This document provides an overview of advanced web security deployment using the Cisco Web Security Appliance (WSA). It discusses considerations for explicit and transparent proxy deployment including redirection methods, IPv4 and IPv6 support, and load balancing options. Troubleshooting performance and using advanced threat protection features on the WSA are also covered.
Setting up Cisco WSA Proxy in Transparent and Explicit ModeDhruv Sharma
The document discusses how to set up transparent and explicit proxy configurations with a Cisco Web Security Appliance (WSA) in 5 minutes. It provides the network topology and prerequisites. It then describes two options for the default gateway configuration for transparent proxy setup using WCCP and access control lists. It also discusses configuring the WSA for transparent redirection and verifying the setup. Explicit proxy configuration is demonstrated through default gateway, WSA, and client settings.
The document describes the configuration of a Dynamic Multipoint Virtual Private Network (DMVPN) using three phases. Phase 1 establishes IPsec and IKE tunnels between the hub router and spoke routers using EIGRP routing. Phase 2 optimizes the configuration by removing split horizon and enabling next hop self. Phase 3 enables features like NHRP redirect and shortcut to optimize network traffic flow.
Leveraging SolarWinds to Consolidate IT Operations and Management at NHSSolarWinds
SolarWinds and Kenson invited National Health Service (NHS) IT professionals to join us in London, at the Marriott London County Hall, on October 18th, for a SolarWinds event focused on getting more value from their SolarWinds implementations, including support for their IT product consolidation efforts.
Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline service operations. It determines whether users are accessing the network on authorized devices, establishes user identity and context, and assigns services based on user attributes. ISE provides comprehensive secure access, increases productivity, and reduces operations costs through centralized policy control, visibility, automated provisioning, and guest access management.
this slide is created for understand open vswitch more easily.
so I tried to make it practical. if you just follow up this scenario, then you will get some knowledge about OVS.
In this document, I mainly use only two command "ip" and "ovs-vsctl" to show you the ability of these commands.
Setting up Cisco WSA Proxy in Transparent and Explicit ModeDhruv Sharma
The document discusses how to set up transparent and explicit proxy configurations with a Cisco Web Security Appliance (WSA) in 5 minutes. It provides the network topology and prerequisites. It then describes two options for the default gateway configuration for transparent proxy setup using WCCP and access control lists. It also discusses configuring the WSA for transparent redirection and verifying the setup. Explicit proxy configuration is demonstrated through default gateway, WSA, and client settings.
The document describes the configuration of a Dynamic Multipoint Virtual Private Network (DMVPN) using three phases. Phase 1 establishes IPsec and IKE tunnels between the hub router and spoke routers using EIGRP routing. Phase 2 optimizes the configuration by removing split horizon and enabling next hop self. Phase 3 enables features like NHRP redirect and shortcut to optimize network traffic flow.
Leveraging SolarWinds to Consolidate IT Operations and Management at NHSSolarWinds
SolarWinds and Kenson invited National Health Service (NHS) IT professionals to join us in London, at the Marriott London County Hall, on October 18th, for a SolarWinds event focused on getting more value from their SolarWinds implementations, including support for their IT product consolidation efforts.
Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline service operations. It determines whether users are accessing the network on authorized devices, establishes user identity and context, and assigns services based on user attributes. ISE provides comprehensive secure access, increases productivity, and reduces operations costs through centralized policy control, visibility, automated provisioning, and guest access management.
this slide is created for understand open vswitch more easily.
so I tried to make it practical. if you just follow up this scenario, then you will get some knowledge about OVS.
In this document, I mainly use only two command "ip" and "ovs-vsctl" to show you the ability of these commands.
OpenShift 4 provides a fully automated installation and day-2 operations experience. It features over-the-air updates, hybrid and multi-cluster management through operators, and services for developers like OpenShift Service Mesh and Serverless. The operating system is Red Hat Enterprise Linux CoreOS, which is immutable and tightly integrated with OpenShift.
The document discusses a presentation by Imran Bashir on advanced design and scaling of Cisco Identity Services Engine (ISE) networks, including an overview of the speaker's background, the session agenda covering topics such as sizing deployments, high availability, monitoring, and services scaling, and a diagram of the ISE deployment options including standalone, multi-node, and high availability designs.
