid WANs.
With over 10,000 users and 900 locations across 22 countries, Kelly Services exemplifies the diversified multinational organization. But as Kelly Services looked to standardize on Office 365, it became apparent that full application support across the Office 365 suite would require a complete network transformation, from a legacy hub-and-spoke network to a modern direct-to-cloud architecture.
Join this session to hear first-hand how Kelly Services was able to drive down MPLS and networking costs, deliver a fast Office 365 application experience to users around the globe, and fundamentally transform its network infrastructure.
A day in the life of an enterprise CIO can be daunting—challenges such as managing complex environments, security and ongoing TCO pressures face us everyday. Addressing these challenges offer opportunities to significantly improve operations, productivity and have an impact on the bottom line if done successfully. To learn more please visit our website here: http://www.cisco.com/web/CA/index.html
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
This document discusses NETSCOUT's ASI solution for providing visibility and troubleshooting of applications in VMware NSX-T environments. It describes how NETSCOUT partners with VMware to provide smart visibility using NSX-T service insertion. The NETSCOUT vSTREAM appliances are deployed as a partner service in NSX-T and use NSX-T network introspection policies to monitor traffic. The smart data is then analyzed in NETSCOUT's nGeniusONE platform to provide application troubleshooting, including dependency mapping, performance monitoring, and packet-level analysis. This helps support agile operations across hybrid and multi-cloud environments.
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
Replay the live event: http://cs.co/90008z2Ar
Learn how your existing Cisco network can help you to know exactly who is doing what on the network with end-to-end visibility, differentiate anomalies from normal behavior with contextual threat intelligence and stop threats and mitigate risk with one-click containment of users and devices.
It’s time for the network to protect itself. Please make time for this important workshop.
Resources:
Watch the Cisco Stealthwatch and ISE full episode: http://cs.co/90008z24M
Network as a Sensor-Enforcer on CCO:
http://www.cisco.com/c/en/us/solutions/enterprise-networks/enterprise-network-security/net-sensor.html
Cisco ISE Community
http://cs.co/ise-community
Cisco Connect Halifax 2018 Optimizing your client's wi-fi experienceCisco Canada
This document discusses techniques for optimizing a client's Wi-Fi experience, including improving channel efficiency, minimizing cell size, using band selection and load balancing, and leveraging standards like 802.11k/v/r to improve roaming. It also covers using the right antennas and Cisco's solutions for Wi-Fi assurance and analytics to gain visibility and automate remediation.
1. The document discusses how Zscaler Private Access (ZPA) can simplify security for mergers and acquisitions by providing zero trust network access without requiring changes to the existing network infrastructure.
2. Traditionally, integrating an acquired company's network required ordering new circuits, complex IP addressing schemes, and coordinating firewall changes which could take years.
3. With ZPA, a company can subscribe and instantly provide any user with secure access to approved internal applications from any device without requiring network access. This accelerates the integration of acquired companies while standardizing security policies.
Gain Insight and Programmability with Cisco DC NetworkingCisco Canada
This document discusses Cisco's data center networking strategy, with a focus on the Nexus 9000 series switches and Cisco Application Centric Infrastructure (ACI). Key points include:
- The Nexus 9000 series are Cisco's newest data center switches, featuring the CloudScale ASIC for improved performance, visibility, and encryption capabilities.
- Cisco ACI is a software-defined networking solution that provides policy-based automation and visibility across the data center network. ACI supports multi-cloud environments and integrates with orchestration tools.
- Recent innovations to ACI include expanded hardware support, improved security features, increased scale, and enhanced multi-site capabilities. Cisco is also working to extend ACI policies
2021 01-27 reducing risk of ransomware webinarAlgoSec
Micro-segmentation protects your network by limiting the lateral movement of ransomware and other threats in your network. Yet successfully implementing a defense-in-depth strategy using micro-segmentation may be complicated.
In this second webinar in a series of two webinars about ransomware, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and Jan Heijdra, Cisco Security Specialist, will provide a blueprint to implementing micro-segmentation using Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec Network Security Policy Management.
Join our live webinar to learn:
• Why micro-segmentation is critical to fighting ransomware
• Understand your business applications to create your micro-segmentation policy
• Validate your micro-segmentation policy is accurate
• Enforce these granular policies on workloads and summarized policies across your infrastructure
• Use risk and vulnerability analysis to tighten your workload and network security
• Identify and manage security risk and compliance in your micro-segmented environment
Intent Based Networking: turning intentions into reality with network securit...shira koper
The next big thing in networking, Intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.
Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.
In this webinar, Edy will explain how:
• Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security
• AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)
• AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
CL2015 - Datacenter and Cloud Strategy and PlanningCisco
This document discusses strategies for data center and cloud transformation over the next 5 years. It outlines key digital business trends like data growth, cloud adoption, and security threats that are driving organizations' IT initiatives. These include managing increased data and applications, optimizing cloud strategies, addressing disruptive business models, and securing distributed data and applications. The document advocates adopting flexible consumption models, automation, and supporting edge/IoT applications. It positions Cisco as uniquely able to enable digital transformations through its portfolio of networking, compute, storage, automation, analytics, and security solutions.
Cisco connect winnipeg 2018 introducing the network intuitiveCisco Canada
Cisco's Digital Network Architecture (DNA) offers a new holistic approach to meet the requirements of the digitized enterprise. DNA Center provides automation, analytics, identity services and policy-based networking capabilities. The session introduces DNA Center and its ability to automate network operations through the use of templates, profiles and workflows. Examples of automation use cases included deploying standard network settings, custom configurations, wireless deployments, application policies and software lifecycle management.
The document discusses the need for telecommunications providers to automate their networks in order to handle increasing traffic volumes, device connections, and complexity cost effectively. It outlines the business benefits of automation including 30% revenue uplift, 70% cost reductions, and 40% better customer satisfaction. Specific Cisco products and solutions are presented that enable network automation capabilities such as intent-based networking, data centralization, accelerated troubleshooting, and network optimization. The overall message is that network automation through tools like Cisco Crosswork is necessary for telecommunications providers to sustain their business in the face of rising network demands.
EMA’s market research, “Network Observability: Delivering Actionable Insights to Network Operations,” establishes a roadmap for how vendors should improve their products to deliver deep visibility and actionable insights. More importantly, this research will help IT buyers understand what network management vendors mean when they talk about network observability and how they can turn that understanding into NetOps success.
Operating costs decrease and agility increases, allowing you to react quickly to new market opportunities.
http://www.cisco.com/web/offers/sp04/simplifying-operations/index.html?KeyCode=000947566
Modern IoT operations can drive digital transformation by analyzing the unprecedented amounts of data generated from devices and sensors in real-time.
Apache Spark is a widely used stream processing engine for real-time IoT applications. Spark streaming offers a rich set of APIs in the areas of ingestion, cloud integration, multi-source joins, blending streams with static data, time-window aggregations, transformations, data cleansing, and strong support for machine learning and predictive analytics.
Join Anand Venugopal, AVP & Business Head, StreamAnalytix and Sameer Bhide, Senior Solutions Architect, StreamAnalytix to learn about the rapid development and operationalization of real-time IoT applications covering an end-to-end flow of ingest, insight, action, and feedback.
The webinar will cover the following:
Generic IoT application blueprint
Case studies on IoT applications built on Apache Spark – connected car and industrial IoT
Demonstration of an easy, visual approach to building IoT Spark apps
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
A Study on the Application of Web-Scale IT in Enterprises in IoT EraHassan Keshavarz
The concept of Web-Scale IT has become a pattern of global class computing that delivers the capabilities of large cloude sevice provider in the enterprise IT industry and business sector. Based on the Gartner report, WebScale IT is one of the technology trends probably to have a significant effect on companies over the next three years, by 2017. Web-Scale IT is clearly defined as the all things accouring in large scale could service firms such as Google, Amazon, Netfilx, Facebook and so on, that enables them to get high levels of agility and scalability by using new processes and architecures according to the report. This paper scrutinizes how technology can change the business style for IoT using in the future. It is expected that using of Web-Scale IT is critical in this turning point of changing the business method so as to IoT using in the future. For achieve tha aim, the first step toward the WebScale IT for many organization should be bringing Developing and Operations together. This is the movment known as “DevOps”.
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Cisco Canada
The document discusses Cisco's vision for digitization, speed, and visibility in an application-centric world. It summarizes how applications are changing with big data, distributed apps, mobile, and cloud computing. It then outlines Cisco's hybrid cloud architecture and software-defined infrastructure solutions like ACI and UCS to provide policy-driven automation, security, and visibility across physical, virtual, and multi-cloud environments. The solutions aim to enhance IT agility while reducing costs and complexity.
