This document discusses Cisco Prime Network Management and its benefits over traditional point-product network management solutions. It provides an overview of Cisco Prime's integrated workflows, common user experience, consolidated management capabilities, and support for the full device lifecycle. Key features highlighted include comprehensive device manageability, assurance of application experience and visibility, simplified deployment of Cisco devices, and support for network lifecycle management.
Cloud native architecture is emerging for Telecom workloads. To support these emerging trends, Intel is targeting enhancements to the Dataplane Development Kit (DPDK). The enhancements would target network service mesh with dedicated sidecar accelerators and the mechanism to build the mesh dynamically.
Speaker: Gerald Rogers. Gerald Rogers is a Principal Engineer in the Network Products Group focused on virtual switching, network function virtualization and Data Plane Development Kit (DPDK). After joining Intel in 2005, Gerald has worked as a software engineer and architect in the embedded and networking groups. For the past 7 years Gerald has led the network virtual switching software and hardware acceleration effort to drive Intel architecture into the networking and telecommunications industry. Gerald holds a Bachelor’s degree in Electrical Engineering and a Master’s degree in Computer Science, and has 20 years of experience in the networking and telecommunications industry.
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...Cisco Canada
The document discusses Cisco's Digital Network Architecture (DNA) and the Cisco DNA Center. It introduces DNA as an open, programmable and automated network architecture powered by intent and informed by context. It describes how DNA Center allows users to automate network provisioning and policy, gain insights through assurance and analytics capabilities, and translate business intent into network policies through an intuitive interface. The document provides examples of how DNA Center streamlines operations through profile-driven automation, software management, and expressive intent-based policies.
Best Practices for ETL with Apache NiFi on Kubernetes - Albert Lewandowski, G...GetInData
Did you like it? Check out our E-book: Apache NiFi - A Complete Guide
https://ebook.getindata.com/apache-nifi-complete-guide
Apache NiFi is one of the most popular services for running ETL pipelines otherwise it’s not the youngest technology. During the talk, there are described all details about migrating pipelines from the old Hadoop platform to the Kubernetes, managing everything as the code, monitoring all corner cases of NiFi and making it a robust solution that is user-friendly even for non-programmers.
Author: Albert Lewandowski
Linkedin: https://www.linkedin.com/in/albert-lewandowski/
___
Getindata is a company founded in 2014 by ex-Spotify data engineers. From day one our focus has been on Big Data projects. We bring together a group of best and most experienced experts in Poland, working with cloud and open-source Big Data technologies to help companies build scalable data architectures and implement advanced analytics over large data sets.
Our experts have vast production experience in implementing Big Data projects for Polish as well as foreign companies including i.a. Spotify, Play, Truecaller, Kcell, Acast, Allegro, ING, Agora, Synerise, StepStone, iZettle and many others from the pharmaceutical, media, finance and FMCG industries.
https://getindata.com
To be able to use analytics effectively and thus leverage the data treasures in the company, you need a modern and scalable data platform that can react flexibly to events and was designed with a DataOps mindset from the very beginning.
This document provides a tutorial on NETCONF and YANG, which are standards for network configuration and management. NETCONF was designed to address operators' requirements for easier network-wide configuration, validation of changes, and transactional management across multiple devices. It uses SSH for secure transport and XML encoding. YANG provides data models to define the configuration and state data. The tutorial covers the background and motivation for these standards, an overview of NETCONF operations and examples, and a demonstration of YANG data modeling. It explains how NETCONF enables network-wide atomic transactions, fulfilling a key operator need and improving the cost and complexity of network management.
Data Privacy with Apache Spark: Defensive and Offensive ApproachesDatabricks
In this talk, we’ll compare different data privacy techniques & protection of personally identifiable information and their effects on statistical usefulness, re-identification risks, data schema, format preservation, read & write performance.
We’ll cover different offense and defense techniques. You’ll learn what k-anonymity and quasi-identifier are. Think of discovering the world of suppression, perturbation, obfuscation, encryption, tokenization, watermarking with elementary code examples, in case no third-party products cannot be used. We’ll see what approaches might be adopted to minimize the risks of data exfiltration.
