Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
Lila Rousseaux, Consulting Systems Engineer, Enterprise Networks and Tim Szigeti, Technical Marketing Engineer discusses SDN in the enterprise at Cisco Connect Toronto 2015.
Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends the security perimeter to the Internet - rendering network-centric security methods obsolete.
Three Key Steps for Moving Your Branches to the CloudZscaler
Is backhauling traffic the most efficient way to route traffic when your workloads move to the cloud? The migration of applications from the data center to the cloud calls for a new approach to networking and security. But, keeping up with application demands and user expectations can be a struggle. Explore the challenges and benefits of establishing secure local breakouts from someone who has done it.
Hope you did not miss our deep dive: Cisco APIC-EM: IT Speed and Simplicity Through Automation
Ronnie Ray walked through Cisco's purpose-built enterprise controller. Purpose build to help you move to software-defined networking (SDN) that works both on existing networks and on new infrastructure.
Watch and Listen to the workshop replay at cs.co/6017Bl8Kb
(check out the Digital Network Architecture episodes Part 1 and 2 at http://www.techwisetv.com)
You will learn how Cisco engineers created the world’s best network automation controller, which provides enterprise resiliency and scale, an open and extensible platform, and a full suite of policy-driven SDN applications.
You’ll learn about multiple time-saving apps that cover the complete network service lifecycle and drive policy enforcement consistently across the enterprise to make sure of zero-touch infrastructure deployment, quality of experience, and rapid troubleshooting.
Moving to software-driven networking is the future. Join us and find out how to start your journey today.
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
Lila Rousseaux, Consulting Systems Engineer, Enterprise Networks and Tim Szigeti, Technical Marketing Engineer discusses SDN in the enterprise at Cisco Connect Toronto 2015.
Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends the security perimeter to the Internet - rendering network-centric security methods obsolete.
Three Key Steps for Moving Your Branches to the CloudZscaler
Is backhauling traffic the most efficient way to route traffic when your workloads move to the cloud? The migration of applications from the data center to the cloud calls for a new approach to networking and security. But, keeping up with application demands and user expectations can be a struggle. Explore the challenges and benefits of establishing secure local breakouts from someone who has done it.
Hope you did not miss our deep dive: Cisco APIC-EM: IT Speed and Simplicity Through Automation
Ronnie Ray walked through Cisco's purpose-built enterprise controller. Purpose build to help you move to software-defined networking (SDN) that works both on existing networks and on new infrastructure.
Watch and Listen to the workshop replay at cs.co/6017Bl8Kb
(check out the Digital Network Architecture episodes Part 1 and 2 at http://www.techwisetv.com)
You will learn how Cisco engineers created the world’s best network automation controller, which provides enterprise resiliency and scale, an open and extensible platform, and a full suite of policy-driven SDN applications.
You’ll learn about multiple time-saving apps that cover the complete network service lifecycle and drive policy enforcement consistently across the enterprise to make sure of zero-touch infrastructure deployment, quality of experience, and rapid troubleshooting.
Moving to software-driven networking is the future. Join us and find out how to start your journey today.
"A session in the DevNet Zone at Cisco Live, Berlin. Analytics of network telemetry data (such as flow records, IPSLA measurements, and time series of MIB data) helps address many important operational problems. Traditional Big Data approaches run into limitations even as they push scale boundaries for processing data further. One reason for this is the fact that in many cases, the bottleneck for analytics is not analytics processing itself but the generation and export of the data on which analytics depends. Data does not come for free. The amount of data that can be reasonably collected from the network runs into inherent limitations due to bandwidth and processing constraints in the network itself. In addition, management tasks related to determining and configuring which data to generate lead to significant deployment challenges.
This presentation provides an overview of DNA (Distributed Network Analytics), a novel technology to analyze network telemetry data in distributed fashion at the network edge, allowing users to detect changes, predict trends, recognize anomalies, and identify hotspots in their network. Analytics processing occurs at the source of the data using an embedded DNA Agent App that dynamically configures data sources as needed and analyzes the data using an embedded analytics engine. This provides DNA with superior scaling characteristics while avoiding the significant operational and bandwidth overhead that is associated with centralized analytics solutions. An ODL-based SDN controller application orchestrates network analytics tasks across the network, providing a network analytics service that allows users to interact with the network as a whole instead of individual devices one at a time. DNA is enabled by the IOx App Hosting Framework and integrated with light-weight embedded analytics engines, CSA (Connected Service Analytics) and DMO (Data in Motion). "
Get an office 365 expereience your users will love v8.1Zscaler
Whether you’re looking to deploy Office 365 on your network, or you’ve already begun the migration, there’s one measurement of success that is paramount: user experience. With multiple apps and services, including latency-sensitive applications like Skype, it’s critical to optimize your network for the fastest O365 experience. Microsoft recommends accessing Office 365 directly via the internet, but many companies don’t have the proper network setup. It’s no surprise, then, that Office 365 deployments frequently don’t go as planned.
Moving from appliances to cloud security with phoenix children's hospitalZscaler
Applying consistent and robust security controls across your remote workforce hasn’t gotten any easier. The complexity brought about by mobile devices, cloud apps, untrusted networks, and more are compounded by the inspection demands of SSL traffic and the performance limitations of security appliances
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup.
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup. It’s no surprise, then, that deploying Office 365 without proper guidance can delay deployments and cause a terrible user experience
Adopting an SD-WAN solution is the best option that network organizations have to respond to a range of requirements such as lowering cost, increasing availability and providing high quality user experiences. However, network organizations are also under pressure to deliver best-of-breed security and in virtually all instances, adopting an SD-WAN solution results in implementing Direct Internet Access (DIA) which is challenging to secure using security appliances.
According to Harvard Business Review, there have been more than 50,000 mergers, acquisitions, and divestitures worldwide in each of the past three years, and 2018 shows no signs of abating. While each M&A is unique, for IT, they all tell a similar, excruciating story: IT scrambles to figure out the fastest way to keep services running in order to minimize disruption and maximize ROI for the business.
It’s 2019 and your users are working from anywhere but the office, enterprise applications have migrated to the cloud or hybrid environment, and VPN is no longer the answer to private application access in this new world of user-to-app connectivity.
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
Are you using or ready to deploy Microsoft Cloud App Security (MCAS)? While having CASB visibility and control is key to a good cloud app strategy, it is only as good as the traffic it can see. Zscaler and Microsoft have partnered to deliver key MCAS integrations that help you confidently embrace cloud apps and minimize the risks associated with unsanctioned apps.
IT leaders have talked for years about routing traffic directly to the internet from the branch, but network complexity and security challenges have been too great. Times have changed, and today digital transformation is pushing organizations to rapidly evolve branch office IT and security architectures to take advantage of cloud services.