TechWiseTV Workshop: Segment Routing for the DatacenterRobb Boyd
(This was a Live Webinar on July 21, 2016 at 10:00 am Pacific Time / 1:00 pm Eastern Time)
Watch the Replay at: bit.ly/29Mw58Q
Catch the original TV episode or any other topics at www.techwisetv.com
Description:
Networks are moving toward simplification, increased operational efficiency, and programmability using technologies such as software-defined networking. Cisco continues to demonstrate innovation by introducing the concept of segment routing in the data center, making the network more intelligent and adaptive to the applications running on top of it. Segment routing delivers application-optimized network transport. Encoding the path information directly at the source (that is, either at the virtual switch or at the top of rack) and using per-app policies, segment routing puts control in the hands of the network operators by empowering them to create secure, adaptive, and optimal paths based on the requirements of the application itself.
Please join us in the session to learn how Cisco is helping organizations increase network efficiency by allocating resources on demand and optimizing the network to better support business-critical applications, all while preserving security.
Agenda
Topics to discuss include:
- Introducing segment routing
- Why the need for application-optimized transport
- Features and benefits of segment routing
- Differences between segment routing and MPLS transport
- Relevance of segment routing in the data center
- Use cases and applicability of segment routing
- Summary and conclusion
This document discusses multicast in OpenStack. It begins by defining multicast as one-to-many communication driven by receivers using a multicast IP address, without the need for the sender to duplicate packets. It then outlines the components of multicast including addressing, group management using IGMP, and multicast routing. The document notes that while OpenStack does not natively support multicast, it is possible to enable it by configuring IGMP snooping, security groups, and using plugins like Cisco's ASR1k and ACI drivers for Neutron. It recommends using provider networks without Neutron routing or these plugins to implement multicast routing externally. Finally, it discusses some multicast use cases and limitations.
Identity Services Engine Overview and UpdateCisco Canada
Cisco Identity Services Engine (ISE) provides an all-in-one solution for secure access across wired, wireless, and VPN networks. It replaces separate AAA, RADIUS, NAC, guest management, and device identity servers with a single platform for centralized policy management and visibility. ISE enforces dynamic access control policies based on user, device, location, and other context to protect networks and simplify security.
Complete training slide for the Cisco Data Center Application Centric Infrastructure (DCACI) based on the official cert guide 300-620 + module Quiz to test undesrstanding
Openstack Networking Internals - first partlilliput12
Openstack Networking Internals - first part
Description of the Virtual Network Infrastructure inside an OpenStack cluster
The pictures of the VNI were taken with the "Show my network state" tool
https://sites.google.com/site/showmynetworkstate/
Beyaz Şapkalı Hacker CEH Eğitimi - Aktif Bilgi ToplamaPRISMA CSI
Bu sunum, Prisma tarafından verilen “Uygulamalı Beyaz Şapkalı Hacker Eğitimi v1” de anlatılan bir üniteye aittir.
PRISMA CSI • Cyber Security and Intelligence www.prismacsi.com
Bu doküman, alıntı vererek kullanılabilir ya da paylaşılabilir ancak değiştirilemez ve ticari amaçla kullanılamaz. Detaylı bilgiye https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.tr bağlantısından erişebilirsiniz.
Deploying Cisco ISR G2 and ASR 1000 in the EnterpriseCisco Canada
This presentation discusses the disrupting networking trends that are changing the Enterprise landscape, scope of these changes include the areas of network security, services delivery, application performance optimization and cloud access in tomorrow's borderless networks. The biggest challenge is to help Enterprise IT scale. Borderless Networks is an architectural approach to networking that, if designed correctly, can automate business and network processes driving down operational cost, thus allowing IT to scale. Cisco ISR G2 and ASR 1000 platforms offer the best in class service richness and flexibility that is needed to deliver the promise of borderless networks and allow users to turn on services on-demand.
The document discusses VXLAN BGP EVPN based multi-pod, multi-fabric, and multi-site network architectures. It provides an overview of the evolution from single-pod/fabric deployments to more complex multi-site designs. Key concepts covered include hierarchical overlay domains, isolated underlay domains, and border gateways used to interconnect sites while maintaining underlay isolation.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...David McGeough
This session will cover advanced techniques in troubleshooting the Citrix NetScaler Appliance using tools such as Citrix TaaS, IPMI, nsconmsg, wireshark and log analysis. We will review usages of these tools along with case studies showing how to best troubleshoot common issues seen in operating Citrix NetScaler Appliances.
