Watch the replay: http://cs.co/9001DxsKP
Are you getting unrivaled simplicity, end-to-end visibility, hardware reliability, and consistent policies from your WAN? You can get all of these things when you combine SD-WAN software with Cisco IOS XE routing platforms.
Experts from Cisco’s enterprise routing team will be on hand to show you what intent-based networking and software-defined simplicity in the WAN can bring. Powerful new capabilities are possible with a simple software image change.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9003DvZHt
TechWiseTV: http://cs.co/9009DzrjN
Today’s multicloud WAN environment is not only complicated–it can expose your business to an ever–expanding threat landscape. Learn how to provide consistent security across clouds, branches, and users. http://bit.ly/2DWBBX8
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Insight
More organizations are making the shift to Software-Defined Wide Area Networks (SD-WANs), but it can be difficult to decide which solutions are best suited to your business. In this infographic, explore two of the most well-established and widely deployed enterprise-grade Cisco SD-WAN solutions: Meraki MX and Viptela.
Watch the replay: http://cs.co/9001DxsKP
Are you getting unrivaled simplicity, end-to-end visibility, hardware reliability, and consistent policies from your WAN? You can get all of these things when you combine SD-WAN software with Cisco IOS XE routing platforms.
Experts from Cisco’s enterprise routing team will be on hand to show you what intent-based networking and software-defined simplicity in the WAN can bring. Powerful new capabilities are possible with a simple software image change.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9003DvZHt
TechWiseTV: http://cs.co/9009DzrjN
Today’s multicloud WAN environment is not only complicated–it can expose your business to an ever–expanding threat landscape. Learn how to provide consistent security across clouds, branches, and users. http://bit.ly/2DWBBX8
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Insight
More organizations are making the shift to Software-Defined Wide Area Networks (SD-WANs), but it can be difficult to decide which solutions are best suited to your business. In this infographic, explore two of the most well-established and widely deployed enterprise-grade Cisco SD-WAN solutions: Meraki MX and Viptela.
Anuta Networks at Networking Field Day 14Kiran Sirupa
Anuta NCX is designed to offer multi-vendor network orchestration across a variety of deployments, including campus, data centers, and carrier networks. Case Studies include branch automation with a Tier 1 MSP, enterprise connectivity in a managed data center, and a real world deployment with Telstra Managed Services. Anuta NCX uses a layered model driven architecture that allows for it users to work with services across multiple network vendors. NCX is built to model all of these and reconcile any differences completely autonomously, without the customer having to intervene. Any SLAs or other configuration can be done, as NCX has support standard YANG based orchestration.
Security continues to be top of mind as enterprises and service providers work to implement Software-Defined WAN (SD-WAN). Security is a critical requirement for enterprises as they rely more on the Internet for wide area networking, leverage the cloud for applications and services, and adopt new SD-WAN and NFV technologies for increased agility.
SD-WAN architectures are different and Cloud-Delivered SD-WAN offers a unique multi-pronged approach to accommodate the needs of all sizes of enterprises including the largest, as well as the service providers that serve them. Join this webinar to learn about new approaches with SD-WAN that both strengthen and simplify your security posture.
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Kiran Sirupa
A leading Tier-1 Operator in APAC was evaluating new technologies to deliver enhanced managed network services for its Enterprise customers. With the growth in the demand for these services driven by the region’s growing consumption of web-based content and applications, the full-fledged telecommunications company embarked on an initiative to enhance the capacity and capabilities of its managed network services, with the aim of positioning itself as the best-in-class provider of next-generation cloud data center services.
As part of this transformation, the Operator identified NFV-based intelligent service orchestration, leveraging SDN and NFV technologies to pioneer the development of a portfolio of managed network services and invited vendors to participate in a Proof of Concept (PoC) to validate solutions that will be able to deliver these capabilities.
In response to the initiative, Anuta Networks in collaboration with the Tier-1 Operator, HPE and Logicalis, a leading IT solutions and managed services provider, conducted a PoC that saw the company validating the first end-to-end Managed Network Service Delivery using the IETF YANG Modeling Framework.