Join a conversation with Zeus Kerravala, Founder and Principal Analyst, ZK Research, and Bill Lapp, Vice President of Customer Success, Zscaler, to discuss the challenges of cloud migration, along with the opportunities it presents. We’ll explore the best ways to address complexity and security in the branch, and discuss a strategic approach to providing a scalable architecture for the adoption of SaaS and cloud services
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Cisco Canada
Digital transformation is the key buzz word today. But how do you get there? How do you plan now for the future? Cisco delivers the most complete SDN solutions to meet your data center needs - from programmable networks to programmable fabrics to a fully integrated solution with Application Centric Infrastructure (ACI). Here about our latest innovations for all areas, from Applications to ASICs, that bring unique capabilities and value to the industry. Hear your peers share their SDN journeys and how Cisco's open choice solutions have helped them improve agility and attain astounding results for their business. And learn how to lay the foundation now for your digital transformation in the decade ahead. Get ready!
With over 10,000 users and 900 locations across 22 countries, Kelly Services exemplifies the diversified multinational organization. But as Kelly Services looked to standardize on Office 365, it became apparent that full application support across the Office 365 suite would require a complete network transformation, from a legacy hub-and-spoke network to a modern direct-to-cloud architecture.
Join this session to hear first-hand how Kelly Services was able to drive down MPLS and networking costs, deliver a fast Office 365 application experience to users around the globe, and fundamentally transform its network infrastructure.
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
"A session in the DevNet Zone at Cisco Live, Berlin. Analytics of network telemetry data (such as flow records, IPSLA measurements, and time series of MIB data) helps address many important operational problems. Traditional Big Data approaches run into limitations even as they push scale boundaries for processing data further. One reason for this is the fact that in many cases, the bottleneck for analytics is not analytics processing itself but the generation and export of the data on which analytics depends. Data does not come for free. The amount of data that can be reasonably collected from the network runs into inherent limitations due to bandwidth and processing constraints in the network itself. In addition, management tasks related to determining and configuring which data to generate lead to significant deployment challenges.
This presentation provides an overview of DNA (Distributed Network Analytics), a novel technology to analyze network telemetry data in distributed fashion at the network edge, allowing users to detect changes, predict trends, recognize anomalies, and identify hotspots in their network. Analytics processing occurs at the source of the data using an embedded DNA Agent App that dynamically configures data sources as needed and analyzes the data using an embedded analytics engine. This provides DNA with superior scaling characteristics while avoiding the significant operational and bandwidth overhead that is associated with centralized analytics solutions. An ODL-based SDN controller application orchestrates network analytics tasks across the network, providing a network analytics service that allows users to interact with the network as a whole instead of individual devices one at a time. DNA is enabled by the IOx App Hosting Framework and integrated with light-weight embedded analytics engines, CSA (Connected Service Analytics) and DMO (Data in Motion). "
Get an office 365 expereience your users will love v8.1Zscaler
Whether you’re looking to deploy Office 365 on your network, or you’ve already begun the migration, there’s one measurement of success that is paramount: user experience. With multiple apps and services, including latency-sensitive applications like Skype, it’s critical to optimize your network for the fastest O365 experience. Microsoft recommends accessing Office 365 directly via the internet, but many companies don’t have the proper network setup. It’s no surprise, then, that Office 365 deployments frequently don’t go as planned.
Moving from appliances to cloud security with phoenix children's hospitalZscaler
Applying consistent and robust security controls across your remote workforce hasn’t gotten any easier. The complexity brought about by mobile devices, cloud apps, untrusted networks, and more are compounded by the inspection demands of SSL traffic and the performance limitations of security appliances
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup.
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup. It’s no surprise, then, that deploying Office 365 without proper guidance can delay deployments and cause a terrible user experience
Adopting an SD-WAN solution is the best option that network organizations have to respond to a range of requirements such as lowering cost, increasing availability and providing high quality user experiences. However, network organizations are also under pressure to deliver best-of-breed security and in virtually all instances, adopting an SD-WAN solution results in implementing Direct Internet Access (DIA) which is challenging to secure using security appliances.
According to Harvard Business Review, there have been more than 50,000 mergers, acquisitions, and divestitures worldwide in each of the past three years, and 2018 shows no signs of abating. While each M&A is unique, for IT, they all tell a similar, excruciating story: IT scrambles to figure out the fastest way to keep services running in order to minimize disruption and maximize ROI for the business.
It’s 2019 and your users are working from anywhere but the office, enterprise applications have migrated to the cloud or hybrid environment, and VPN is no longer the answer to private application access in this new world of user-to-app connectivity.
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
Are you using or ready to deploy Microsoft Cloud App Security (MCAS)? While having CASB visibility and control is key to a good cloud app strategy, it is only as good as the traffic it can see. Zscaler and Microsoft have partnered to deliver key MCAS integrations that help you confidently embrace cloud apps and minimize the risks associated with unsanctioned apps.
IT leaders have talked for years about routing traffic directly to the internet from the branch, but network complexity and security challenges have been too great. Times have changed, and today digital transformation is pushing organizations to rapidly evolve branch office IT and security architectures to take advantage of cloud services.
Join a conversation with Zeus Kerravala, Founder and Principal Analyst, ZK Research, and Bill Lapp, Vice President of Customer Success, Zscaler, to discuss the challenges of cloud migration, along with the opportunities it presents. We’ll explore the best ways to address complexity and security in the branch, and discuss a strategic approach to providing a scalable architecture for the adoption of SaaS and cloud services
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Cisco Canada
Digital transformation is the key buzz word today. But how do you get there? How do you plan now for the future? Cisco delivers the most complete SDN solutions to meet your data center needs - from programmable networks to programmable fabrics to a fully integrated solution with Application Centric Infrastructure (ACI). Here about our latest innovations for all areas, from Applications to ASICs, that bring unique capabilities and value to the industry. Hear your peers share their SDN journeys and how Cisco's open choice solutions have helped them improve agility and attain astounding results for their business. And learn how to lay the foundation now for your digital transformation in the decade ahead. Get ready!
With over 10,000 users and 900 locations across 22 countries, Kelly Services exemplifies the diversified multinational organization. But as Kelly Services looked to standardize on Office 365, it became apparent that full application support across the Office 365 suite would require a complete network transformation, from a legacy hub-and-spoke network to a modern direct-to-cloud architecture.
Join this session to hear first-hand how Kelly Services was able to drive down MPLS and networking costs, deliver a fast Office 365 application experience to users around the globe, and fundamentally transform its network infrastructure.
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
Presentation at ECIPE Seminar "How to Accelerate the Expansion of the Digital Economy?" on 15th July. Quick overview of new trends in manufacturing and regulatory implications.