Cloud native architecture is emerging for Telecom workloads. To support these emerging trends, Intel is targeting enhancements to the Dataplane Development Kit (DPDK). The enhancements would target network service mesh with dedicated sidecar accelerators and the mechanism to build the mesh dynamically.
Speaker: Gerald Rogers. Gerald Rogers is a Principal Engineer in the Network Products Group focused on virtual switching, network function virtualization and Data Plane Development Kit (DPDK). After joining Intel in 2005, Gerald has worked as a software engineer and architect in the embedded and networking groups. For the past 7 years Gerald has led the network virtual switching software and hardware acceleration effort to drive Intel architecture into the networking and telecommunications industry. Gerald holds a Bachelor’s degree in Electrical Engineering and a Master’s degree in Computer Science, and has 20 years of experience in the networking and telecommunications industry.
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...Cisco Canada
The document discusses Cisco's Digital Network Architecture (DNA) and the Cisco DNA Center. It introduces DNA as an open, programmable and automated network architecture powered by intent and informed by context. It describes how DNA Center allows users to automate network provisioning and policy, gain insights through assurance and analytics capabilities, and translate business intent into network policies through an intuitive interface. The document provides examples of how DNA Center streamlines operations through profile-driven automation, software management, and expressive intent-based policies.
Best Practices for ETL with Apache NiFi on Kubernetes - Albert Lewandowski, G...GetInData
Did you like it? Check out our E-book: Apache NiFi - A Complete Guide
https://ebook.getindata.com/apache-nifi-complete-guide
Apache NiFi is one of the most popular services for running ETL pipelines otherwise it’s not the youngest technology. During the talk, there are described all details about migrating pipelines from the old Hadoop platform to the Kubernetes, managing everything as the code, monitoring all corner cases of NiFi and making it a robust solution that is user-friendly even for non-programmers.
Author: Albert Lewandowski
Linkedin: https://www.linkedin.com/in/albert-lewandowski/
___
Getindata is a company founded in 2014 by ex-Spotify data engineers. From day one our focus has been on Big Data projects. We bring together a group of best and most experienced experts in Poland, working with cloud and open-source Big Data technologies to help companies build scalable data architectures and implement advanced analytics over large data sets.
Our experts have vast production experience in implementing Big Data projects for Polish as well as foreign companies including i.a. Spotify, Play, Truecaller, Kcell, Acast, Allegro, ING, Agora, Synerise, StepStone, iZettle and many others from the pharmaceutical, media, finance and FMCG industries.
https://getindata.com
To be able to use analytics effectively and thus leverage the data treasures in the company, you need a modern and scalable data platform that can react flexibly to events and was designed with a DataOps mindset from the very beginning.
This document provides a tutorial on NETCONF and YANG, which are standards for network configuration and management. NETCONF was designed to address operators' requirements for easier network-wide configuration, validation of changes, and transactional management across multiple devices. It uses SSH for secure transport and XML encoding. YANG provides data models to define the configuration and state data. The tutorial covers the background and motivation for these standards, an overview of NETCONF operations and examples, and a demonstration of YANG data modeling. It explains how NETCONF enables network-wide atomic transactions, fulfilling a key operator need and improving the cost and complexity of network management.
Data Privacy with Apache Spark: Defensive and Offensive ApproachesDatabricks
In this talk, we’ll compare different data privacy techniques & protection of personally identifiable information and their effects on statistical usefulness, re-identification risks, data schema, format preservation, read & write performance.
We’ll cover different offense and defense techniques. You’ll learn what k-anonymity and quasi-identifier are. Think of discovering the world of suppression, perturbation, obfuscation, encryption, tokenization, watermarking with elementary code examples, in case no third-party products cannot be used. We’ll see what approaches might be adopted to minimize the risks of data exfiltration.