The PoC saw the deployment of Anuta Networks' NFV Orchestrator and VNF Lifecycle Manager - Anuta NCX - which provides carrier-grade NFV orchestration for instantiating, managing, and chaining Virtual Network Functions (VNFs) in accordance to IETF’s Management and Orchestration (MANO) guidelines. HPE provided the NFVI including Helion OpenStack, HP Compute, HPE Virtual Router (VRS) and HPE DCN SDN (OEM version of ALU Nuage VSP) controller.
First of its kind, the highly successful PoC demonstrated capabilities of Anuta Networks via its NCX solution to deliver carrier-grade NFV orchestration while dynamically and intelligently provisioning computing, storage and networking resources to enable the Tier 1 Operator to efficiently deliver next-generation cloud services to clients across the region.
The Cisco IWAN Application simplifies WAN deployments by providing highly intuitive, policy-based automation. It enables you to realize the benefits of SD-WAN: lower costs, simplified IT, increased security, and optimized application performance.
View the Webcast: http://cs.co/9007BKlEc
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Many organizations anticipate significant growth in WAN bandwidth and Public Cloud usage. Leveraging the Internet to provide extra WAN bandwidth and to offload Public Cloud traffic is compelling, however network reliability, application performance and security are the primary roadblocks. Cisco IWAN transport solution is the most full featured architecture to support the Software Defined Wide Area Network (SD-WAN) requirements that are emerging in standards bodies like the Open Networking User Group (ONUG) to address these issues. Many enterprises are looking for the benefits these technologies deliver, but without the costs associated with owning and operating those technologies. Here is where VMS for IWAN meets market need. Cisco VMS is a full featured management platform for both virtual and physical devices. This session will cover a full description of the VMS platform and how it can be used to deliver exceptional customer experience when supporting a managed offering of IWAN. The roles of Customer and Resource Facing Services will be covered, along with integration between the IWAN service and SP operations. This session will also cover the topic of how Virtual Network Functions (VNFs) can be placed optimally in the network from the CPE to SP datacenter, along with a demo of the end user and operator experience.
NetScaler SD-WAN combina la selección de rutas de paquete en tiempo real, optimización WAN, firewall, enrutamiento y análisis de aplicaciones en una sola solución completa. Tanto si accede a aplicaciones SaaS como a escritorios virtualizados o centros de datos tradicionales. ¡Garantice en su empresa una experiencia de alta calidad siempre lista y con una red de sucursales más sencilla y ágil!
Forward Networks - Networking Field Day 13 presentationForward Networks
On November 17th, 2016, Forward Networks conducted its first public unveiling of its Network Assurance platform at Networking Field Day 13. Visit https://www.forwardnetworks.com/ for more details.
IT organizations have long been challenged by the cost and complexity of managing the enterprise wide area network (WAN), and the demands keep growing. Software-defined WAN (SD-WAN) technology has emerged to reduce that cost and complexity, all while improving performance. With so many SD-WAN architectures to consider, how do you determine which is right for your organization?
Review this presentation and you will:
- Assess your organization's WAN growth requirements
- Understand the impact of various SD-WAN architecture on your WAN deployment
- Compare SD-WAN vendors to determine the best fit for your enterprise
- Learn how rethinking the WAN can deliver agility, simplicity, improved quality of experience, and better cloud performance
- Discover the different architectures on the market, along with their benefits and drawbacks
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
HPE Distributed Cloud Networking (DCN) enables service providers and large organizations to manage a distributed, multi data center environment in a simple, open and agile way using software-defined networking and network virtualization. At this session, we'll explore HPE Distributed Cloud Networking (DCN), Layer 2 to Layer 4. You will learn how this network virtualization platform optimizes the network by removing inefficiencies.
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
Lila Rousseaux, Consulting Systems Engineer, Enterprise Networks and Tim Szigeti, Technical Marketing Engineer discusses SDN in the enterprise at Cisco Connect Toronto 2015.