Users expect a robust, yet flexible base infrastructure layer for NFV; but systems integration is hard. OPNFV is here to help: OPNFV provides system integration for NFV as a community-led effort. Based on a discussion of the build and composition philosophy of OPNFV, the presentation approaches the benefits of OPNFV for users from different angles: OPNFV as a reference building block to install, test and deploy NFV; OPNFV as reference system integration to get your own use-cases integrated into; OPNFV as a foundation to evolve and further develop NFV – privately or as part of the community.
Internet transaction and communication securityDianoesis
The internet - and your company - needs a new architecture for future internet transaction and communication security. And Guardog will prevent impersonation - the biggest weak point of all existing security schemes.
The Benefits of Security From a Managed Services ProviderCSI Solutions
Today’s technology users—both consumers and bankers—who don’t stay informed on the latest in security can open themselves and others to attack.
View this SlideShare to learn what to look for in a solid managed security provider and how it can benefit your financial institution.
AGC Networks (AGC) is a Global Solution Integrator representing the world’s best brands in Unified Communications, Network Infrastructure & Data Center, Cyber Security (CYBER-i) and Enterprise Applications to evolve the customer’s digital landscape.
AGC’s ability to tailor solutions across quadrants is strengthened through delivery of seamless customer support services. A leader in Enterprise Communications in India, AGC has significant presence across Middle East, Africa, North America, Australia, New Zealand, Singapore, Philippines and UK serving over 3000 customers. In collaboration with global technology leaders like Avaya, Intel Security, Juniper, Cisco, HP, Verint and Polycom among others, AGC delivers Return on Technology Investment (ROTI) thereby accelerating customers’ business.
For more information, log on to www.agcnetworks.com
Module 9: Increasing Security for Network Communication
Internet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.
Lessons
Overview of IPsec
Configuring Connection Security Rules
Configuring NAP with IPsec Enforcement
Monitoring and Troubleshooting IPsec
Lab : Increasing Security for Network Communication
Selecting a Network Security Configuration
Configuring IPsec to Authenticate Computers
Testing IPsec Authentication
After completing this module, students will be able to:
Describe when and how to use IPsec.
Configure Connection Security rules.
Configure IPsec with NAP Enforcement.
Describe how to monitor and troubleshoot IPsec.
A little ditty about Consilien's products and services.
In fifteen years, Consilien has never had a managed services customer pay ransom due to a ransomware attack or suffer significant profit loss due to downtime.
No matter what your current level of cybersecurity knowledge is, these slides created by EMA Research and A10 Networks will provide valuable insights into the latest trends and empower you with the best practices in cloud and web application security.
Download to learn more about:
- The top threats that pose a risk to your organization and how to mitigate them
- The difference between buzz and hype in today’s security approaches, and how this can be used to help your organization
- A discussion of Zero Trust, web application security, DDoS protection, encryption, and more for the hybrid cloud world
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
https://www.brighttalk.com/webcast/14723/234829?utm_source=Compliance+Engineering&utm_medium=brighttalk&utm_campaign=234829 :
With cyber attacks on the rise, securing your data is more imperative than ever. In future, organizations will face severe penalties if their data isn’t robustly secured. This will have a far reaching impact for how businesses deal with security in terms of managing their cyber risk.
Join this presentation to learn the cyber security controls prescribed by regulation, how this impacts compliance, and how cyber risk management helps CISOs understand the degree these controls are in place and where to prioritize their cyber dollars and ensure they are not at risk for fines.
Viewers will learn:
- The latest cybercrime trends and targets
- Trends in board involvement in cybersecurity
- How to effectively manage the full range of enterprise risks
- How to protect against ransomware
- Visibility into third party risk
- Data security metrics
CisCon 2017 - La Nuova era del Networking – La Rete IntuitivaAreaNetworking.it
Al CisCon 2017, Giuseppe Bottani (Consulting Systems Engineer Enterprise Networks in Cisco Italia) ha tenuto uno speech dal titolo "La Nuova era del Networking – La Rete Intuitiva".
Abstract presente su http://www.ciscon.net/il-programma/
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 12 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 14 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUlf Mattsson
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
LEARNING OUTCOMES FROM PRESENTATION:
• Current trends in Cyber attacks
• FFIEC Cyber Assessment Toolkit
• NIST Cybersecurity Framework principles
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
How can i find my security blind spots ulf mattsson - aug 2016Ulf Mattsson
Security Blind Spots
We need to automatically detect and report on security blind spots, including Sensitive Data that was not found in our initial Discovery and failures of deployed security control systems. Without formal and automated processes to detect and alert to new data discovery findings and critical security control failures as soon as possible, the window of time grows that allows attackers to identify a way to compromise the systems and steal sensitive data. This can also impact our real compliance posture.
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz Asia Pte Ltd
One of the biggest challenges facing IT professionals right now in any organisation is the complexity that resulted from the use of disconnected, problem-specific tools from multiple vendors, almost none of which work together.
Simplify and secure your network availability with eSentinel, a 'Plug & Play' Cloud-based security platform.
Website: https://www.netpluz.asia
Dopo Applicazioni, e Computing, le imprese hanno ormai compreso i vantaggi del Cloud e sempre più ricorrono ai nuovi modelli per realizzare e gestire la propria infrastruttura IT.
Trasferire risorse e applicazioni nella nuvola significa infatti ottenere nuovi livelli di semplificazione, agilità, versatilità e scalabilità.
Ma l'innovazione continua ad avanzare. Oggi è possibile, attraverso il Cloud, anche governare centralmente l'evoluzione del networking, controllando tutte le applicazioni, gli utenti e i device da un unico punto, attraverso una dashboard
- Quali sono i trend e i vantaggi di business del Cloud infrastrutturale?
- Come rispondere tempestivamente alle richieste di crescenti performance delle reti aziendali?
- Come il Cloud può aiutare a semplificare la gestione di switch, router, access point, sistemi di security e device mobile
L'incontro sarà moderato da Manuela Gianni, Direttore Responsabile di Digital4Executive
TEDx x Meraki = Innovazione al quadratoMatteo Masi
TEDx è sinonimo di un nuovo modo di fare networking, diffondere idee e pensare seguendo nuovi schemi.
Questa innovazione fa rima con Cisco Meraki, piattaforma di Cloud-Managed IT
La partnership Agsm, Cisco, Fullsix ha permesso di fornire un servizio efficiente e innovativo al Tedx di Verona.
CMX (Connected Mobile Experience) for Higher EducationMatteo Masi
CMX is the platform to deliver Next Generation Customised Learning Solutions.
In the next 5 years the education delivery system will change more than it has in the last 30 years.
Majority of people on the planet will have multiple devices.
1) Mobility is a given for the current generation of students.
2) However, this extends far beyond basic connectivity.
3) Learning itself is becoming mobile: Today’s students have grown up with social networking tools and expect the same degree of interactions on campus and in their classes.
4) Video is creating new opportunities to expand access to education while maintaining the person-to-person interactivity and an high quality asynchronous education.