What you will learn
- Various tools available to troubleshoot issues and how to use them to isolate NetScaler Issues
- Common deployment problems and how to isolate the causes
Alexei Vladishev - Zabbix - Monitoring Solution for EveryoneZabbix
Zabbix is an open source monitoring solution that can monitor all levels of infrastructure across various platforms. It uses triggers to define problems and collects data through active and passive agents to analyze metrics and detect issues. When problems occur, Zabbix can automatically react through escalation procedures that include notifications, tickets, and restarts. It is highly scalable and offers features like anomaly detection, forecasting, and event correlation for complex environments.
For more info: http://scn.sap.com/community/sso.
SAP Single Sign-On enables companies to eliminate the need for multiple passwords and user IDs. Centralize and simplify the way users log on to systems and applications. Lower the risks of unsecured login information, reduce help desk calls, and help ensure the confidentiality and security of personal and company data.
The document discusses deploying web security through Cisco's web security appliances and cloud web security. It provides an overview of web security and describes Cisco's appliance and cloud-based options. It also covers how to configure the Cisco web security appliance for explicit and transparent proxy deployment using protocols like WCCP (Web Cache Communication Protocol) for traffic redirection.
Design and Deployment of Enterprise WLANsFab Fusaro
The document discusses Cisco's controller-based wireless LAN architecture and mobility solutions. It covers topics like:
- The components of Cisco's unified wireless network including wireless LAN controllers, Aironet access points, management software, and mobility services.
- Key principles like how access points must have CAPWAP connectivity to controllers to download configurations and forward all Wi-Fi traffic.
- How mobility is supported through mobility groups that allow controllers to peer and exchange information to enable seamless roaming across controller boundaries.
- Technologies and protocols that help enable fast and secure roaming like CCKM, 802.11r, eliminating full reauthentication, and not requiring reacquisition of IP addresses.
OpenShift 4 provides a fully automated installation and day-2 operations experience. It features over-the-air updates, hybrid and multi-cluster management through operators, and services for developers like OpenShift Service Mesh and Serverless. The operating system is Red Hat Enterprise Linux CoreOS, which is immutable and tightly integrated with OpenShift.
The document discusses a presentation by Imran Bashir on advanced design and scaling of Cisco Identity Services Engine (ISE) networks, including an overview of the speaker's background, the session agenda covering topics such as sizing deployments, high availability, monitoring, and services scaling, and a diagram of the ISE deployment options including standalone, multi-node, and high availability designs.
TechWiseTV Workshop: Segment Routing for the DatacenterRobb Boyd
(This was a Live Webinar on July 21, 2016 at 10:00 am Pacific Time / 1:00 pm Eastern Time)
Watch the Replay at: bit.ly/29Mw58Q
Catch the original TV episode or any other topics at www.techwisetv.com
Description:
Networks are moving toward simplification, increased operational efficiency, and programmability using technologies such as software-defined networking. Cisco continues to demonstrate innovation by introducing the concept of segment routing in the data center, making the network more intelligent and adaptive to the applications running on top of it. Segment routing delivers application-optimized network transport. Encoding the path information directly at the source (that is, either at the virtual switch or at the top of rack) and using per-app policies, segment routing puts control in the hands of the network operators by empowering them to create secure, adaptive, and optimal paths based on the requirements of the application itself.
Please join us in the session to learn how Cisco is helping organizations increase network efficiency by allocating resources on demand and optimizing the network to better support business-critical applications, all while preserving security.
Agenda
Topics to discuss include:
- Introducing segment routing
- Why the need for application-optimized transport
- Features and benefits of segment routing
- Differences between segment routing and MPLS transport
- Relevance of segment routing in the data center
- Use cases and applicability of segment routing
- Summary and conclusion
This document discusses multicast in OpenStack. It begins by defining multicast as one-to-many communication driven by receivers using a multicast IP address, without the need for the sender to duplicate packets. It then outlines the components of multicast including addressing, group management using IGMP, and multicast routing. The document notes that while OpenStack does not natively support multicast, it is possible to enable it by configuring IGMP snooping, security groups, and using plugins like Cisco's ASR1k and ACI drivers for Neutron. It recommends using provider networks without Neutron routing or these plugins to implement multicast routing externally. Finally, it discusses some multicast use cases and limitations.
Identity Services Engine Overview and UpdateCisco Canada
Cisco Identity Services Engine (ISE) provides an all-in-one solution for secure access across wired, wireless, and VPN networks. It replaces separate AAA, RADIUS, NAC, guest management, and device identity servers with a single platform for centralized policy management and visibility. ISE enforces dynamic access control policies based on user, device, location, and other context to protect networks and simplify security.