The document discusses the benefits of network automation for service providers. It notes that automation can deliver 30% higher revenue from faster time to value, 70% lower costs from operational efficiencies, and 40% better customer satisfaction from faster remediation. The need for automation is driven by rapid traffic growth, an explosion of devices and users, and increasing complexity. The document introduces Cisco's Crosswork automation solution, which uses tools like Cisco NSO, WAE, and Change Automation to provide closed-loop automation across various network operations disciplines for multi-vendor environments. Specific automation use cases discussed include intent-based networking, data centralization, improving quality of experience, accelerating issue identification and remediation times, and ongoing network
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfAnil
Wireless Design Services is one of the most underrated functions in not just tech but every aspect of our day-to-day life. Wireless Design Services serve as the very basis for some of the most sophisticated and cutting-edge technology that is used all over the world today. This blog is about the unsung strategy that goes into implementing state-of-the-art network connectivity.
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
The document discusses how to take a modern approach to IT operations. It recommends collecting data across infrastructure to identify problems, correlating and analyzing data to determine which alerts require immediate attention, and defining key performance indicators and workflows. This approach aims to enhance operations by integrating ThousandEyes into existing environments to facilitate data-driven conversations that minimize disruptions. A live demo was also provided.
Cisco connect winnipeg 2018 simple it leads to simple it managementCisco Canada
The document discusses Cisco's vision for a simplified IT management approach through a digital platform. Some key points:
- Cisco aims to simplify IT through a platform approach that delivers applications/services consistently across clouds, is extensible and open.
- The platform focuses on ubiquitous connectivity, actionable insights, secure data, simplified user experiences, and flexibility in consuming/deploying IT assets.
- Automation enabled by APIs and data-driven models allows consistent experiences and programmatic actions to simplify operations.
This document discusses digital transformation and how companies can reimagine customer value in a digital world. It outlines how digital disruption will reshape markets in 3 years or less, displacing 40% of incumbents. It advocates adopting a platform approach and developing powerful ecosystems across industries. It also describes Cisco's operating model transformation to deliver IT services using a hybrid cloud approach with everything as a service. This simplifies operations and delivers data-driven insights for continuous innovation.
According to leading IT research firm Enterprise Management Associates (EMA), 75% of enterprises have observed increased collaboration between network operations and security operations teams in recent years, but only 39% of organizations believe this collaboration is completely successful. EMA describes this increased convergence of networking and security as NetSecOps.
Check out these slides to learn more about:
- Why and how NetOps and SecOps teams need to work together
- Why these partnerships often fail
- How network automation can enable this collaboration, including the types of tools that can help and the use cases that are most essential
- Real-world examples from the trenches about how these teams have come together successfully
Legacy monitoring and troubleshooting tools can limit visibility and control over your infrastructure and applications. Organizations must find monitoring and troubleshooting tools that can scale with the volume, variety and velocity of data generated by today’s complex applications in order to keep pace with business demands. Our upcoming webinar will discuss how Sumo Logic helped Scripps Networks harness cloud-native machine data analytics to improve application quality and reliability on AWS. Sumo Logic allows IT operations teams to visualize and monitor workloads in real-time, identify issues and expedite root-cause analysis across the AWS environment.
Join us to learn:
• How to migrate from traditional on-premises data centers to AWS with confidence
• How to improve the monitoring and troubleshooting of modern applications
• How Scripps Networks, a leading content developer, used Sumo Logic to optimize their transition to AWS
Who should attend: Developers, DevOps Director/Manager, IT Operations Director/Manager, Director of Cloud/Infrastructure, VP of Engineering
IoT - Data Management Trends, Best Practices, & Use CasesCloudera, Inc.
With billions of new devices, IoT is transforming how businesses capitalize on data. Data driven organizations are using IoT as as a means to improve their customer experience, drive operational efficiencies, and enable new business models. However, without the right data management strategy and tools, investments in IoT can yield limited results.
Join Cloudera and 451 Research for a joint webinar to learn more about some of the data management best practices and how organizations are using advanced analytics and machine learning to enable IoT use cases.
Similar to APIC-EM Update: SDN Automation for the Enterprise Network (20)
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
APIC-EM Update: SDN Automation for the Enterprise Network
1. Cisco Enterprise SDN
APIC-EM Update: Configure and
Provision Network Infrastructure in
Minutes, Not Months
Paul Liesenberg
Product and Solutions Mgr, Enterprise Networks
pliesenb@cisco.com
March 2016
2. Digital Business Demands Operational Efficiency and Agility
Time IT spends on operations
CEOs are worried about IT strategy
not supporting business growth80% 57%
0
100%
Source: Forrester
CAPEX OPEX
33% 67%
0 10 100 1000
Computing Networking
Seconds
Source: Open Compute Project
“…While other components of the IT infrastructure have become more programmable and allow for faster, automated provisioning,
installing network circuits is still a painstakingly manual process...”
