SlideShare a Scribd company logo
1 of 27
Download to read offline
Why ACI? 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Data Center Network: Trends and Challenges 
25% Annual Growth —Big Data1 75% Bare Metal2 45% Multi-Hypervisor3 
“Can you look 
into my application 
Performance ..NOW?” 
“..I need to move 
workloads to the 
cloud…NOW!.” 
“…I need to roll 
out new security 
policies NOW…” 
1 Cisco Global Cloud Index 
*2 IDC Worldwide Virtual Machine 2013-2017 Forecast 
*3 InformationWeek 2013 Virtualization Management Survey 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application Centric Infrastructure 
Customer Business Benefits 
• Deploy applications faster 
• Workload mobility 
• Higher application availability 
• Compliant and secure 
• CapEx reduction 
Network Service Appliances X86 Multi-Hypervisor 
HYPERVISOR HYPERVISOR HYPERVISOR 
Application Centric Infrastructure 
East-West optimized for all workloads 
Single open API 
for entire system 
X86-Virtual Machines 
& Virtual Appliances 
X86 Servers Unix Systems P and Z systems 
IP Storage 
Customer Operational Benefits 
• Risk mitigation 
• Better utilization of resources 
• Operational efficient / zero touch 
deployment and de-commissioning 
• Self documenting network 
• Simplified day-2 troubleshooting 
• OpEx reduction 
©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
ACI: Business Outcome and Benefits for Cisco IT 
“Cisco’s open standards approach 
makes ACI even stronger. We conducted 
testing on ACI … it fully delivered 
everything we expected, and proved to 
be quite stable and mature.” 
Nik Weidenbacher 
Principal Engineer, SunGard 
“Cisco ACI is an open, future-proofed 
data center architecture that can continue 
to grow as we enhance client services.” 
Chuck Crane 
Network and Security Architect, Axciom 
(Transitioning from AWS to Private Cloud) 
“This will enable Telstra to deliver 
service agility, security and performance 
that our customers expect from an 
enterprise grade cloud.” 
Erez Yarkoni 
Executive Director, Telstra 
Resource 
Optimization 
10-20% 
Compute and 
Storage 
Optimization 
Greater 
Business Agility 
58% 
Reduce 
Network 
Provisioning 
Reduced Costs/ 
Complexity 
21% 
Reduce 
Management 
Costs 
Lower Operating 
Cost 
45% 
Reduce Power 
and Cooling 
Costs 
Lower Capital 
Expenses 
25% 
CAPEX 
Reduction 
Source: Cisco IT 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
What is ACI? 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Application Centric Infrastructure Building Blocks 
Rapid Deployment of Applications onto 
Networks with Scale, Security and Full Visibility 
APPLICATION CENTRIC 
NEXUS 9500 AND 9300 POLICY CONTROLLER 
ACI 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Programmable DC Networking for The Next Decade 
Nexus 9000 
1/10/40/100G* 
Performance, Scale: Fastest 40G Platform 
Open Source / APIs / Standards 
Python, Power Shell, Puppet, Chef … 1011 
15% Better Power and Cooling 
2.8X Better Reliability 
$ Multi-million Savings 40/100G on Existing Cables 
0010 
Standalone / ACI Ready 
*100G Ready 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application Policy Infrastructure Controller 
Embracing SDN and Going Beyond 
POLICY: Centralized Application-Level Policy 
VISIBILITY: System-Wide Visibility, Telemetry, Health 
OPENESS: Open Source / APIs / Standards 
SECURE: Security and Performance @ Scale 
EXTENSIBLE: Hypervisors, L4-7, Storage, Compute 
Centralized Point of 
Management 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Application Centric Policy is Business Relevant 
• Application Centric Infrastructure (ACI) allows the entire infrastructure to 