Complete training slide for the Cisco Data Center Application Centric Infrastructure (DCACI) based on the official cert guide 300-620 + module Quiz to test undesrstanding
Openstack Networking Internals - first partlilliput12
Openstack Networking Internals - first part
Description of the Virtual Network Infrastructure inside an OpenStack cluster
The pictures of the VNI were taken with the "Show my network state" tool
https://sites.google.com/site/showmynetworkstate/
Beyaz Şapkalı Hacker CEH Eğitimi - Aktif Bilgi ToplamaPRISMA CSI
Bu sunum, Prisma tarafından verilen “Uygulamalı Beyaz Şapkalı Hacker Eğitimi v1” de anlatılan bir üniteye aittir.
PRISMA CSI • Cyber Security and Intelligence www.prismacsi.com
Bu doküman, alıntı vererek kullanılabilir ya da paylaşılabilir ancak değiştirilemez ve ticari amaçla kullanılamaz. Detaylı bilgiye https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.tr bağlantısından erişebilirsiniz.
Deploying Cisco ISR G2 and ASR 1000 in the EnterpriseCisco Canada
This presentation discusses the disrupting networking trends that are changing the Enterprise landscape, scope of these changes include the areas of network security, services delivery, application performance optimization and cloud access in tomorrow's borderless networks. The biggest challenge is to help Enterprise IT scale. Borderless Networks is an architectural approach to networking that, if designed correctly, can automate business and network processes driving down operational cost, thus allowing IT to scale. Cisco ISR G2 and ASR 1000 platforms offer the best in class service richness and flexibility that is needed to deliver the promise of borderless networks and allow users to turn on services on-demand.
The document discusses VXLAN BGP EVPN based multi-pod, multi-fabric, and multi-site network architectures. It provides an overview of the evolution from single-pod/fabric deployments to more complex multi-site designs. Key concepts covered include hierarchical overlay domains, isolated underlay domains, and border gateways used to interconnect sites while maintaining underlay isolation.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...David McGeough
This session will cover advanced techniques in troubleshooting the Citrix NetScaler Appliance using tools such as Citrix TaaS, IPMI, nsconmsg, wireshark and log analysis. We will review usages of these tools along with case studies showing how to best troubleshoot common issues seen in operating Citrix NetScaler Appliances.
What you will learn
- Various tools available to troubleshoot issues and how to use them to isolate NetScaler Issues
- Common deployment problems and how to isolate the causes
Alexei Vladishev - Zabbix - Monitoring Solution for EveryoneZabbix
Zabbix is an open source monitoring solution that can monitor all levels of infrastructure across various platforms. It uses triggers to define problems and collects data through active and passive agents to analyze metrics and detect issues. When problems occur, Zabbix can automatically react through escalation procedures that include notifications, tickets, and restarts. It is highly scalable and offers features like anomaly detection, forecasting, and event correlation for complex environments.
For more info: http://scn.sap.com/community/sso.
SAP Single Sign-On enables companies to eliminate the need for multiple passwords and user IDs. Centralize and simplify the way users log on to systems and applications. Lower the risks of unsecured login information, reduce help desk calls, and help ensure the confidentiality and security of personal and company data.
The document discusses deploying web security through Cisco's web security appliances and cloud web security. It provides an overview of web security and describes Cisco's appliance and cloud-based options. It also covers how to configure the Cisco web security appliance for explicit and transparent proxy deployment using protocols like WCCP (Web Cache Communication Protocol) for traffic redirection.
Design and Deployment of Enterprise WLANsFab Fusaro
The document discusses Cisco's controller-based wireless LAN architecture and mobility solutions. It covers topics like:
- The components of Cisco's unified wireless network including wireless LAN controllers, Aironet access points, management software, and mobility services.
- Key principles like how access points must have CAPWAP connectivity to controllers to download configurations and forward all Wi-Fi traffic.
- How mobility is supported through mobility groups that allow controllers to peer and exchange information to enable seamless roaming across controller boundaries.
- Technologies and protocols that help enable fast and secure roaming like CCKM, 802.11r, eliminating full reauthentication, and not requiring reacquisition of IP addresses.
BRKDCN-2670 Day2 operations for Datacenter VxLAN EVPN fabrics.pdfHarryH11
The document discusses operational challenges in modern data centers running VXLAN EVPN fabrics and how Cisco Nexus Dashboard Insights helps address these challenges. It outlines 3 operational challenges around configuration complexity, troubleshooting, and performance monitoring. It then describes 3 traditional workflows for solving these and the 3 transformations needed around data collection, consumption and correlation. Finally it provides 3 operational use cases around configuration assurance, troubleshooting efficiency, and intent assurance that Nexus Dashboard Insights addresses.