Cisco IoE Vision for Industry 4.0: How Internet will evolve to integrate OT into IT
Presented during the event "Schneider Xperience Efficiency", Industry4.0 day
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Opendatabay - Open Data Marketplace.pptxOpendatabay
Opendatabay.com unlocks the power of data for everyone. Open Data Marketplace fosters a collaborative hub for data enthusiasts to explore, share, and contribute to a vast collection of datasets.
First ever open hub for data enthusiasts to collaborate and innovate. A platform to explore, share, and contribute to a vast collection of datasets. Through robust quality control and innovative technologies like blockchain verification, opendatabay ensures the authenticity and reliability of datasets, empowering users to make data-driven decisions with confidence. Leverage cutting-edge AI technologies to enhance the data exploration, analysis, and discovery experience.
From intelligent search and recommendations to automated data productisation and quotation, Opendatabay AI-driven features streamline the data workflow. Finding the data you need shouldn't be a complex. Opendatabay simplifies the data acquisition process with an intuitive interface and robust search tools. Effortlessly explore, discover, and access the data you need, allowing you to focus on extracting valuable insights. Opendatabay breaks new ground with a dedicated, AI-generated, synthetic datasets.
Leverage these privacy-preserving datasets for training and testing AI models without compromising sensitive information. Opendatabay prioritizes transparency by providing detailed metadata, provenance information, and usage guidelines for each dataset, ensuring users have a comprehensive understanding of the data they're working with. By leveraging a powerful combination of distributed ledger technology and rigorous third-party audits Opendatabay ensures the authenticity and reliability of every dataset. Security is at the core of Opendatabay. Marketplace implements stringent security measures, including encryption, access controls, and regular vulnerability assessments, to safeguard your data and protect your privacy.
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Cisco Security DNA
1. University of Milan
The Future of Network & Security
Security IN the Network
28 Apr 2016
Matteo Masi
Sales Specialist Enterprise Networks & Software
@masimatteo
3. The Network Enables Digital Business
Zorawar Biri Singh (CTO)
“What we have done, what we do, what we’ll do
has been, is, will be
tied to the Network.
Our center of gravity”
6. Reimagine Digital Retail
66%
Switched brands due to poor
customer service *
80%
Retail purchases in
physical stores ***
86%
will pay more for a better
customer experience ****
55%
of US consumers look up
product information on mobile **
* Accenture Consumer Pulse Survey ** Forrester Retail Report *** McKinsey Future of Retail Article **** Oracle Customer Impact Report
People Centric Digitization
3D Virtual Reality
Concierge Assistance
Store Experience at Home
Amazon Dash Button, Echo,
HoloLens – Augmented Reality
Automated Retail Fulfillment
Real-Time Individualized
Manufacturing and Delivery
7. Consumer as Creators
Additive Manufacturing: From
Prototypes to Production
Robotics in Logistics
Human-Less Factories
Reimagine Digital Manufacturing
50%
of Manufacturers
will use robotic
fulfillment by 2019 *
3D printer market
will grow at
103.1%CAGR
from 2015 to 2018 **
* Forrester Retail Report ** Gartner
Machine Centric Digitization
8. Network has to Change, IT has to change
Cisco VNI 2019 Italy
3 devices/person 13,5M Wereable
Cloud App > 90%
Mobile traffic
DC Traffic from
Mobile CAGR 50%
IoTMobilityMobile traffic will Exceed
wired traffic by 2017 50B devices in 2020
9. Digital Transformation Is Moving IT to the Boardroom
Accelerate Business Processes, Introduce New Innovative Offerings
UPS
Tracking
Data Driven Business
Intelligence
Mobile
Point of Sale
Starbucks
Apps
Philips
Connected
Lighting
Nike Digital
Sport
Outperform Your Competition by Mastering Digital
Profit 26% Revenue 9%
10. Insights &
Experiences
Drive Business Innovations
Empower Workforce
Personalize Experience
Increase Loyalty
Security &
Compliance
Real-time and Dynamic
Threat Defense
Automation
& Assurance
Speed, Simplicity
& Visibility
Faster services rollout and
time to market
The Network Enables Digital Business
Network Requirements for the Digital Organization
Faster
Innovation
Reduce Cost
& Complexity
Lower Risk &
Meet Compliance
11. Delivering Digital Capabilities with Cisco DNA
Workforce Experience
Customer Experience
Branch Agility
Security
Business Needs
Virtualization
Automation
Analytics
Cloud
Network Requirements
Faster Innovation |
Reduced Cost and Complexity | Lower Risk
DNA Technologies
Partner Ecosystem
Services
12. Cisco Digital Network Architecture
Automation
Abstraction & Policy Control
from Core to Edge
Open & Programmable | Standards-Based
Open APIs | Developers Environment
Cloud Service Management
Policy | Orchestration
Virtualization
Physical & Virtual Infrastructure | App Hosting
Analytics
Network Data,
Contextual Insights
Insights &
Experiences
Automation
& Assurance
Security &
Compliance
Network-enabled Applications
Cloud-enabled | Software-delivered
Principles
13. The Future of Enterprise Networking
Mobility Collaboration Security
Endpoints
APIC
EM
Branch
Business
Agility
Automated
Enterprise
Consistent
Policy
Investment
Protection
APIC-EM Core of Automation
Application Policy Infrastructure Controller – Enterprise Network
FREE
14. Automation & Analytics of QOS Policy
Client A calls client B1. 2. 3.
Calls end1. 2. 3.
Optimal
Experience
Dynamic QoS in
250 ms
Reduce voice jitter
by 300%
50% improvement
for video traffic
RESTAPIRESTAPI
Cisco® UCM calls APIC-
EM to set up policy
Cisco UCM calls APIC-
EM to set up policy
QoS policy enabled
on network device
QoS policy enabled
on network device
15. NETWORK
ITTrouble Ticket
Path
VisualizationUser
Simple Workflow
SDN
Open ArchitectureApplication Path
Monitoring
Automation & Analytics for Troubleshooting
APIC-EM Path Trace Application
Easy visual discovery of trouble spots in
communication path based on 5-Tuple
OPEX for ticket processing decreased by 98%
From 1.4 hours to 1 minute
16. Analytics for Location Based Services
CMX (Connected Mobile Experiences)
Presence Analytics Heat Maps Correlation
Visitors vs. Passerbys
Repeat vs. New Visitors
Dwell Time
Busiest Hour, Day
Visitor Sentiment
Conversion Rate
Building/Floor
Where do visitors spend time? Which paths
did visitors take?