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...kds850
The document provides an overview of Cisco Nexus 2000 Fabric Extender architectures, features, and topologies. It begins with introductions to Cisco's Nexus 5000/6000/7000/9000 parent platform switches that support Nexus 2000 FEX. It then discusses Nexus 2000 platform architectures, supported topologies and features. The agenda covers parent switch overviews, Nexus 2000 platform details, configuration and connectivity options. The goal is to discuss Nexus 2000 designs, topologies, and implementation in depth without covering more advanced topics like vPC, FCoE, QoS, etc.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
SDN in the Management Plane: OpenConfig and Streaming TelemetryAnees Shaikh
The networking industry has made good progress in the last few years on developing programmable interfaces and protocols for the control plane to enable a more dynamic and efficient infrastructure. Despite this progress, some parts of networking risk being left behind, most notably network management and configuration. The state-of-the-art in network management remains relegated to proprietary device interfaces (e.g., CLIs), imperative, incremental configuration, and lack of meaningful abstractions.
We propose a framework for network configuration guided by software-defined networking principles, with a focus on developing common models of network devices, and common languages to describe network structure and policies. We also propose a publish/subscribe framework for next generation network telemetry, focused on streaming structured data from network elements themselves.
Example application providing guidelines for using the Cryptography Device Library framework.
Showcase DPDK cryptodev framework performance with a real world use case scenario.
Author: Georgi Tkachuk
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
The document discusses Cisco's DNA Center and its capabilities for automating network management. It covers:
- Why intent-based networking is needed to reduce costs and errors from manual network changes
- How DNA Center supports intent-based networking by allowing administrators to define policies and have them automatically implemented across the network
- Key automation use cases DNA Center addresses like onboarding new devices, managing software upgrades, creating configuration templates, and deploying wireless networks
- Demonstrations of DNA Center's capabilities for plug-and-play deployment, software management, template configuration, and wireless provisioning
Introducing KRaft: Kafka Without Zookeeper With Colin McCabe | Current 2022HostedbyConfluent
Introducing KRaft: Kafka Without Zookeeper With Colin McCabe | Current 2022
Apache Kafka without Zookeeper is now production ready! This talk is about how you can run without ZooKeeper, and why you should.
Demystifying EVPN in the data center: Part 1 in 2 episode seriesCumulus Networks
Network operators are slowly but surely embracing L3-based leaf-spine designs. However, either due to legacy applications or certain multi-tenancy requirements, the need for L2 across racks is still present. How do you solve the problem of providing L2 across multiple racks? EVPN is quickly emerging as the best answer to this question.
In this episode of our 2-part series on EVPN, we start with a discussion of the use cases, a review of the technologies EVPN competes with, and dive into an evaluation of the pros and cons of each.
For a recording of the live event, go to http://go.cumulusnetworks.com/l/32472/2017-09-22/95t27t
This document discusses bringing multi-tenancy to Apache Zeppelin through the integration of Apache Livy. It introduces Zeppelin as an interactive web-based notebook for data analysis. It then describes how Livy allows Zeppelin to support multi-tenancy by enabling user authentication and session management for Spark jobs submitted through Zeppelin. The document provides an overview of Livy's architecture and security features like SPNEGO and impersonation that facilitate secure multi-tenant access to shared Spark clusters from Zeppelin.
Watch this recorded demonstration of SnapLogic from our team of experts who answer your hybrid cloud and big data integration questions.
demo, ipaas, elastic integration, cloud data, app integration, data integration, hybrid could integration, big data, big data integration
22nd Athens Big Data Meetup - 1st Talk - MLOps Workshop: The Full ML Lifecycl...Athens Big Data
Title: MLOps Workshop: The Full ML Lifecycle - How to Use ML in Production
Speakers: Spyros Cavadias (https://www.linkedin.com/in/spyros-cavadias/), Konstantinos Pittas (https://www.linkedin.com/in/konstantinos-pittas-83310270/), Thanos Gkinakos (https://www.linkedin.com/in/thanos-gkinakos-03582a128/)
Date: Saturday, December 17, 2022
Event: https://www.meetup.com/athens-big-data/events/289927468/
Presto: Fast SQL-on-Anything (including Delta Lake, Snowflake, Elasticsearch ...Databricks
Presto, an open source distributed SQL engine, is widely recognized for its low-latency queries, high concurrency, and native ability to query multiple data sources. Proven at scale in a variety of use cases at Airbnb, Comcast, GrubHub, Facebook, FINRA, LinkedIn, Lyft, Netflix, Twitter, and Uber, in the last few years Presto experienced an unprecedented growth in popularity in both on-premises and cloud deployments over Object Stores, HDFS, NoSQL and RDBMS data stores.