This document provides an overview of extending enterprise networks into public clouds using Cisco Cloud Services Router 1000v (CSR1000v). It discusses the state of public clouds and networking challenges in AWS, Azure and GCP. It then introduces the CSR1000v and Cisco solutions for connecting to different public clouds. The presentation agenda includes demos and best practices. Key terms related to networking in public clouds are also defined.
Konrad Brunner discusses keys to consider when moving to next generation databases in the cloud. ARM templates are key for defining infrastructure as code and managing infrastructure together with applications. Automation is key for streamlining deployments, scaling resources, and saving money. Identities, network configuration, and application management are also important to consider for security and governance when adopting next generation databases in the cloud.
Three Innovations that Define a “Next-Generation Global Transit Hub”Khash Nakhostin
Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world.
We’ll share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that meet those requirements:
Software-defined and centrally managed – so anyone can run it.
Built-in security with fully encrypted tunnels, egress filtering, and VPC segmentation.
Operational readiness with integrated monitoring, alerting and troubleshooting that’s easy to hand off to an operations team.
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
The document discusses Cisco SD-WAN and its advantages over traditional and legacy WAN architectures. It highlights how Cisco SD-WAN uses a centralized control plane and software-defined intelligence to provide automated, predictive, and intent-based networking. This allows for flexible, scalable, and secure connectivity across hybrid WAN transports in a way that is simpler to manage and operate than hardware-centric WAN solutions.
One of the key challenges for all public cloud providers, not just Oracle, is how to securely and reliably connect cloud services to their customers’ existing systems. This presentation provides an impartial view of Oracle Network Cloud’s three offerings, with a more detailed drill down into the VPN available for shared compute cloud.
First delivered by Simon Haslam on 6 December 2016 at the UKOUG Tech16 conference
PartnerSkillUp_Enable a Streaming CDC SolutionTimothy Spann
PartnerSkillUp_Enable a Streaming CDC Solution
Tim Spann
Principal Developer Advocate in Data In Motion for Cloudera, Global
https://attend.cloudera.com/skillupseriesseptember14
Streaming Change Data Capture (CDC) Two Unique Ways
In this next session,
learn how to use Debezium with Flink, Kafka, and NiFi for Change Data Capture using two different mechanisms: Kafka Connect and Flink SQL.
With the virtual nature of today's world, streaming data is more critical than ever. Join Cloudera Chief Data-In-Motion Principal, Tim Spann, and Partner Solution Engineer, Salvador Alamazan as they look closely at key CDC use cases, discuss why Debezium is the best option for handling CDC and use examples to show you how to demonstrate value.
This is a must-attend experience!
Zoom Webinar
September 14, 2023
10:00am–11:00am EDT
FLaNK Stack
Apache NiFi
Apache Flink
Apache Kafka
Kafka Connect
Flink SQL
Cloudera DataFlow
Cloudera SQL Stream Builder
Cloudera Streams Messages Manager
Debezium
Postgresql
IBM DB2
Oracle DB
Secure Cloud Networking – Beyond Cloud Boundaries. When you are learning cloud, networking examples are just complicated enough to get you exposed to the networking fundamentals of that cloud. Real-life is quite a bit different. Matt Kazmar, Rod Stuhlmuller, Corbin Louks and Mark Cunningham from Aviatrix walks us through the complications of cloud networking, especially those encountered beyond one cloud.
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
This document discusses Cisco SD-WAN and its ability to deliver intent-based networking to branches and the WAN. It begins by noting the business challenges of traditional network architectures in supporting modern needs around mobility, cloud applications, and security. It then introduces Cisco SD-WAN as a software-defined solution that provides automated, predictive, and business-intent driven networking through centralized control, application-aware policies, hybrid WAN transport, and integrated security and analytics capabilities. Key components of the Cisco SD-WAN architecture are also summarized, including the data, control, management, and orchestration planes.
Cisco connect winnipeg 2018 a look at network assurance in dna centerCisco Canada
The document discusses Cisco DNA Center's network assurance capabilities, providing an overview of the assurance dashboard, client health monitoring features, and troubleshooting tools like path trace and client 360 views. It describes how DNA Center provides end-to-end visibility into network and client health through wireless insights, device monitoring, and guided remediation actions. The presentation also covers the hardware and software requirements for deploying DNA Center's assurance module.