take commands in a business-relevant language. 
ACI Policy Aligned with Applications Traditional Policy Aligned with ….? 
“Let my app servers talk 
to my web servers.” 
1. “Figure out where app lives in physical net” 
2. “Trunk VLAN 112 to switch 22.” 
3. “Add route….” 
4. “Plumb ports 7-12…” 
5. “Configure ACL…” 
6. “Apply QoS…” 
7. Repeat every time app moves or needs more capacity 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Applications and The Network 
Application 
Requirements 
WEB APP DB 
WAN 
Firewall 
LB to App 
Connect to DB 
Connect to App 
High Priority 
Map existing 
Networks into 
Groups 
WEB APP DB 
VLAN 100 QOS ACLs Layer 3 
F/W WEB APP DB 
ADC ADC 
WEB WEB WEB APP APP APP DB DB DB 
DIRECTLY MAP TO ACI APPLICATION PROFILES 
Map Groups and 
Policies into 
Application Profile 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
An Innovative Approach to Policy= Application Profile 
Provided Contract 
WEB 
Consumed 
Contract WEB 
OUTSIDE 
EPG 
Provided Contract 
DB 
DB 
EPG 
Consumed 
Contract DB 
APP 
EPG 
Consumed 
Contract APP 
WEB 
Provided Contract 
APP 
FW EPG ADC 
ADC 
Service Chain FW Service Chain APP 
Service Chain WEB 
What is an Application Profile? 
1) End Point Group (EPG): A set of virtual or physical workloads with the same policy 
2) Contracts: A set of rules governing communication between groups 
3) Service Chains. A set of network services between groups 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Application Policy Model and Instantiation 
Storage Storage 
DB Tier 
Application 
Client 
Web 
Tier 
App Tier 
Application policy model: Defines the 
application requirements (application 
network profile) 
Policy instantiation: Each device 
dynamically instantiates the required 
changes based on the policies 
VM VM 
VM VM VM 
10.2.4.7 
VM 
10.9.3.37 
VM 
10.32.3.7 
All forwarding in the fabric is managed through the application network profile 
IP addresses are fully portable anywhere within the fabric 
Security and forwarding are fully decoupled from any physical or virtual network attributes 
Devices autonomously update the state of the network based on configured policy requirements 
APIC 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Center Automation – Manual versus Policy Driven 
Architect it 
Design it 
Procure it 
Install it 
Configure it 
Secure it 
QA it 
Is it ready? 
Architect it 
Design it 
Is installed 
Is configured 
Is secured 
Is QA’d 
Is procured 
It is ready 
ACI Policy Driven 
Service 
ARCHITECT DESIGN COMPUTE 
Request 
SERVICES SECURITY NETWORK Application 
Available Application 
Available 
©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Data Center Automation and IT Collaboration 
Today: Serialized Configuration and Management 
MANUAL PROCESS LEADS TO INCREASED DEPLOYMENT TIMES 
COMPUTE SERVICES NETWORK SECURITY 
Application 
Requirements 
Configuration Mismatch Policy Violation 
Successful 
Deployment 
Deployment Trigger 
Service ARCHITECT DESIGN COMPUTE 
Request SERVICES SECURITY NETWORK Application 
Available 
©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Data Center Automation and IT Collaboration 
ACI: Common Policy Framework and Operational Model 
POLICY-BASED AUTOMATION 
STORAGE SECURITY 
Application 
Policy 
COMPUTE NETWORK 
APPLICATION CLOUD 
Application 
Requirements 
Defined set of application 
requirements 
Team builds application 
policy and template 
Deployment Trigger 
Operations team 
deploys with minimal 
risk and maximum 
speed 
Service ARCHITECT DESIGN 
Request 
Application 
Available 
©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Application Awareness 
ACI: Application-Level Visibility 