Timeframe Parameters Heat Map
19. How Data Breach Happens
Reconnaissance
Victim clicks phishing email link
Malware dropped via backdoor
Lateral Movement to find Admin
Escalate Privilege to become Admin
Data Exfiltration using Admin privilege
Information monetized after breach
20. Motivated Threat Actors Behind Breaches:
Social Security
$1
Medical
Record
>$50
DDOS
as a Service
~$7/hour
Credit
Card Data
$0.25-$60
Bank Account Info
>$1000
depending on account
type and balance
Exploits
$1000-$300K
Facebook Account
$1 for an account
with 15 friends
Spam
$50/500K emails
Malware
Development
$2500
(commercial malware)
Global
Cybercrime
Market:
$450B-$1T
Mobile Malware
$150
SSN
DDoS
21. You Can Not Protect What You Don’t See
60% of data is stolen in
HOURS
85%
of point-of-sale intrusions
aren’t discovered for
WEEKS
54%
of breaches remain
undiscovered for
MONTHS
51%
increase of companies
reporting a $10M loss
or more in the last 3
YEARS
A community that hides in plain sight avoids detection and attacks swiftly
22. The Threat:
For the last couple of years I have used this “Organisations” slide to illustrate “The Threat”
Now I am more inclined to just
agree with JC below
Enterprise Security is still a Growing Concern. Threats get more Sophisticated– the results more
devastating The Security Challenge is NOT going away!
24. A Threat-Centric Security Model
Before
Discover
Enforce
Harden
After
Assess
Contain
Remediate
Attack Continuum
Detect
Block
Defend
During
Network as an Enforcer
Network as a Sensor
25. Network with Visibility and Control
NaaS (Network as a Sensor)
Employee
Employee
Supplier
Quarantine
Shared
Server
Server
High Risk
Segment
Internet
Network Fabric
Clear understanding of
traffic flow with context
Easier to create & apply
policy based on such context
Allowed Traffic
Denied Traffic
27. NaaS: Visibility and Enforcement with
Cisco Identity Services Engine (ISE)
PARTNER CONTEXT
DATA
NETWORK / USER
CONTEXT
How
WhatWho
WhereWhen
CONSISTENT SECURE ACCESS POLICY
ACROSS WIRED, WIRELESS and VPN
Policy
pxGrid
28. NaaS: Lancope StealthWatch
pxGrid
Real-time visibility at all network layers
• Data Intelligence throughout network
• Assets discovery
• Network profile
• Security policy monitoring
• Anomaly detection
• Accelerated incident response
Cisco ISE
Mitigation Action
Context Information
NetFlow
29. access-list 102 permit tcp 37.85.170.24 0.0.0.127 lt 3146 77.26.232.98 0.0.0.127 gt 1462
access-list 102 permit tcp 155.237.22.232 0.0.0.127 gt 1843 239.16.35.19 0.0.1.255 lt 4384
access-list 102 permit icmp 136.237.66.158 255.255.255.255 eq 946 119.186.148.222 0.255.255.255 eq 878
access-list 102 permit ip 129.100.41.114 255.255.255.255 gt 3972 47.135.28.103 0.0.0.255 eq 467
Network as an Enforcer (NaaE)
with TrustSec
Traditional Security Policy
TrustSec Security Policy
Security Control Automation
Simplified Access Management
Improved Security Efficacy
Network Fabric
Switch Router DC FW DC SwitchWireless
Flexible and Scalable Policy Enforcement
segmentation
software defined
30. Integrated Threat Defense (Detection & Containment)
NaaS + NaaE
Employee
Employee
Supplier
Quarantine
Shared
Server
Server
High Risk
Segment
Internet
Lancope
StealthWatch
Event: TCP SYN Scan
Source IP: 10.4.51.5
Role: Supplier
Response: Quarantine
ISE
Change Authorization
Quarantine
Network Fabric
31. Architecting a Secure Network
Combining Network as a Sensor / Network as an Enforcer
Network Sensor
(Lancope)
Campus/DC
Switches/WLC
Cisco Routers /
3rd Vendor Devices
Threat
PxGRID
Network Sensors Network EnforcersPolicy & Context Sharing
Cisco Collective
Security Intelligence
Confidential
Data
NGIPS
PxGRID
ISE
NGFW
TrustSec
Software-Defined
Segmentation
32. Protect EMR; Protect medical
equipment from malware
Healthcare
Scope reduction for
PCI compliance;
Protect sensitive
information from other
connected devices
Retail
Security controls for IoE,
Simplified segmentation for
manufacturing zones, Supply-
chain partner security
Manufacturing
Control access to regulated
apps; Simplify audit &
compliance; Accelerate
security policy provisioning
for new server
Financial
Control student access to
classroom media, Scalable
access control policy for
students and faculty
Education
Policy across campus,
branch & DC for ACI &
non-ACI
Consistent Policy
Differentiated access for
contractors & partners
Secure Remote
Access
Threat Mitigation
Mitigate malware scanning
and propagation with
actionable intelligence to find
needle in haystack
Secure BYOD
Maximizing
BYOD
investment
while
protecting
sensitive
information
Simplified Firewall Rule
Management
Faster data center
service / application
provisioning
Network as a Sensor / Enforcer Use Cases
33. Network as a Sensor and Enforcer Summary
TrustSec provides
software defined (micro)
segmentation
NetFlow and Lancope
StealthWatch provides
visibility and intelligence
The network is a key
asset for threat detection
and control
34. Integrating Security IN the Network
Discover and Classify Assets
Understand Behavior
Enforce Policy
Active Monitoring
Network
Segmentation
Design and Model Policy
I recently met with the Head of Infrastructure of one of the largest European bank. As we were discussing the future requirements of his infrastructure , he shared how much he currently struggles to operate at the digital speed its Business Units require. Those BUs are used to the kind of SLA we now see in Data Centers (in terms of instantiating VM and Infrastructure through ACI for instance), and are expecting the same to happen in their networks (Branch, Campus, Security, ..). And he added: "I just do not know how!"
What I am discussing in this 30 mins video is how we can now help our customers operate at digital speed!
Cisco is introducing DNA, which is the biggest evolution of our enterprise network architecture and messaging in years. And which will differentiate us further from our competitors, but above all , represents a fantastic opportunity to help our customers on that journey to Digital while giving them a compelling reason to refresh their installed base
(30 seconds max)
In fact, IDC projects that by 2020 the digital universe will reach 40 zettabytes (ZB), which is 40 trillion GB of data, or 5,200 GB of data for every person on Earth.
This amount exceeds previous forecasts by 5 ZBs, resulting in a 50-fold growth from the beginning of 2010.
Now let’s look at the future Retail
3D VR Shopping: What if you have an endless aisle in your store and you have a personal shopper who is ready to answer every question?
At the NYC Rebecca Minkoff store, customers can select products from racks or a digital fashion wall and head to the dressing room, where they meet their personal fashion consultant. Once in the dressing room, a digital mirror displays all the products and sizes the customer has in the room. The customer can easily request a new size by selecting it on the mirror. The consultant delivers the new sizes to the dressing room without the customer having to redress or wander the store half-undressed. In the fitting rooms, an antenna in the light fixture reads RFID tags in merchandise brought to the room, and images automatically appear on the mirror, which doubles as a touch screen. It suggests other clothes or accessories that pair well with what the customer is trying on. The connected fitting room tells the store not only what shoppers bought, but also what they left behind.