Gain Insight and Programmability with Cisco DC NetworkingCisco Canada
This document discusses Cisco's data center networking strategy, with a focus on the Nexus 9000 series switches and Cisco Application Centric Infrastructure (ACI). Key points include:
- The Nexus 9000 series are Cisco's newest data center switches, featuring the CloudScale ASIC for improved performance, visibility, and encryption capabilities.
- Cisco ACI is a software-defined networking solution that provides policy-based automation and visibility across the data center network. ACI supports multi-cloud environments and integrates with orchestration tools.
- Recent innovations to ACI include expanded hardware support, improved security features, increased scale, and enhanced multi-site capabilities. Cisco is also working to extend ACI policies
This hands on workshop for OpenContrail will be led by Sreelakshmi Sarva & Aniket Daptari.
This is a labs session so we will have hard RSVP limits. Please RSVP only if you are confident that you will be able to attend.
About Sreelakshmi Sarva
Sree is currently working as part of solution engineering team at Juniper’s Contrail team. She is responsible for delivering & managing SDN solutions & partnerships relating to Contrail. She has been with Juniper for the last 13 years working on various Routing, Switching, Network programmability & virtualization platforms. Prior to Juniper, She worked at Nortel networks in the Systems Engineering group. Sree received her Masters in Computer Science from University of Texas at Dallas and Bachelor’s in Computer Science from India.
About Aniket Daptari
Aniket is currently working as part of Juniper Networks' Contrail Cloud Solutions team. He is responsible for delivering SDN solutions and technology partnerships related to Contrail. He has been with Juniper for the last 3 years working on various Network programmability & virtualization platforms. Prior to Juniper, he worked at Cisco Systems in the Internet Systems Business Unit (Catalyst 6500). Aniket received his Masters in Computer Science from University of Southern California and a graduate certificate in Management Science and Engineering from Stanford University.
Course Abstract
This session will be the first of a series of OpenContrail hands-on tutorials for developers who want to get deep into OpenContrail code.
This “Basic OpenContrail Programming” Hands-on Session will focus on making developers proficient in writing and contributing code for our OpenContrail Project.
Session will cover the following areas
1) Contrail Overview
· Use Cases
· Architecture recap
2) Contrail Hands on
· Demo + Hands on - Configuration , VN, VM, Network Policies etc
· DevStack introduction
This document provides an overview of Cisco TrustSec and its role-based access control capabilities for securing converged wired and wireless campus networks. It discusses how TrustSec provides user and device identification, security group tagging for segmentation, and security group access control lists for unified policy enforcement across the network. The document outlines the TrustSec components, including 802.1X authentication, device identification, role-based access controls using security group tags and access lists, and encryption of traffic using MACsec. It also provides examples of how TrustSec can be deployed in campus network architectures.
This document discusses segment routing and its benefits for incremental deployment in networks. It describes how segment routing uses MPLS or IPv6 routing headers to encode paths as ordered lists of segments. Segment routing allows more control over traffic paths compared to traditional IGP routing. It can enable traffic engineering and service chaining while maintaining network and control plane simplicity. The document argues segment routing is useful for scaling datacenters and simplifying peering relationships.
The document discusses Citrix NetScaler SD-WAN and its features. It provides information on how NetScaler SD-WAN can reduce network costs, improve branch resilience and centralize control. It highlights key differentiators of NetScaler SD-WAN such as intelligent path selection, end-to-end quality of service, management and visibility capabilities. The document also mentions upcoming Citrix Synergy and Cloud DNA events focused on NetScaler SD-WAN updates.
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Canada
The document discusses Cisco Digital Network Architecture (DNA) and its network intuitive capabilities. DNA Center provides automation, analytics, and assurance to translate business intent into network policies and reduce manual operations. It features workflows for network design and deployment, access control policy authoring, and software image management. DNA collects metrics from the network to provide insights through anomaly detection, trend analysis, and machine learning. This allows for guided troubleshooting and self-remediation of issues.
This document discusses simplifying security in the data center. It introduces concepts like micro-segmentation using Endpoint Groups (EPGs) in Cisco Application Centric Infrastructure (ACI) to isolate application traffic. It also discusses integrating ACI with Cisco TrustSec to apply common identity and security policies between the campus and data center domains. Finally, it demonstrates how the Cisco Firepower management center can be used to automate a security feedback loop, moving compromised endpoints to a quarantined EPG for remediation through REST API calls to ACI.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.