Actions: 
No new hosts or VMs 
Evacuate hypervisors 
Re-balance clusters 
CiscoLive Event 
PetStore Dev 
• Leaf 1 and 2 
• Spine 1 – 3 
• Atomic counters 
Triggered Events 
or Queries 
PetStore Prod 
• Leaf 2 and 3 
• Spine 1 – 2 
• Atomic counters 
PetStore QA 
• Leaf 3 and 4 
• Spine 2 – 3 
• Atomic counters 
APIC 
VXLAN 
Per-Hop Visibility 
Physical and 
Virtual as One 
ACI Fabric provides the next generation 
of analytic capabilities 
Per application, tenants, and 
infrastructure: 
• Health scores 
• Latency 
• Atomic counters 
• Resource consumption 
Integrate with workload placement or 
migration 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ACI Addresses the Security Challenge in the DC 
Automate 
Compliance, 
Centralized Audit 
Visibility, 
Analytics, 
Forensics 
Simplified Policy-based 
Segmentation 
Network 
Services 
Automation, 
Open Eco- 
System 
Security 
Expressed in 
Application 
Language 
Centralized Security Across Physical and Virtual 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Open 
Open Source, Open S tandards, Open Interfaces 
©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Open: Choice and Investment Protection 
OPERATIONAL MODELS 
1. Scripting/Languages 
RESTful APIs, Python etc. 
2. IT Automation 
3. OpenSource 
OpFlex 
APPLICATION 
NETWORK SECURITY 
4. Integrated ACI Approach 
RICH ECOSYSTEM 
Hypervisors 
L4-L7 Services 
Management 
Security 
Storage 
Automate 
CLOUD 
Operational Choice—Service Provider, Enterprise, Commercial 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How ACI fits into Private and 
Public Clouds? 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
ACI is Multi-Hypervisor-Ready 
Virtual Integration 
! Integrated gateway for VLAN, 
VxLAN, and NVGRE networks 
from virtual to physical 
! Normalization for NVGRE, 
VXLAN, and VLAN networks 
! Customer not restricted by a 
choice of hypervisor 
! Fabric is ready for multi-hypervisor 
Network 
Admin 
Application 
Admin 
VLAN 
VXLAN 
BARE METAL 
SERVER 
VLAN 
VXLAN 
Any to Any 
VLAN 
NVGRE 
VMware 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 
VLAN 
Hyper-V KVM 
Hypervisor 
Management 
APIC 
APIC 
VMware 
Microsoft 
Red Hat 
XenServer 
Microsoft Red Hat 
C240 M3 with OmniStack
ACI is Part of Cisco Intercloud Fabric Value Proposition: 
Secure Workload Mobility 
Cisco Intercloud Fabric 
Provider Cloud 
Fixed Workloads Variable Workloads 
Consistency 
Security/Networking 
as an extension of 
Private Cloud 
Control 
Unified workload 
management 
across clouds 
DC/Private Cloud 
Choice 
Freedom to place 
workloads across 
heterogeneous Clouds 
Compliance 
Policy-based 
deployment with ACI/ 
governance in cloud 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ACI is Part of Data Center Automation 
Prime Services Catalogue 
Stack Designer 
IaaS PaaS SaaS ITaaS Intercloud 
Process Orchestrator 3rd Party 
Orchestrator 
Intercloud 
Fabric 
UCS Director Openstack 
UCS Manager 
Application 
Policy 
Infrastructure 
Controller 
Converged 
Infrastructure 
Managers 
OpenDaylight 
Virtual Machine 
Manager 
PORTAL 
SERVICES 
ORCHESTRATION 
AUTOMATION 
INFRASTRUCTURE 
MANAGEMENT 
Open Integration 
MANAGEMENT AUTOMATION POLICY SECURITY 
ECOSYSTEM 
PARTNERS 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Summary 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Summary: Our Direction 
Data centers and cloud network infrastructures, both 
physical and virtual, will no longer be configured, will not 
be software defined (or programmed), but instead will 
be Policy Driven and Application Centric. 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Thank you.