Modern business runs in the cloud, however traditional WAN routers weren't made for that. Silver Peak Unity EdgeConnect is primed for the cloud. In fact it is the industry leading SD-WAN solution that is freeing businesses from their dependency on routers
Enterprises continue to implement or evaluate shifting services which were typically hosted in the branch into the cloud. The reasons include creating a leaner branch, taking advantage of increases in broadband Internet bandwidth and reduced complexity and cost.
This presentation takes a deep dive into the Cloud-Delivered SD-WAN architecture for service chaining. You’ll understanding the architectural differentiation and benefits of this approach and why it offers a superior model for delivering secure, reliable, and high performance service chaining.
Anuta Networks at Networking Field Day 14Kiran Sirupa
Anuta NCX is designed to offer multi-vendor network orchestration across a variety of deployments, including campus, data centers, and carrier networks. Case Studies include branch automation with a Tier 1 MSP, enterprise connectivity in a managed data center, and a real world deployment with Telstra Managed Services. Anuta NCX uses a layered model driven architecture that allows for it users to work with services across multiple network vendors. NCX is built to model all of these and reconcile any differences completely autonomously, without the customer having to intervene. Any SLAs or other configuration can be done, as NCX has support standard YANG based orchestration.
Security continues to be top of mind as enterprises and service providers work to implement Software-Defined WAN (SD-WAN). Security is a critical requirement for enterprises as they rely more on the Internet for wide area networking, leverage the cloud for applications and services, and adopt new SD-WAN and NFV technologies for increased agility.
SD-WAN architectures are different and Cloud-Delivered SD-WAN offers a unique multi-pronged approach to accommodate the needs of all sizes of enterprises including the largest, as well as the service providers that serve them. Join this webinar to learn about new approaches with SD-WAN that both strengthen and simplify your security posture.
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Kiran Sirupa
A leading Tier-1 Operator in APAC was evaluating new technologies to deliver enhanced managed network services for its Enterprise customers. With the growth in the demand for these services driven by the region’s growing consumption of web-based content and applications, the full-fledged telecommunications company embarked on an initiative to enhance the capacity and capabilities of its managed network services, with the aim of positioning itself as the best-in-class provider of next-generation cloud data center services.
As part of this transformation, the Operator identified NFV-based intelligent service orchestration, leveraging SDN and NFV technologies to pioneer the development of a portfolio of managed network services and invited vendors to participate in a Proof of Concept (PoC) to validate solutions that will be able to deliver these capabilities.
In response to the initiative, Anuta Networks in collaboration with the Tier-1 Operator, HPE and Logicalis, a leading IT solutions and managed services provider, conducted a PoC that saw the company validating the first end-to-end Managed Network Service Delivery using the IETF YANG Modeling Framework.
The PoC saw the deployment of Anuta Networks' NFV Orchestrator and VNF Lifecycle Manager - Anuta NCX - which provides carrier-grade NFV orchestration for instantiating, managing, and chaining Virtual Network Functions (VNFs) in accordance to IETF’s Management and Orchestration (MANO) guidelines. HPE provided the NFVI including Helion OpenStack, HP Compute, HPE Virtual Router (VRS) and HPE DCN SDN (OEM version of ALU Nuage VSP) controller.
First of its kind, the highly successful PoC demonstrated capabilities of Anuta Networks via its NCX solution to deliver carrier-grade NFV orchestration while dynamically and intelligently provisioning computing, storage and networking resources to enable the Tier 1 Operator to efficiently deliver next-generation cloud services to clients across the region.
The Cisco IWAN Application simplifies WAN deployments by providing highly intuitive, policy-based automation. It enables you to realize the benefits of SD-WAN: lower costs, simplified IT, increased security, and optimized application performance.