—Andrew Lerner, Gartner Research
Network Expenses Deployment Speed
3. Cisco Digital Network Architecture
www.cisco.com/go/dna
Automation
Abstraction & Policy Control
from Core to Edge
Open & Programmable | Standards-Based
Open APIs | Developers Environment
Cloud Service Management
Policy | Orchestration
Virtualization
Physical & Virtual Infrastructure | App Hosting
Analytics
Network Data,
Contextual Insights
Insights &
Experiences
Automation
& Assurance
Security &
Compliance
Network-enabled Applications
Cloud-enabled | Software-delivered
Principles
4. Applications
SDN Applications Abstract the Network to Business Intent Policy
SecurityOrchestration Automation Collaboration
SOUTHBOUND ABSTRACTION LAYER
CATALYST NEXUS ASRISR WIRELESSASA
REST API
OTHER
SDN Ideal:
Controller as the
Application Platform
SDN
Controller as
the Application
Platform for
Policy
Automation
Virtualization
5. APIC-EM Application Overview & Use Cases
Public
Cloud
Enterprise
Network
Day 0
Plug-and-Play App
Zero touch deployment of routers /
switches / APs
Accelerated roll-out: Eliminates
tech visits and shrinks deployment
from months to minutes
Day 1
Cisco IWAN App
Cisco Easy QoS App
Cisco ESA App
Guided, fast auto-provisioning of
IWAN solution with Cisco experts’
best practices
From 1000 CLI commands to 10
GUI clicks per branch
Day 2
Path Trace App
Discover path between two end
points based on 5 tuple
Rapidly troubleshoot congestion and
ACL issues and lower OPEX for
trouble ticket processing by 98%
BRANCH
6. What Cisco Enterprise SDN Delivers
Simplicity
Network-wide abstraction supporting both Greenfield and Brownfield
Automation
OPEX reduction through adoption of Cisco best practices
Business Outcomes
Dynamic network that adapts to business intent policy
Open Programmability
Open NB REST API’s with agnostic SB interfacing
Editor's Notes
Good morning, good afternoon or good evening, wherever you are. I am paul liesenberg, and I work cisco’s in cisco’s enterprise networking team, specifically looking into sdn and enterprise network automation. Quite honestly, the original presenters for this webinar had to cancel, but if you have been following the news, our enterprise networking team announced last week cisco’s new architectural vision for the enterprise network, called DNA for digital network architecture, and hence the timing would have been awful to cancel this webinar and this opportunity to give you a few updates around dna and the new applications in apic-em, and hence i am pleased to take over the webinar. I should also note – I don’t have a question manager. So what I’ll do is try to keep the presentation to 30-35 minutes and then take it to your q&a.
This webinar will give you a high level overview of DNA, the new applications that APIC-EM includes with the latest release, v1. I repeat – high level, my intention is not to go into the application in depth, just to show what’s new.
in future webinars –please check the schedule- we will delve deeply into the individual applications to show in some depth how automation is changing enterprise networks. Over the next months and year you will see a lot of innovation in the area of DNA and, specifically, apic-em. Oops, acronyms, right there in the title – let me spell that out .. application policy infrastructure controller, enterprise module, apic-em. It’s our enterprise sdn controller that supports both our legacy infrastructure –and propels it into the sdn age- and future products.
Oh – a very very important clarifitaction about what “enterprise networks” means in this context… if you think an enterprise has everything from a data center to a campus and branch and even managed services from a service provider… you are right. But for us internally in cisco, somewhat confusingly, enterprise networks –what I shall talk about- is about the campus, branch and wireless infrastructure. We’re talking –product wise- catalyst, asr, isr and wireless controllers… a very healthy multi-billion dollar chunk of our infrastructure, but nevertheless not all of it. Keep that in mind.