TRex Realistic Traffic Generator - Stateless support Hanoch Haim
New Stateless support in TRex provides:
- High performance packet generation of up to 22 million packets per second per core and support for interfaces from 1Gbps to 100Gbps.
- Flexible traffic profiles that can generate multiple streams of traffic with programmable fields using a field engine.
- Statistics on a per port, per stream, and per traffic profile basis including latency and jitter.
- Python API and interactive console for automation and control.
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
Enterprise Architecture, Deployment and Positioning Cisco Russia
The document discusses enterprise network deployment models and Cisco products for each model. It provides an overview of unified access, traditional access, converged access, and instant access deployment models. For each model, it describes the key characteristics and considerations, as well as which Cisco products are best suited as the lead platform. The document also covers topics like Cisco TrustSec for security, application visibility and control, and resiliency features of Cisco Catalyst infrastructure products.
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...kds850
The document provides an overview of Cisco Nexus 2000 Fabric Extender architectures, features, and topologies. It begins with introductions to Cisco's Nexus 5000/6000/7000/9000 parent platform switches that support Nexus 2000 FEX. It then discusses Nexus 2000 platform architectures, supported topologies and features. The agenda covers parent switch overviews, Nexus 2000 platform details, configuration and connectivity options. The goal is to discuss Nexus 2000 designs, topologies, and implementation in depth without covering more advanced topics like vPC, FCoE, QoS, etc.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
SDN in the Management Plane: OpenConfig and Streaming TelemetryAnees Shaikh
The networking industry has made good progress in the last few years on developing programmable interfaces and protocols for the control plane to enable a more dynamic and efficient infrastructure. Despite this progress, some parts of networking risk being left behind, most notably network management and configuration. The state-of-the-art in network management remains relegated to proprietary device interfaces (e.g., CLIs), imperative, incremental configuration, and lack of meaningful abstractions.
We propose a framework for network configuration guided by software-defined networking principles, with a focus on developing common models of network devices, and common languages to describe network structure and policies. We also propose a publish/subscribe framework for next generation network telemetry, focused on streaming structured data from network elements themselves.
Example application providing guidelines for using the Cryptography Device Library framework.
Showcase DPDK cryptodev framework performance with a real world use case scenario.
Author: Georgi Tkachuk
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
The document discusses Cisco's DNA Center and its capabilities for automating network management. It covers:
- Why intent-based networking is needed to reduce costs and errors from manual network changes
- How DNA Center supports intent-based networking by allowing administrators to define policies and have them automatically implemented across the network
- Key automation use cases DNA Center addresses like onboarding new devices, managing software upgrades, creating configuration templates, and deploying wireless networks
- Demonstrations of DNA Center's capabilities for plug-and-play deployment, software management, template configuration, and wireless provisioning
Introducing KRaft: Kafka Without Zookeeper With Colin McCabe | Current 2022HostedbyConfluent
Introducing KRaft: Kafka Without Zookeeper With Colin McCabe | Current 2022
Apache Kafka without Zookeeper is now production ready! This talk is about how you can run without ZooKeeper, and why you should.
Demystifying EVPN in the data center: Part 1 in 2 episode seriesCumulus Networks
Network operators are slowly but surely embracing L3-based leaf-spine designs. However, either due to legacy applications or certain multi-tenancy requirements, the need for L2 across racks is still present. How do you solve the problem of providing L2 across multiple racks? EVPN is quickly emerging as the best answer to this question.
In this episode of our 2-part series on EVPN, we start with a discussion of the use cases, a review of the technologies EVPN competes with, and dive into an evaluation of the pros and cons of each.