View the Webcast: http://cs.co/9007BKlEc
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Many organizations anticipate significant growth in WAN bandwidth and Public Cloud usage. Leveraging the Internet to provide extra WAN bandwidth and to offload Public Cloud traffic is compelling, however network reliability, application performance and security are the primary roadblocks. Cisco IWAN transport solution is the most full featured architecture to support the Software Defined Wide Area Network (SD-WAN) requirements that are emerging in standards bodies like the Open Networking User Group (ONUG) to address these issues. Many enterprises are looking for the benefits these technologies deliver, but without the costs associated with owning and operating those technologies. Here is where VMS for IWAN meets market need. Cisco VMS is a full featured management platform for both virtual and physical devices. This session will cover a full description of the VMS platform and how it can be used to deliver exceptional customer experience when supporting a managed offering of IWAN. The roles of Customer and Resource Facing Services will be covered, along with integration between the IWAN service and SP operations. This session will also cover the topic of how Virtual Network Functions (VNFs) can be placed optimally in the network from the CPE to SP datacenter, along with a demo of the end user and operator experience.
NetScaler SD-WAN combina la selección de rutas de paquete en tiempo real, optimización WAN, firewall, enrutamiento y análisis de aplicaciones en una sola solución completa. Tanto si accede a aplicaciones SaaS como a escritorios virtualizados o centros de datos tradicionales. ¡Garantice en su empresa una experiencia de alta calidad siempre lista y con una red de sucursales más sencilla y ágil!
Forward Networks - Networking Field Day 13 presentationForward Networks
On November 17th, 2016, Forward Networks conducted its first public unveiling of its Network Assurance platform at Networking Field Day 13. Visit https://www.forwardnetworks.com/ for more details.
IT organizations have long been challenged by the cost and complexity of managing the enterprise wide area network (WAN), and the demands keep growing. Software-defined WAN (SD-WAN) technology has emerged to reduce that cost and complexity, all while improving performance. With so many SD-WAN architectures to consider, how do you determine which is right for your organization?
Review this presentation and you will:
- Assess your organization's WAN growth requirements
- Understand the impact of various SD-WAN architecture on your WAN deployment
- Compare SD-WAN vendors to determine the best fit for your enterprise
- Learn how rethinking the WAN can deliver agility, simplicity, improved quality of experience, and better cloud performance
- Discover the different architectures on the market, along with their benefits and drawbacks
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
HPE Distributed Cloud Networking (DCN) enables service providers and large organizations to manage a distributed, multi data center environment in a simple, open and agile way using software-defined networking and network virtualization. At this session, we'll explore HPE Distributed Cloud Networking (DCN), Layer 2 to Layer 4. You will learn how this network virtualization platform optimizes the network by removing inefficiencies.
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
Lila Rousseaux, Consulting Systems Engineer, Enterprise Networks and Tim Szigeti, Technical Marketing Engineer discusses SDN in the enterprise at Cisco Connect Toronto 2015.
Modern business runs in the cloud, however traditional WAN routers weren't made for that. Silver Peak Unity EdgeConnect is primed for the cloud. In fact it is the industry leading SD-WAN solution that is freeing businesses from their dependency on routers
Enterprises continue to implement or evaluate shifting services which were typically hosted in the branch into the cloud. The reasons include creating a leaner branch, taking advantage of increases in broadband Internet bandwidth and reduced complexity and cost.
This presentation takes a deep dive into the Cloud-Delivered SD-WAN architecture for service chaining. You’ll understanding the architectural differentiation and benefits of this approach and why it offers a superior model for delivering secure, reliable, and high performance service chaining.
In an ever-changing technology landscape, SD-WAN has emerged as a leading technology to drive IT efficiency. Innovation, market convergence, and a noisy product landscape have made the marketplace more complex than it needs to be. Learn why a managed approach makes things easier and is considered a best practice by many.
SD-WAN iFLX solution gives you operational simplicity, application-level prioritization, and visibility, integrated security, enhanced overall business application environment as well as the much-needed resilience at an affordable price point.
Using a secured, cloud-delivered SD-WAN to transform your business networkNetpluz Asia Pte Ltd
For more information on Managed Software Defined Wide Area Network (SD-WAN) service, please visit https://www.netpluz.asia/services/data/sd-wan/
Website: www.netpluz.asia
Deploying new WAN services can take a long time and require a significant up-front capital investment. The software-defined nature of SD-WAN enables service agility, rapid rollout, and instant-on WAN that the Service Provider can immediately benefit from. This accelerates the time to market and time to revenue.