"The fitting room has come to life for the consumer as she walks in," Minkoff says. "She can change the lighting. We have four options, so she can see how the outfit will look in bright sunshine, for example. If she is looking at a dress for a cocktail party, she can see how she will look in it in more dim, evening light."
The Impact - Customers quickly find more products that satisfy their desires.
The Result - Richer shopping experiences = increased brand loyalty, increased avg. basket size, increased customer lifetime value
Source - Forrester, https://www.forrester.com/The+Future+Of+The+Retail+Experience/fulltext/-/E-RES122102
http://www.wsj.com/articles/designer-rebecca-minkoffs-new-stores-have-touch-screens-for-an-online-shopping-experience-1415748733
http://www.rfidjournal.com/articles/view?13985
http://www.fastcompany.com/3044831/the-science-behind-how-pepsico-gives-customers-exactly-the-flavors-they-want
In Home Augmented Reality: Now what if you could bring this experience home and never negotiate traffic and rush through the aisles to set foot in a store. What if the store came to you?
HoloLens brings augmented reality to in-home shopping experiences that will allow digital retailers like Amazon to compete more effectively with the physical in-store experience.
At the same time, augmented reality will also give omnichannel retailers an in-home extension of their physical store. The AR shopping experience has the potential to reduce online shopping return rates while also increasing online purchases of products where customers prefer to experience the product.
Source - https://www.forrester.com/The+Future+Of+The+Retail+Experience/fulltext/-/E-RES122102
Automated Retail Fulfillment: What if robots ran a warehouse?
Source - http://www.zoomsystems.com/what-we-do
Real-Time Individualized Manufacturing and Stocking: Now what if we apply this to just in time retailing and manufacturing
Integration of real-time individual consumer context and analytics with existing fulfillment capabilities gives rise to “Omnichannel fulfillment capabilities — that is, the ability to offer the customer cross-channel visibility and ordering options — have become the standard for leading traditional retailers.
Order online for in-store pickup, Ship-to-store, Endless aisle, and even reserve online/pickup in store — all of which could utilize in-store pickup.” – Forrester https://www.forrester.com/Omnichannel+Mastery+Optimize+InStore+Pickup/fulltext/-/E-RES116388
Sources:
66% of Consumers Switched Brands Due to Poor Customer Service. https://www.accenture.com/t20150523T052453__w__/us-en/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Strategy_3/Accenture-Global-Consumer-Pulse-Research-Study-2013-Key-Findings.pdf
55% of US consumers now prefer to use a device to look up product information. https://www.forrester.com/Its+Time+For+Retail+Stores+To+Open+Their+Doors+To+The+Digital+Org/fulltext/-/E-RES129314
80% of Retail Purchases are Still Made in a Brick and Mortar Store. http://www.mckinseyonmarketingandsales.com/sites/default/files/pdf/CSI_Bricks_Click.pdf
86% of consumers will pay more for a better customer experience. http://www.oracle.com/us/products/applications/cust-exp-impact-report-epss-1560493.pdf
We are living in the digital age. Digital capabilities are moving IT to the boardroom. Because IT has to accelerate business processes and introduce new services. These IT shops are digital masters.
Digital Masters excel at two essential capabilities. They build digital capabilities by rethinking and improving their business processes, their customer engagements, and their business models. They also build strong leadership capabilities to envision and drive transformation. Westerman, George; Bonnet, Didier; McAfee, Andrew (2014-09-23). Leading Digital: Turning Technology into Business Transformation (Kindle Locations 155-157). Harvard Business Review Press. Kindle Edition.
Processes based Innovation
You no longer have to turn on your light switch.
Proactive alerts to maintenance / cost savings
You no longer need your credit card, you just use your phone
You no longer watch a “channel” you get on demand.
You no longer physical CD, you stream on demand.
UPS: (Data from Leading Digital book)
Challenge:
For decades, UPS has been a leader at optimizing its processes. By standardizing its processes, even to the extent of telling drivers how to step off the truck, UPS continually improves efficiency, safety, and quality.
UPS controls a complex logistical web with millions of possible permutations in service options and delivery routes.
Route Optimization is a key opportunity and complex challenge, every driver at UPS has trillions of ways to run their delivery routes.
Solution:
UPS used advanced algorithms to shave millions of miles from delivery routes.
The project crunches business rules, map data, customer information, and employee work rules, among other factors, to optimize package delivery routes within six to eight seconds.
Results:
Analytics has helped UPS to reduce eighty-five million miles driven per year.
The reduction equates to over eight million fewer gallons of fuel used.
Boeing: (Data from Manufacturing EBC deck)
Challenge
Avoid misplacing toolkits, machinery, parts and WIP (Work in Progress) inventory which cost as much as $1 million per incident
Solution
Cisco’s Unified Wireless LAN Infrastructure Location capabilities and Wi-Fi asset tags
Results
Locates tagged assets instantly
Reduces delays in the production
Reduces government fines
“In the factory, the ability to locate major parts and tooling on a timely basis is critical... [Wi-Fi-based Active RFID] will streamline our production environment and make it more efficient time-wise and dollar-wise, by not having to replicate tooling and pieces of gear.”
Jim Farrecker, Chief Network Engineer, Boeing
Stanley: (Data from Manufacturing EBC deck)
Challenge
Get better transparency of real-time production to schedule
Dissect why actual labor costs exceeds standard costs
Need to understand effects of shift changes
Gain better visibility to real-time OEE
Solution
Leverage Cisco Connected Factory Wireless in the plant
Combine with AeroScout RFID tags
Integrate RFID Tags to PLC and Quality Control scales
Results
24% in OEE improvement in router line
Reduced labeling error rate by 16%
Improved labor utilization from 80 to 92%
Reduced inventory holding costs by 10%
“With the help of the Cisco and AeroScout Industrial solution, we are on our way toward realizing our vision of a virtual warehouse and fully connected factory, with complete visibility and traceability.”
Gary Frederick, CIO Industrial Division, Stanley
Starbucks: (Data from Leading Digital book)
Challenge
Following a rapid expansion, Starbucks faced declining same-store sales in 2008, and its share price had been cut nearly in half over the prior two years.
Senior leaders, under the helm of CEO Howard Schultz, took a number of strategic actions, key among them using digital technologies to engage customers in new ways.
“Digital for Starbucks was not just about a website or a point-of-sales system, but about an ability to connect with customers and transform their experience and drive the company.” (Adam Brotman, Chief Digital Officer)
Solution
The first Starbucks foray into mobile was the company’s myStarbucks app, released in 2009.
In January 2011, Starbucks took its loyalty program digital with the introduction of its Starbucks Card mobile app.