For a recording of the live event, go to http://go.cumulusnetworks.com/l/32472/2017-09-22/95t27t
This document discusses bringing multi-tenancy to Apache Zeppelin through the integration of Apache Livy. It introduces Zeppelin as an interactive web-based notebook for data analysis. It then describes how Livy allows Zeppelin to support multi-tenancy by enabling user authentication and session management for Spark jobs submitted through Zeppelin. The document provides an overview of Livy's architecture and security features like SPNEGO and impersonation that facilitate secure multi-tenant access to shared Spark clusters from Zeppelin.
Watch this recorded demonstration of SnapLogic from our team of experts who answer your hybrid cloud and big data integration questions.
demo, ipaas, elastic integration, cloud data, app integration, data integration, hybrid could integration, big data, big data integration
22nd Athens Big Data Meetup - 1st Talk - MLOps Workshop: The Full ML Lifecycl...Athens Big Data
Title: MLOps Workshop: The Full ML Lifecycle - How to Use ML in Production
Speakers: Spyros Cavadias (https://www.linkedin.com/in/spyros-cavadias/), Konstantinos Pittas (https://www.linkedin.com/in/konstantinos-pittas-83310270/), Thanos Gkinakos (https://www.linkedin.com/in/thanos-gkinakos-03582a128/)
Date: Saturday, December 17, 2022
Event: https://www.meetup.com/athens-big-data/events/289927468/
Presto: Fast SQL-on-Anything (including Delta Lake, Snowflake, Elasticsearch ...Databricks
Presto, an open source distributed SQL engine, is widely recognized for its low-latency queries, high concurrency, and native ability to query multiple data sources. Proven at scale in a variety of use cases at Airbnb, Comcast, GrubHub, Facebook, FINRA, LinkedIn, Lyft, Netflix, Twitter, and Uber, in the last few years Presto experienced an unprecedented growth in popularity in both on-premises and cloud deployments over Object Stores, HDFS, NoSQL and RDBMS data stores.
TRex Realistic Traffic Generator - Stateless support Hanoch Haim
New Stateless support in TRex provides:
- High performance packet generation of up to 22 million packets per second per core and support for interfaces from 1Gbps to 100Gbps.
- Flexible traffic profiles that can generate multiple streams of traffic with programmable fields using a field engine.
- Statistics on a per port, per stream, and per traffic profile basis including latency and jitter.
- Python API and interactive console for automation and control.
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
Enterprise Architecture, Deployment and Positioning Cisco Russia
The document discusses enterprise network deployment models and Cisco products for each model. It provides an overview of unified access, traditional access, converged access, and instant access deployment models. For each model, it describes the key characteristics and considerations, as well as which Cisco products are best suited as the lead platform. The document also covers topics like Cisco TrustSec for security, application visibility and control, and resiliency features of Cisco Catalyst infrastructure products.
Meer data, applicaties, apparaten en gebruikers drijven veel organisatie naar de cloud. Cloud computing met haar ingebakken elasticiteit kan bedrijven immers helpen om op die uitdagingen in te spelen. De vraag is echter:
- Hoe komt een organisatie van haar legacy-omgeving naar de private cloud?
- Hoe creëert dit een shift in focus van beheer naar innovatie?
Leer in deze sessie de praktische handvatten van een private cloud implementatie: van standaardisatie, via consolidatie en virtualisatie naar het volledig automatiseren van IT. Want een private cloud heeft enorme kostenvoordelen, maar deze voordelen behaal je alleen als je verregaand standaardiseert en beheersmatig automatiseert.
The document discusses evolving network technologies including the Internet of Things (IoT), cloud computing, virtualization, and software-defined networking (SDN). It provides an overview of these topics and their importance in modern networks. Specifically, it describes the six pillars of IoT, types of cloud services, cloud deployment models, virtualization techniques, SDN components and controllers, and how policy-based SDN allows for simplified network management.
Watch the TechWiseTV Episode: http://cs.co/9001Bvqpz
Watch the workshop replay: http://bit.ly/2bAsxby
See how the latest evolution of Cisco TrustSec helps protect critical assets by extending and enforcing policies anywhere in your network. Go in-depth with how Cisco TrustSec simplifies your network security with software-defined segmentation.