IT Professional with over 15 years of experience in planning, engineering, administration, maintenance, optimization , analysis and troubleshooting for various network technologies including VoIP, wireless and data center for medium to global enterprise environments which includes proficiency in routing, routing protocols, switching, WLAN, VPN, WiFi, security, firewalls, network performance and security assessment as well as post-assessment reports and recommendations.
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsCA Technologies
Even the most intelligent network needs management to visualize application traffic flows at the network level and know how well application service levels are being met. The CA Application Performance Management solution leverages key performance indicators from Cisco’s Intelligent WAN solutions, which add value to your network through application visibility and control, application acceleration (WAN optimization) and intelligent path selection. By enabling you to gain visibility into application performance from a network perspective, you can make proactive, data-driven decisions regarding network capacity, QoS policies, infrastructure investments and planned application rollouts.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Nuage Networks: Delivering Datacenter Networks As Consumable as Computee_scot...Nuage Networks
While much has been said about network virtualization, current solutions remain limited to simplistic use cases, restricting services within boundaries of single data centers or virtualized islands. We describe a novel approach that fulfills the promise of massively scalable network virtualization and enables the seamless interconnection of cloud services with existing enterprise environments. Speaker: Scott Sneddon, Principle Solutions Architect, Nuage Networks
Presentation from 9/24/15 webcast presented by WWT Mobility and Access Lead Neil Anderson, on how deploying a Cisco Intelligent WAN (IWAN) strategy will be critical to meet the demands on your business. Bill Thompson and Laks Vijayarajan, technical solutions architects in WWT’s Advanced Technology Center (ATC), covered technical best practices to ensure a successful IWAN deployment.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Next-Gen Cisco SD-WAN Architecture
Shamil Fernando
Manager Systems Engineering (Cisco SD-WAN)
3. User and Application Landscape is Changing
Change in App Content Change in App Delivery Change in App Consumption
Rich, Dynamic, Web-Based Cloud, SaaS, Virtualized Mobile, Diverse devices
Internet Edge Is Moving to the Branch
Applications Are Moving to the Cloud
INTERNET MPLS 4G
DC vDC
IaaS SaaS
mobile
branch
guest
head
office
4. Customer Requirements
Security and Compliance are critical areas and require us to
have the appropriate Segmentation, Policing, Access
Controls and Visibility from end-to-end
Network Planning
I want to Simplify Deployments and Automate
Policy Enforcement to ensure a Consistent and
Seamless Application Experience
Network Operations
I want to Centralized Policy Enforcement and
Assurance to Accelerate Time to Resolution
Network Manager
I need to Replace or Change existing Infrastructure
and WAN Services to Lower Costs and Maximize
Investments
Security Operations
5. Traditional and Legacy Architectures cannot scale to
address changing needs
SOFTWARE DEFINED: True separation of control, data
and management
CLOUD: Cloud hosted and delivered
APPLICATION AWARE: Visibility & SLA business intent
policy enforcement
SCALE AND FLEXIBILITY: True enterprise scale
SECURITY: Ingrained authentication, encryption,
segmentation, access controls & service chaining
OPEN: for automation, orchestration,
best-of-breed integration
Application
Bandwidth
Requirements
Cloud
Consumption
Disjointed
Security
Simplified
Operations
WAN
Flexibility
Time
To Capability
Challenges
Enabling Seamless transition
from traditional WAN to SD WAN
SECURE WAN FABRIC
Broadband 4G/LTEMPLS
ZERO TOUCH ZERO TRUST
1
6. • Reduce Cost
• Secure Your Network
• Operate Faster and Simplicity
• Integrate Latest Cloud and Network Technologies