If you have been following the news, all the talk in enterprise architecture is about digital transformation. A hot topic with the press and analysts. Basically what this means is… companies have to find ways to constantly innovate. We have all been exposed to the term devops, or I hear in Europe it’s often called bimodal IT, that is, an IT model that keeps up with business needs constantly, nay, it actually constantly innovates and improves upon business models and business processes. Perpetual betas at the application layer, omni-channel models that provide customers with improved physical and virtual experiences. I am not a business consultant, hence I’d just like to go into what this means for the network, and where the network may have lagged… and the verdict is in: the perception is that the network can not keep up with the needs of digital business. I think if we’re honest about the way we’ve build enterprise networks, we have to admit that our modus operandi is, more or less – to truly thoroughly design a network that is super reliable and eminently fair to all traffic… and that should do right? Then we try to keep change away from it. Let’s have planning meetings if change is required, but that will take some time. But that’s not the way the computing infrastructure has evolved, right? It’s virtualized and moving all around us, spinning up application capacity where it’s most convenient at any point in time. Users have self-service portals to spin up and scale up their apps within seconds. And let’s face it, we have to support this environment more effectively. We have to operate more efficiently, and innovate faster. But how do we do that?
As I mentioned, we made a major announcement last week, and if you haven’t yet, I urge you to check it out. Go to cisco.com/go/dna and check out our digital network architecture. if you’re thinking “oh no, not another networking marchitecture” let me put your mind to rest – this is not one of those complex, 5 layered and 50 box architectures that exemplified our traditional network mindset to never try to hide complexity. We network engineers are proud of complexity and our ability to master it, right? I say rightly so, but honestly, if there’s one thing successful software engineering has taught the world is that complexity should stay within its very own domain. Successful architectures these days are simple and thrive on abstracting complexity to the upper layers, and as you can see here that’s what our digital network architecture is all about.
Only 4 functional boxes, so let’s start at the bottom: at the infrastructure layer, that is, how and where we run services, DNA acknowledges that virtualization is king. It allows you to run functions where it suits you best – on a dedicated device or cpu, or anywhere in a private or public or hybrid cloud. That’s how application services run, and that’s the choice network customers also need to establish for themselves, and we’re aggressively rolling that out.
On top of these virtualized network functions, there are 2 things that are of vital importance – first of all automation. The whole point of doing this all is so that we can spend less time on the trivial, and more time on the essential, that is, we need to transition from just being busy to being effective, if you know what I mean. Repeatable stuff needs to be streamlined and up-levelled and automated. And you will see that later in this presentation we will talk about several application that do that – automate what used to be manual configuration of complex features, based on a streamlined workflow and established best practices. We simply need to make networks easier to configure and troubleshoot, so we can spend more time doing…
…what the other box says … it reads analytics but I read it as innovation. I think network data is easily one of the least used sources of business intelligence. Think about it – the network sees everything, the network touches everything, and it doesn’t even need invasive browser cookies to see who and what does exactly what when and where. I think as network engineers, and with the rise of data engineering, we truly need to focus far more into how the data we gather can contribute to the information capital of the enterprise. Network analytics goes 2 ways I think – the first one is a huge contribution to innovation in the customer and user experience, and the other one is in security. Meaning, we can use network analytics to both see how users/customers can be better served, but also to detect when certain endpoints act in suspicious ways.
Finally on top of automation and innovation/analytics, you have cloud service management, meaning orchestration functions. This is where business intent is coded in policies, and the policies arte pushed to the automation layer for consistent, end-to-end implementation across the network.
You could basically draw a closed-loop feedback mechanism through these – and that will be the reality eventually – where the virtualized infrastructure layer pushes data to the analytics function, the analytics function sends those to cloud service management, which in turns checks on SLAs and pushes new updated business policies to the automation layer.
The communication patterns between the layers are simple RESTful apis and standards based data models such as netconf-yang or RESTconf, and where those aren’t supported we should interface with the legacy infrastructure via CLI or established protocols such as SNMP.
With this slide I just want to emphasize the critical role that apic-em has in the dna architecture. applications, here on top, directly touch the business layer, and the business layer is ultimately where the money is made for the enterprise, the IT infrastructure has to unconditionally serve it, and the enterprise network serves the application and business layer through an sdn controller. Our enterprise sdn controller, again, is apic-em. Its role is abstraction – expose basic and abstracted network capabilities to the application layer in a language the latter understands, that is, RESTful apis, which basically is a web service you can invoke and that that any web programmer know how to reuse. Apic-em then acts as a master translator, it holds the magic decoder ring to the complexity and specifics of the underlying infrastructure. It resolves business intent into far more complex network wide configuration instructions, using whatever language the underlying network elements understand – snmp, cli… or increasingly netconf yang or restconf going forward. That allows apic-em to deliver on a key advantage – you can deliver the benefits of sdn on your exisiting infrastructure, and you don’t have to gamble on which southbound protocol will eventually win out.