Data Center, Private Cloud/IT transformationCisco Canada
The private cloud is one of today’s fastest growing data center solutions, and the significance of a secure architecture for business applications agnostic to the infrastructure is increasing. Cisco IT is building the foundation for business resiliency; however, resiliency, at every layer of the business environment requires a holistic approach to managing and orchestrating infrastructure, platform, and application resources within a data center and across multiple data centers.
Keynote delivered by Ken Owens, CTO, Cloud Services
at Cisco.
This presentation dives into the integration specification of IaaS Platforms with PaaS Platforms by discussing the architecture of: Multi-tenant Services; HA service architecture that is interoperable across multiple cloud solutions; Middleware Stack including message bus; Data Storage and Access; Data Analytics; Deployment Management (multi-vendor); Asynchronous processing capabilities; Flexible Security framework ie integration into SecSDLC; Data Protection; SOA Support; and a Common Management Architecture (console, log, metering, monitoring, performance).
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)Robb Boyd
These are the slides used in the Live Webinar August 3, 2016 at 10:00 am Pacific Time / 1:00 pm Eastern Time. You can listen/watch the replay of that show at techwisetv.com. Just click on 'workshops.' The TechWiseTV Episode is also on that site or on YouTube at https://youtu.be/zZHRLsaKD3U
Demos to checkout:
ISE Streamlined Visibility: https://communities.cisco.com/videos/15260
ISE Context Visibility: https://communities.cisco.com/videos/15264
ISE EasyConnect: https://communities.cisco.com/videos/15285
ISE Threat-centric NAC (AMP): https://communities.cisco.com/videos/15269
ISE Threat-centric NAC (Qualys): https://communities.cisco.com/videos/15270
[Cisco Connect 2018 - Vietnam] 1. lam doan introducing cisco dna assurance-...Nur Shiqim Chok
The document introduces Cisco DNA Assurance, a solution for network performance management. It discusses how traditional networks struggle to keep up with increasing users, devices, and complexity. Cisco DNA Assurance uses intent-based networking and machine learning to provide end-to-end visibility, quickly isolate problems, replicate issues for resolution, and offer guided remediation actions. It aims to transform network operations through actionable insights and simplify troubleshooting.
The document discusses Cisco's cloud strategy and solutions. It provides an overview of cloud computing trends, defines different types of cloud models (public, private, hybrid, community), and outlines Cisco's portfolio of products for building clouds, including networking, compute, storage and management solutions. It also describes Cisco's approach to cloud orchestration for provisioning and managing cloud services and applications.
Planning and Preparing for Windows Server 2003 End-of-LifePerficient, Inc.
This document discusses planning and preparing for the end of support of Windows Server 2003. It provides an overview of Perficient, a leading IT consulting firm, and their expertise in Microsoft technologies. It then discusses various options for migrating applications and workloads off of Windows Server 2003, including upgrading server hardware, virtualization, moving workloads to Azure IaaS, and decommissioning servers if they are no longer needed. Details are provided on using Cisco UCS and Hyper-V for virtualization and migration projects. The document emphasizes starting migration plans early to allow sufficient time for testing and validation.
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...Cisco Russia
Cisco's Intelligent Automation for Cloud (CIAC) provides a solution for automating cloud services from design to deployment. The solution includes a service catalog and portal for self-service provisioning, global orchestration for automated deployment, and integration with systems like VMware vCenter and Cisco UCS. CIAC aims to automate processes, reduce costs and errors, and improve availability compared to traditional manual approaches.
This document provides information about EMC's ViPR software-defined storage platform, including:
1. ViPR SRM and ViPR Controller help reduce storage costs and increase flexibility by automating storage management and providing a self-service portal.
2. ViPR abstracts physical storage arrays, pools resources, and provides REST APIs and storage services to simplify management of heterogeneous infrastructure.
3. Case studies show how ViPR SRM provides visibility into storage utilization and performance, enabling optimization of resources and ensuring service levels are met.