Cisco SD-WAN Solution helps you to:
7. Traditional Networks
Control and Data Plane same
devices
Peer-to-peer control plane
Routing protocol prorogate
for all (N^2) complexity
Localize management
Complex to manage
Not scalable
Impossible to support
multiple transport
Link down create route storm
Control &
Data Plane
Control &
Data Plane
Control &
Data Plane
8. 4G/LTE
MPLS1Internet
MPLS2
SD-WAN Principals
• Separation Control and Data Plane
• DTLS/TLS is used to establish the
control channel
• Control channel is established only
with central controllers
• No scaling issues are with full mesh
of control plane
• Control channel does not have to
follow the data path
• No disruption one link fail
Data Plane
Control Plane
Data PlaneData Plane
Data Plane
9. Cisco SD-WAN Architecture
Control Plane
(Containers or VMs)
Data Plane
(Physical or Virtual)
Management Plane
(Multi-tenant or Dedicated)
Orchestration Plane
API
4GINTERNET MPLS
vSmart
ANALYTICSORCHESTRATION
vManager
vManage
vSmart
vEdge
vBond
vBond
Data Center Campus Branch Home Office
10. Cisco SD-WAN Solution Elements
4G/LTE
MPLSInternet
vEdge Routers
vSmartvManage
Ubiquitous
Data Plane
Secure
Control Plane
Controllers
On-premise/cisco Cloud/
Partner Cloud
vBond
12. Zero-Trust Security Principles
DTLS/TLS
Control Tunnel
Strong authentication
- PKI certificates, 2048bit keys
Highly encrypted tunnels
- DTLS/TLS AES256
- White-list model
Ubiquitous Deployment
- Automatic NAT mitigation
Control Elements
X.509 Certificate
13. Secure Bring-up With Approval
• Per-device control on TPM identity trust
• Single stage (Zero Touch Provisioning) – TPM identity is automatically trusted
• Two stage (One Touch Provisioning) – TPM identity is not automatically
trusted. Requires administrator validation.
• Staging Mode – TPM identity is automatically trusted for control, but not for
data. Requires administrator validation.
14. End to End Security
TransportsTransportsTransports
Site 1 Site 2
IPSec AES256-GCM
ESPv3 with HMAC SHA-1
vSmart
Controllers
Control Plane
DTLS/TLS
IPSec security
associations
IPSec security
associations
Update Update
Symmetric encryption IPsec AES256-GCM
ESPv3 with HMAC SHA-1
Traffic Encryption and Authentication Header
Tunnel Liveliness Detection (BFD)
Anti-Replay Protection
Rekey 12 hours
Each vEdge advertises its local
IPsec encryption key
Traffic Encrypted
with Key 2
Traffic Encrypted
with Key 1
vEdge
Router
vEdge
Router
Local
Remote Local
Remote
15. Configuration Simplicity and ZTP
• Templates are attached to provisioned
vEdge routers
• Variables are used for rapid bulk
configuration rollout with unique per-
device settings
• Local configuration changes are not
allowed
- Prevents configuration drift
16. Configuration Simplicity and ZTP
Zero Touch Bringup
Server
Control and Policy
Elements
Full Registration
and Configuration
vEdge Router
1 2
3 4 5
* Factory default config
Assumption:
DNS to resolve ztp.viptela.com*
Authentication
Push the configuration
Enforce the version
18. Application Performances and AAR
Path1: 10ms, 0% loss, 2ms jitter
Path2: 200ms, 3% loss 5ms jitter
Path3: 140ms, 1% loss 3ms jitter
vSmart
Controllers
App Aware Routing Policy
App A path must have
latency <150ms and loss <2%
Path 2
vEdge Routers continuously perform
path liveliness and quality
measurements Latency, Loss and Jitter,
Auto Load Balance
Device QoS
(shaping, policing,
queuing, marking)
Internet
MPLS
4G LTE
Optimal Throughput
19. End to End Segmentation
Use Cases
Security Zoning
Compliance
Guest WiFi
Multi-Tenancy
Extranet
Interface
VLAN
Prefix
TransportsTransports
Site 1
Site 2
Data Center
VPN
A
VPN
B
VPN
C
IPSec
20
IP
8
UDP
36
ESP
4
VPN
…
Data
Label
802.1q
802.1q
IF
IF
IF
IF
Isolated virtual private networks across any
transport
VPN mapping is based on physical vEdge Router
interface, 802.1Q VLAN tag or a mix of both
20. Per-Segment Topologies
Full Mesh Hub-and-Spoke Regional Hub
Unified Communications Data Center Applications Regional Internet/Services
Optimal Application Experience
21. Cloud onRamp for IaaS
Secure
SD-WAN
Fabric
Provide security,
segmentation, QoS and
reliability to cloud
workloads?