Ok, so we’re a good number of minutes into this presentation and we have talked at an abstract level about emerging enterprise architectures, sdn, automation, abstractions and policies… but what does this all mean in a practical way? Ok, let’s put our network engineer hats back on, and think about how we handle day 0 that is installation, day 1 for configuration, and day 2 for ongoing operation. As of right now, most of us are still caught up in the CLI era, right? We have some scripting, sure, but we still interface with network elements on a per device level and via the command prompt as we go about many tasks. So bring in apic-em and a couple of the automation apps, and this is what happens, a streamlined, effective workflow to deal with device bring-up, feature configuration, a dtroubleshooting, namely…
Day 0 – you’re bringing up a branch router, you know the drill. You need an expert. You need to make sure the router comes up and connects. The apic-em PnP app automates that. All you need is someone that plugs in an Ethernet port into the router, power it up, and voila, the branch router reaches out to get its basic configuration file, and basic connectivity is established.
Day 1 – now it’s time to configure the many, advanced and complex features in a network device. It could be the specifically iwan features dealing with a choice of transport options, application optimization options or ensuring security given pervasive basic broadband connectivity in branch designs… it could be defining a more all encompassing set of network services, virtualized or not. It could be configuring QoS. Qos is a killer app for networking, but we have always made it complex –and hence slow- to deploy. We have now 3 day 1 apps that tame the complexity of network features – the iwan app, the easyqos app, and the enterprise services automation app. They provide you with a user friendly gui and recommendations based on cisco validated designs. Instead of having to plough through hundreds of cli commands, you can simply click through a few screens and get the job done much faster. More consistently. Less error prone. Feel free to fine tune later, but get stuff done like 10 times faster.
Day 2 – I’ll say it right away – you’ll see us and our development partners spending a lot of time here, when it comes to troubleshooting tools. Especially in these days of renewed interest in machine learning a lot of stuff is bound to happen here. But the apic-em path visualization app is popular for a good reason – enter your 5-tuple connection identifier and, instead of having to identify the connection hop by hop, the app will show you an intuitive, end to end view.
In a nutshell, you get automated initial deployment, automated advanced feature configuration, and finally simplified troubleshooting. And this is just the beginning.
Typically these presentation wrappers are about a lot of chest thumping, but I’d like to wrap it up just rationally driving home 4 generic value propositions that I think are key to a next generation network infrastructure, and that in some way or the other I have emphasized through the presentation
First of all, simplicity is the greatest virtue. Simplicity is about abstraction. One thing I found striking years ago, as I watched videos from the sdn luminaries, and I urge you to watch the presentation about sdn scott shenker from berlkely university provided about sdn, was that it was all about the fact networking had failed to provide useful abstractions, which is what well desgined software arhcictectures should do. well, now we are getting there. Sdn controllers prvide abstractions. the difference in scope is about how much of the exisiting infrastructure they include in those abstractions, and I think that is where apic-em excels. It includes the exisiting infrastructure.
Automation – this is the primary goal. You could say it’s step one. Through automating traditionally manual workflows, we’re freeing up time we can use to innovate. Let’s stop being just busy, let’s be relevant to the business. The network brings underutilized elements to the table – like network analytics. If we spend less time being busy, we can innovate around that.
Business outcomes – definitely, the days of the plain vanilla it infrastructure for everybody are over. As engineers, we have to start becoming business process engineers as well, and think about how our stuff can enrich, enable and drive business processes and outcomes. Technology by itself is less and less relevant.
Finally programmability is the door to innovation. Whether you do it yourself, or check out our solution partners or our own applications… without programmability through the entire stack, and I mean from orchestration layer through controllers all the way way down to model driven network devices… this is the magic of abstraction – when you abstract complexity, people reuse things and create new stuff, just think of the way google maps api. It’s eminenty easy to reuse, and in enterprise networking we are moving in that direction, very quickly. Making networks easier to manage and configure, and using that time we save to innovate.
I said it before, and I repeat it now – you will see a lot of innovation happening around apic-em, around netconf-yang enabled network devices, so keep watching this space. Keep looking for new webinars. A lot is going to happen very quickly.
And with that, let me wrap it up and take it to q and a