This document discusses EMC RecoverPoint for Virtual Machines, a software-only solution that provides continuous data protection for VMs with VM-level granularity. It protects VMs running on VMware ESXi, supports various storage types, and integrates with VMware vCenter. RecoverPoint for VMs allows admins to optimize RPO and RTO to meet SLAs, streamline recovery workflows, and lower TCO. It provides automated VM discovery, protection, and orchestrated disaster recovery failover/failback to any point in time.
The document provides information to help salespeople position and sell the new EMC VMAX3 storage array. It highlights key capabilities of VMAX3 such as simplified management, improved performance and density, support for hybrid cloud environments, and data reduction features. Configuration examples are given to demonstrate how VMAX3 compares favorably to competitors' solutions in terms of price and performance.
This document provides information about using EMC Atmos cloud storage to offer storage services. It discusses how Atmos addresses data, application, and access challenges through its simple, scalable, and monetizable architecture. Examples are given of solutions built on Atmos, including cloud archiving, tiered storage, and sync and share applications.
Cisco prime network 4.1 technical overviewsolarisyougood
The document discusses Cisco Prime Network, a network management platform. It provides network element management, fault management, and service assurance capabilities. It can discover physical and logical device inventory, configure devices, monitor network health, correlate alarms, and track services across network layers and technologies.
Designing your xen desktop 7.5 environment with training guidesolarisyougood
The document provides an overview and guidance on designing a XenDesktop 7.5 environment. It discusses key design decisions across five layers - user layer, access layer, resource layer, control layer, and hardware layer. Specific topics covered include endpoint requirements, bandwidth planning, StoreFront sizing, provisioning methods, database options, monitoring solutions, storage approaches, and expected IOPS and users per server.
Ibm aix technical deep dive workshop advanced administration and problem dete...solarisyougood
1. The system initialization process begins with the system POST which checks and initializes hardware. The bootstrap code then loads the boot image from the boot list which typically includes the internal disk as the first option.
2. The boot image contains the AIX kernel, RAMFS, and a reduced ODM. The kernel is loaded into memory and initializes basic system services while the RAMFS acts as a temporary root file system.
3. If the system is unable to boot, common issues include hardware errors, an empty boot list, or a corrupted boot image on the boot logical volume. The system can be booted into maintenance mode from external media to access the root volume group and repair or rebuild the boot logical volume to
Ibm power ha v7 technical deep dive workshopsolarisyougood
PowerHA is IBM's high availability and disaster recovery solution for AIX. It uses clustering technology to provide continuous availability of applications even during planned or unplanned outages. PowerHA is available in Standard and Enterprise editions, with the Enterprise edition providing additional capabilities for multi-site configurations. Key features of PowerHA include automated workload failover, health monitoring, and support for storage-based replication technologies.
Power8 hardware technical deep dive workshopsolarisyougood
The document provides an agenda and overview for a presentation on Power8 hardware enhancements and updates. The presentation will cover the Power S814 announcement, Power8 processor and I/O enhancements including the new 4-core Power S814 system, Corsa and FPGA overview, and IBM Rackswitches transitions. Details on the Power S814 such as specifications, models, and pricing will be discussed. Comparisons to other Power systems will also be included.
Power systems virtualization with power kvmsolarisyougood
1. PowerKVM provides an open source virtualization option for Power Systems running Linux workloads that is managed like other KVM systems using open source tools or OpenStack.
2. PowerKVM exploits features of Power8 like micro-threading to improve workload consolidation compared to traditional PowerVM or PowerKVM.
3. PowerKVM is best suited for customers running Linux-only workloads who prefer open technologies and are familiar with KVM or VMware.
Power vc for powervm deep dive tips & trickssolarisyougood
The document discusses PowerVC network and storage management. It provides tips for configuring Shared Ethernet Adapters and VLANs when using PowerVC. It also covers zoning best practices when using PowerVC with storage arrays. The document discusses how PowerVC uses OpenStack data sources and cloud-init to provision virtual machines and pass configuration information. It also addresses changing virtual machine PVIDs when using PowerVC-provisioned instances.
Emc data domain technical deep dive workshopsolarisyougood
The document provides an overview of EMC Data Domain products and services. It discusses Data Domain systems which provide scalable and high performance protection storage for backup and archive data. The systems integrate with leading backup and archiving applications. The document also summarizes Data Domain software options such as Boost, Encryption, Replicator and Extended Retention which provide additional functionality.