Starbucks has continued to expand its mobile payment capabilities. In 2012, it announced that customers would be able to make payments at the register via Square— an app-based mobile payment system— following a $ 25 million investment in the service.
Results
Mobile payments at Starbucks have been a success for customer convenience, but they are proving to have financial benefits as well.
With over three million mobile payment transactions per week in 2012, the mobile-payments introduction has significantly reduced transaction fees.
“Everything we are doing in digital is about enhancing and strengthening those connections [with our customers] in only the way that digital can and only the way that Starbucks can.” (Brotman, CDFO)
Philips Connected Lighting:
For Cisco, Major Partners On-Board: Phillips (vertically integrated), Cree (LEDs), Microchip (controller). Gap: Lighting Management Application (just started discussions with a startup – Enlighted)
Challenge:
Imagine . . .a world of beautifully illuminated indoor and outdoor spaces . . . where every light point is connected to an intelligent system that delivers high-quality, reliable illumination . . . and that serves as a pathway for information and services . . . to deliver extraordinary value beyond illumination to the users and managers of spaces. (From Philips Website)
Solution:
Connected Lighting– IoT for the carpeted area.
Results:
For Manufacturers: Big Market: Lighting market will be € 100B by 2020 (McKinsey). LEDs will be 54% of this market
For Customers: Save energy Up to 80% savings over conventional lighting (Philips website)
Digital Disruption quotation – from John Chambers at Cisco Partner Summit 2015.
There are three major IT priorities for IT to lead digital transformation in their respective organizations
Faster Innovation – digital demands businesses to differentiate customer experience and re-define models quickly. Yet only 30% of digital projects will succeed [Cisco study]. This is partly because IT processes are slow and costly and new technologies are being developed faster than they can be adopted.
Reduce Cost and complexity – over time the network has grown complex and our customers are spending 2-3 times more on OpEx than CapEx which is unsustainable in a digital world where there growing numbers of devices, apps, users, threats and static IT budgets.
Lower Risk and Meet Compliance – mobility and cloud by definition increase the attack surface of business, there is no perimeter … and it take 80 days to detect threats and even longer to remediate while 60% of data is stolen in the first few hours. All this while strict new regulations like the European Data Protection and Affordable Care Acts are being introduced.
How does the network need to evolve to enable growing business needs?
As we said before, the network connects all things digital. But let’s discuss how it needs to evolve to address IT priorities for digital.
The network needs to enable faster innovation by delivering Deep Insights on users behaviors, application performance, and threats, so the business can take Immediate Action to optimize factors like employee productivity, customer experience, and daily processes -- all around BUSINESS innovations and new differentiating or disrupting models. For example, in order to Personalize Experiences it needs to deliver context relevant information like what users and devices are on the network and where. And this is possible when the network has visibility and can deliver the analytics, helping businesses make better decisions faster. The network can tell a bank a VIP client has entered a store or what promotions are driving store front conversion or how well expensive real-estate is being utilized (CMX and CMX Cloud, available now). Or the network can see no users are on premises, and lower energy usage of lighting, HVAC, etc. (Digital Ceiling, available Feb 2016). As IoT solutions becoming more pervasive, we’ll see the network share information with applications to drive decisions. Example, Schindler Elevators are running their IoT app over the network to capture analytics on service elevators so they can proactively determine when to send technicians on site. (Non-pubic use case). Today we collect data through devices using CMX, Prime, Lancope; by end of CY16, we will have a Network Data Platform based in the Cloud that will collect rich network data and provide in a structured database with open APIs that customers and partners can tap into for supporting business decisions.
To sustain the increasing devices, apps and services, while reducing cost and complexity the network needs to deliver automation and service assurance. This will allow IT to get a branch office running quickly, or roll out new services and applications faster with efficiency and optimal experience. The focus here is IT agility, providing capabilities that allow speed at the lower costs. Cisco provides deep visibility into users and applications, and with controller innovations, we are fully abstracting the network and providing simple workflows following Cisco best practices, so IT can focus on business intent, and allow the controller enforce the policies dynamically.
Security continues to be a top priority for business and IT leaders! We know 69 percent of customers are less likely to do business with a breached organization. Also, maintaining compliance is difficult to sustain and less than 1/3 of companies remain compliant more than a year [Verizon PCI Compliance; 2012], opening themselves up to fines and legal procedures. The network needs to contain risk through integrated security services that rapidly detect and mitigate threats. Here the network – touching all things digital – can provide Security Everywhere and Consistently Enforce Compliance so that it acts as both a sensor and enforcer all the way from the clients to the cloud.
We all can agree, all these network requirements are very critical to supporting a Digital Organizations, and are the objectives of the Digital Network Architecture, that moves the network beyond a platform of connectivity to a platform for insights, automation and security.
However, while business leaders fully acknowledge the importance of the network in enabling digital, less than 10% of enterprises implementing digital business have very clear integration between their network and digital business strategies. (Source: Gartner). Let’s discuss why this is the case. (go to evolution of networking software)
In short, the objectives of the Digital Network Architecture, is that it moves the network beyond a platform of connectivity to a platform for insights, automation and security.
Lets look at FOUR digital capabilities that are all top of mind with many customers.
Making the Network Secure
Improving Workforce Productivity
Extending Services to Branch
Enhancing Customer Engagement
Depending on verticals, they could be obviously different : asset tracking, data protection, faster time to market, supply chain visibility, etc
It is critical to have the right network in place to support these initiatives.
the network needs to be built on the principles of Virtualization, Automation, Analytics and Cloud. And all of these capabilities are delivered through on premise or cloud managed solutions.
Let’s now look at the DNA architecture and the new capabilities we are introducing
Cisco DNA is an open and extensible, software-driven architecture built on a set of design principles with the objective of providing outcomes:
Insights & Actions, Automaton & Assurance, Security & Compliance as we saw earlier.
What are the key principles of the architecture?
Virtualized everything to give organizations freedom of choice to run services and applications on any platform.
Design for automation leveraging controllers to simplify the complexity of the network and speed up deployment.
Deliver pervasive analytics giving business information – workers, customers, applications, devices, threats – they cannot get from anywhere else.
Offer cloud service management providing a unified interface for customers and partner ecosystem to support network-enabled applications.
Enable openness and extensibility at every layer – Cisco and 3rd party hardware, open API’s, developers platform, all supporting network-enabled applications.
DNA is delivered across three layers
1.) Layer 1 – is the network element layer. Here we have physical and virtual devices the bring together the network. A core principle at Network Layer is Virtualization. We are taking 30 years of networking innovations and virtualizing functions so customers can easily run any service anywhere. We are now introducing Enterprise Network Function Virtualization, that build the full software stack from the infrastructure software that can reside on servers, to virtualized network functions like routing, firewalls, to the orchestration tools to support E-NFV on physical and virtual devices.