22. Optimize Public Cloud Performance (SaaS)
Regional
internet exit
Branch with
local DMZ
Data
Center/DMZ
vFabric
httping probes
SaaS traffic primary
SaaS traffic backup
Score Color
8-10 GREEN
5-8 YELLOW
0-5 RED
26. Self Healing Capabilities
Active Software
Available Software
Available Software
Available Software
A
B
C
D
Activate
Rollback
vEdge Router
1
2
3
Failed
Upgrade
vEdge Router
1
Attach Template
vManage
2
Connectivity
Lost
Rollback
3
27. High Availability and Redundancy
VRRP OSPF/
BGP
OSPF/
BGP
Internet InternetMPLSMPLS
Internet
MPLS
Site
Data
Center
MPLS
Internet
vSmart Controllers
Control
Data
28. vEdge Portfolio
vEdge capabilities integrated
into all IOS-XE platforms
(ISR, CSR, ENCS, ASR1K)
cloud
Interconnect
(2 Gbps +)
Small Office
Home Office
100 Mbps
Branch
Campus
1 Gbps
Large Campus
Data Center
10 Gbps
Higher Capacity
Aggregation
20 Gbps+
ISR4K
ASR1K
Private Cloud
ENCS
29. Why Cisco SD-WAN
Trusted by Fortune 500 Enterprises
Cisco SD-WAN: The Most-Deployed Enterprise Grade SD-WAN
Thousands of sites, every major industry, including:
RETAIL HEALTHCARE FINANCIAL SERVICES ENERGY
Most deployed and trusted by
Fortune 500 enterprises
Winning 95% of
competitive POCs
Standards Compliant: …and more
Editor's Notes
Cisco SD-WAN provide Multi transport Network
Over disjoin network - Separation of the control plane
Application visibility over 3000+ application
Limited scale them of thousand
Reduce the WAN cost
Direct access to cloud and improve the performances
Simplify the operation
Disjoined Network
No application visibility
Limited scale
Insufficient BW
WAN cost
No direct access to cloud app
Hybrid
Fragment Security
Complex Operations
Component – vEdge Router (Hardware / Software), Control Component (software
Support – smaller branch, Large Datacenter, Public and Private cloud
Controller can be deployed – Viptela / Private / On Premise
Transport Independent Fabric
Create Secure data plane connection between the vEdge and controllers
Only control information send to the controller
vManage for Management and monitoring.
Rest full APIS
Transport Independent Fabric
Can connect multiple transport to Single router
Simplify the deployment using Zero Touch
Zero trust
All connation are A/A
Eliminate WAN side routing
Delivery Platform (Routing)
Full Router, Full BGP and OSPF
(VRF) Segmentation
Full QoS and Shaping
Multicast
Traffic redirection (Svc Insertions)
High Availability (AS/AP)
Replace the router and simplify the Network
Application & Policies
DPI and Application Visibility,
Application SLA base policy (best path base on the underline network performances)
Traffic engineering
Segmentation based topology
Secure internet gateway
SaaS and IaaS path selection and acceleration
Operation, Monitoring and Analytics
Complete configuration and Management
No Configuration in Edge Device
5 min revert, 8 min revert for upgrade
Optimal Throughput – MTU discovery
Largest Deployed in Retail, Healthcare, Financial Services and Energy
Most deployed across Fortune-500 Enterprises
Thousands of production sites in every major industry
Compliant with PCI, HIPAA and other industry standards
1. Sophistication of Use cases for the Enterprise - hybrid wan, business partners, soho, cloud, M&A etc
2. Most deployed and trusted SDWAN solution by Fortune 500