Ibm flash system v9000 technical deep dive workshopsolarisyougood
This document provides information about IBM's FlashSystem V9000 all-flash storage array. It highlights key features of the V9000 including its scalability up to 1.2 million IOPS and 2.28PB of effective capacity. It also describes IBM's FlashOne sales initiative which bundles the V9000 with software, support, and services. Guidelines are provided for positioning the V9000 versus IBM's SVC for new customers. The document includes links to configuration tools and templates to help with V9000 ordering and total cost of ownership analysis.
This document provides an overview of the EMC VNX storage system. It includes 14 modules that cover topics such as unified management, block and file storage provisioning, data protection features, host integration, and more. The document also lists system limits and specifications for the different VNX models. It aims to educate customers on the technical capabilities and features of the VNX platform.
This document provides an overview of EMC Isilon scale-out NAS storage solutions. It begins with an agenda and discusses Isilon's market leadership in scale-out NAS. Key trends in file and unstructured data growth are presented. The document then covers Isilon hardware and software features including data protection, management, and performance. Example use cases and platforms are summarized before addressing advantages such as scalability, efficiency, protection, and flexibility.
The document discusses EMC's Elastic Cloud Storage (ECS) product. It provides examples of how ECS has been used by customers for applications such as global content repositories, modern application platforms, geo-scale big data analytics, cold archives, internet of things storage platforms, and analytics requiring data in place. It also outlines new features and integrations for ECS around monitoring, availability, performance, and deployment simplicity.
This document discusses continuous availability and data mobility solutions from EMC, including VPLEX and RecoverPoint. It provides an overview of these solutions, describing how they enable active-active configurations across data centers for always-on application access, automated disaster recovery without downtime, and non-disruptive data migration. It also shares statistics on VPLEX and RecoverPoint deployments and discusses how these solutions provide benefits like zero RPO/RTO recovery and removing restrictions of data centers and storage arrays.
The Cisco MDS 9148S is a 1RU switch that provides high performance, flexibility, and resiliency in a compact and easy to deploy device. It offers 48 16G Fibre Channel ports, a pay-as-you-grow licensing model, support for up to 32 VSANs, and can be deployed in virtualized environments or mid-scale SANs. Management is simplified through features like automated initial configuration.
The document discusses deploying OpenStack with Cisco compute, network, and storage solutions. It provides an overview of Cisco's involvement in the OpenStack community and engineering efforts. It also highlights several Cisco technologies that integrate with OpenStack, such as Cisco UCS, Nexus switches, and the Nexus 1000V virtual switch. Cisco aims to provide automated, scalable deployment and management of OpenStack on Cisco platforms.
Se training storage grid webscale technical overviewsolarisyougood
The document provides an overview of StorageGRID Webscale, an object storage solution from NetApp. It discusses key concepts including how StorageGRID Webscale uses a distributed architecture with different node types to provide a global object namespace and scale to support billions of objects and petabytes of storage. The document also describes how StorageGRID Webscale leverages extensive metadata and policy-driven management to intelligently distribute and tier data across storage pools.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
56. • Bandwidth usage for top five WAN traffic locations
• Health summary for your Unified Communications applications
• Find the utilization for video ports and conferencing devices
60. @2013 Cisco and/or its affiliates. All rights reserved. Cisco 71
Technology Adoption
Service Experience
• Shows the weekly progress of collaboration deployments
• Breaks down the way endpoints are being used by type,
model and shows audio / video usage trends
• Identifies call failure trends, long-term service quality
distribution by location, and most impacted endpoints
• Identifies traffic patterns, top traffic locations and top traffic
destinations
Capacity Analysis and Asset Usage
Traffic Analysis
• Tracks Average Bouncing Busy Hour and top/bottom trunk,
conferencing (MCU), and CAC bandwidth utilization
• Tracks underutilized endpoints
• Tracks dialed numbers, off-net calls, call traffic per location
and traffic type (external, internal, local, and more)