We are also modernizing our operating system with evolved IOS XE that is much more open and programmable through APIs.
2.) Layer 2 – is the platform layer. Here we leverage controllers to fully abstract the network and automate all day 0, 1, 2 functions. Also at this level this is where we can gather rich data analytics. Today, we do this through Prime, CMX, Lancope, but you can expect by end of CY16 a single analytics platform providing structured data and open APIs that both Cisco and third parties contextual insights
3.) Layer 3 – are the network enabled application that support key business services like collaboration, mobility & IoT.
As we build to the design principles, we’ll leverage the cloud for:
- Cloud managed – using the cloud to securely manage all elements in the network through a single pane view
- Cloud edge – providing critical network functions at the edge to support business moving their operations to the cloud (like AWS, Azure)
- Cloud delivered – enabling flexible subscription models where possible (statring with CMX)
And of course, DNA will support the critical north and southbound APIs to enable the broadest ecosystem to be supported.
Only the network has access to users, devices, location, applications and even threats.
Today we offer contextual data through a number of services like CMX, Prime and StealthWatch, and we’ll continue to exposure more information overtime in a structured way so Business and IT can gain more value from the network to drive business decisions as well as troubleshoot efficiently.
Cisco Plug and Play Day-zero automation
Simplifies and speeds up day-zero provisioning securely through zero touch and removing steps like centralized staging and truck rolls. Provides dramatic reduction in operating expense: customer data indicates up to 79 percent reduction in device installation costs. Available now
SWM, an EFT customer for PnP, spends around $100 per 2960C for installation via a partner – Low end Access
Rolls Royce Engines pays $6000 per access switch installation and deployment through their partner British Telecom – 3850 Access
Kaiser Permanente spends $$ > cost of switch for day0 installation & configuration - 3850 Access
Per customer conversations, access device installation cost varies, based on switch, router, AP, partner’s involvement, etc. Range is $200 - $2000
Dealing with application-centric designs and policies requires visibility into the current topology as a prerequisite. This may sound trivial - but accurate, real-time and application-specific path information is typically not available to network operators and system integrators today. The dynamic nature of networks makes it virtually impossible to maintain exact and complete external topology databases. Path information between specific application endpoints however, can be discovered at any point in time within the network. However, due to the variety of protocols and abstractions involved at layers 1, 2 and 3 this is still a non-trivial task.
APIC-EM's Path Visualization application provides simple interfaces for human operators (graphical) and software applications (REST) to specify a query and obtain current path information within seconds:
Obtaining accurate 5-tuple path information is both:
a low risk read-only first step towards the possibilities of software-defined, providing operational benefits on a daily basis with minimal effort
a building block towards more sophisticated software-defined architectures
Cisco Aironet 2800 and 3800 Access points can provide deep packet visibility <<Click>>
This allows organizations to visibility into the network, monitor the critical applications that drive success and prioritize applications as they make sense to align to goals. This is all done without any impact to the how the access point serves the end user devices.
I recently met with the Head of Infrastructure of one of the largest European bank. As we were discussing the future requirements of his infrastructure , he shared how much he currently struggles to operate at the digital speed its Business Units require. Those BUs are used to the kind of SLA we now see in Data Centers (in terms of instantiating VM and Infrastructure through ACI for instance), and are expecting the same to happen in their networks (Branch, Campus, Security, ..). And he added: "I just do not know how!"
What I am discussing in this 30 mins video is how we can now help our customers operate at digital speed!
Cisco is introducing DNA, which is the biggest evolution of our enterprise network architecture and messaging in years. And which will differentiate us further from our competitors, but above all , represents a fantastic opportunity to help our customers on that journey to Digital while giving them a compelling reason to refresh their installed base
Talking points
Growing Attack Surface
Does your customer have full handle on the personal devices brought into their premise? If they do, they are doing great job! If they don’t know, that’s no surprise. It is hard to track and manage all of those devices touching corporate network. We are seeing about 90% of organizations not fully aware of all network devices coming in. Those devices are meant to increase your productivity but at same time, we are not sure whether those devices can be trusted or malicious.
Now you can use all of those cloud services using such devices and also from corporate managed asset like laptop.
(http://lerablog.org/business/it/emerging-trends-for-byod-in-2014/)
More Cloud based application used: 5 – 10 times more cloud services are being used than known by IT
(http://blogs.cisco.com/security/beyond-data-securityfive-biggest-risks-of-shadow-cloud-it-services/)
Virtualized service: Virtualization has surpassed 50% of all server workloads—and will reach 86% by 2016
(http://www.cioinsight.com/it-strategy/cloud-virtualization/slideshows/useful-virtualization-stats-trends-and-practices.html#sthash.Ptkluq2i.dpuf)
Social Media: 14% of organizations had malware enter the corporate network through social media/web apps (between November 2012-November 2013)
http://solutions.webtitan.com/blog/bid/157457/New-Research-on-the-Risks-posed-by-Social-Media-in-your-Business-Network-Security
http://www.ostermanresearch.com/whitepapers/orwp_or_201204a.pdf
Dynamic Threat Landscape
More sophisticated attack and motivated threat actors
IOT devices everywhere increasing attacking surface
Complexity and Fragmentation
50+ security vendors for some customers (too many silo technology)
500 security vendors at RSA (many working on same business / security issues)
12x demand for security talent (shortage in security operation)
More compliance requirements that require security professionals
I think when you talk about Security you should always start with the threat
Now if you connect the dots together, Network as a sensor and enforcer brings tremendous value to your customer. It will increase visibility inside their network and they can use this visibility to detect anomaly going on in the environment. ISE can translate this “visibility” and “detection” to something more actionable feedback to the network, which could be the proper segmentation or even remediation of the threat. Since Security Group used in TrustSec becomes the common classifier that network devices such as switches, routers, wireless controller, ASA Firewall, Web Security Appliances, data center switches, and hypervisor switches, customer can leverage their investment to simplify security operation, automate remediation based on detection, and secure their environment in depth.
Now this wraps up the intro section, but you will learn Network as a Sensor and Enforcer in depth, in the following section this morning and afternoon.
I recently met with the Head of Infrastructure of one of the largest European bank. As we were discussing the future requirements of his infrastructure , he shared how much he currently struggles to operate at the digital speed its Business Units require. Those BUs are used to the kind of SLA we now see in Data Centers (in terms of instantiating VM and Infrastructure through ACI for instance), and are expecting the same to happen in their networks (Branch, Campus, Security, ..). And he added: "I just do not know how!"
What I am discussing in this 30 mins video is how we can now help our customers operate at digital speed!
Cisco is introducing DNA, which is the biggest evolution of our enterprise network architecture and messaging in years. And which will differentiate us further from our competitors, but above all , represents a fantastic opportunity to help our customers on that journey to Digital while giving them a compelling reason to refresh their installed base