More Related Content

What's hot

APIC-EM Update: SDN Automation for the Enterprise Network
APIC-EM Update: SDN Automation for the Enterprise NetworkAPIC-EM Update: SDN Automation for the Enterprise Network
APIC-EM Update: SDN Automation for the Enterprise NetworkPablo Liesenberg
 
Supercharge Ansible for Networking with Itential
Supercharge Ansible for  Networking with ItentialSupercharge Ansible for  Networking with Itential
Supercharge Ansible for Networking with ItentialItential
 
The Evolution of the Data Centre
The Evolution of the Data CentreThe Evolution of the Data Centre
The Evolution of the Data CentreCisco Canada
 
Automate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with ItentialAutomate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with ItentialItential
 
inSIG 2021: APNIC and APrIGF
inSIG 2021: APNIC and APrIGFinSIG 2021: APNIC and APrIGF
inSIG 2021: APNIC and APrIGFAPNIC
 
Migrating Application Connectivity and Network Security to AWS
Migrating Application Connectivity and Network Security to AWSMigrating Application Connectivity and Network Security to AWS
Migrating Application Connectivity and Network Security to AWSAlgoSec
 
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...Cisco Canada
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarMaytal Levi
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
Modern Network Compliance: How Network Compliance Accelerates Automation
Modern Network Compliance: How Network Compliance Accelerates AutomationModern Network Compliance: How Network Compliance Accelerates Automation
Modern Network Compliance: How Network Compliance Accelerates AutomationItential
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloudAlgoSec
 
Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Proact Netherlands B.V.
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practicesshira koper
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center LandscapeCisco Canada
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesAlgoSec
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation Maytal Levi
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Maytal Levi
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overviewBAKOTECH
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 

What's hot (20)

how to simulate ACI
how to simulate ACIhow to simulate ACI
how to simulate ACI
 
APIC-EM Update: SDN Automation for the Enterprise Network
APIC-EM Update: SDN Automation for the Enterprise NetworkAPIC-EM Update: SDN Automation for the Enterprise Network
APIC-EM Update: SDN Automation for the Enterprise Network
 
Supercharge Ansible for Networking with Itential
Supercharge Ansible for  Networking with ItentialSupercharge Ansible for  Networking with Itential
Supercharge Ansible for Networking with Itential
 
The Evolution of the Data Centre
The Evolution of the Data CentreThe Evolution of the Data Centre
The Evolution of the Data Centre
 
Automate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with ItentialAutomate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with Itential
 
inSIG 2021: APNIC and APrIGF
inSIG 2021: APNIC and APrIGFinSIG 2021: APNIC and APrIGF
inSIG 2021: APNIC and APrIGF
 
Migrating Application Connectivity and Network Security to AWS
Migrating Application Connectivity and Network Security to AWSMigrating Application Connectivity and Network Security to AWS
Migrating Application Connectivity and Network Security to AWS
 
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
Modern Network Compliance: How Network Compliance Accelerates Automation
Modern Network Compliance: How Network Compliance Accelerates AutomationModern Network Compliance: How Network Compliance Accelerates Automation
Modern Network Compliance: How Network Compliance Accelerates Automation
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloud
 
Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 

Similar to Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Application Centric Infrastructure, Delivering Software Flexibility with Hardware Performance and Scalability

Cisco at v mworld 2015 vmworld-deck-2015-final
Cisco at v mworld 2015 vmworld-deck-2015-finalCisco at v mworld 2015 vmworld-deck-2015-final
Cisco at v mworld 2015 vmworld-deck-2015-finalldangelo0772
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
 
Making Networks More Agile, Open, and Application Centric - Cisco Insights
Making Networks More Agile, Open, and Application Centric - Cisco InsightsMaking Networks More Agile, Open, and Application Centric - Cisco Insights
Making Networks More Agile, Open, and Application Centric - Cisco InsightsCisco Service Provider
 
How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN Shashi Kiran
 
Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015ldangelo0772
 
Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Shashi Kiran
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco Canada
 
Cisco and F5 accelerate Application Delivery
Cisco and F5 accelerate Application DeliveryCisco and F5 accelerate Application Delivery
Cisco and F5 accelerate Application DeliveryShashi Kiran
 
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...Lauren Cooney
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015ldangelo0772
 
Cloud Computing and the Promise of Everything as a Service
Cloud Computing and the Promise of Everything as a ServiceCloud Computing and the Promise of Everything as a Service
Cloud Computing and the Promise of Everything as a ServiceLew Tucker
 
Cisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
The Evolution of the Data Centre
The Evolution of the Data CentreThe Evolution of the Data Centre
The Evolution of the Data CentreCisco Canada
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformShashi Kiran
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
Presentation ciac
Presentation   ciacPresentation   ciac
Presentation ciacxKinAnx
 

Similar to Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Application Centric Infrastructure, Delivering Software Flexibility with Hardware Performance and Scalability (20)

Cisco at v mworld 2015 vmworld-deck-2015-final
Cisco at v mworld 2015 vmworld-deck-2015-finalCisco at v mworld 2015 vmworld-deck-2015-final
Cisco at v mworld 2015 vmworld-deck-2015-final
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
 
Making Networks More Agile, Open, and Application Centric - Cisco Insights
Making Networks More Agile, Open, and Application Centric - Cisco InsightsMaking Networks More Agile, Open, and Application Centric - Cisco Insights
Making Networks More Agile, Open, and Application Centric - Cisco Insights
 
How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN
 
Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015
 
Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s Reality
 
Cisco and F5 accelerate Application Delivery
Cisco and F5 accelerate Application DeliveryCisco and F5 accelerate Application Delivery
Cisco and F5 accelerate Application Delivery
 
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015
 
Cloud Computing and the Promise of Everything as a Service
Cloud Computing and the Promise of Everything as a ServiceCloud Computing and the Promise of Everything as a Service
Cloud Computing and the Promise of Everything as a Service
 
Cisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered Presentation - For Customers
Cisco Powered Presentation - For Customers
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
The Evolution of the Data Centre
The Evolution of the Data CentreThe Evolution of the Data Centre
The Evolution of the Data Centre
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Presentation ciac
Presentation   ciacPresentation   ciac
Presentation ciac
 

More from Primend

Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Primend
 
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Primend
 
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Primend
 
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulÄrikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulPrimend
 
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Primend
 
Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Primend
 
Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Primend
 
Ärikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedÄrikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedPrimend
 
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Primend
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
 
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Primend
 
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Primend
 
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Primend
 
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPraktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPrimend
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Primend
 
Morning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedMorning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedPrimend
 
Power BI -The Missing Piece
Power BI -The Missing PiecePower BI -The Missing Piece
Power BI -The Missing PiecePrimend
 
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Primend
 
Primend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend
 
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend
 

More from Primend (20)

Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
 
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
 
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
 
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulÄrikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
 
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
 
Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...
 
Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas
 
Ärikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedÄrikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemused
 
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
 
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
 
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
 
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPraktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016
 
Morning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedMorning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudised
 
Power BI -The Missing Piece
Power BI -The Missing PiecePower BI -The Missing Piece
Power BI -The Missing Piece
 
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
 
Primend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduks
 
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Application Centric Infrastructure, Delivering Software Flexibility with Hardware Performance and Scalability

  • 1.
  • 2. Why ACI? © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. Data Center Network: Trends and Challenges 25% Annual Growth —Big Data1 75% Bare Metal2 45% Multi-Hypervisor3 “Can you look into my application Performance ..NOW?” “..I need to move workloads to the cloud…NOW!.” “…I need to roll out new security policies NOW…” 1 Cisco Global Cloud Index *2 IDC Worldwide Virtual Machine 2013-2017 Forecast *3 InformationWeek 2013 Virtualization Management Survey © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 4. Application Centric Infrastructure Customer Business Benefits • Deploy applications faster • Workload mobility • Higher application availability • Compliant and secure • CapEx reduction Network Service Appliances X86 Multi-Hypervisor HYPERVISOR HYPERVISOR HYPERVISOR Application Centric Infrastructure East-West optimized for all workloads Single open API for entire system X86-Virtual Machines & Virtual Appliances X86 Servers Unix Systems P and Z systems IP Storage Customer Operational Benefits • Risk mitigation • Better utilization of resources • Operational efficient / zero touch deployment and de-commissioning • Self documenting network • Simplified day-2 troubleshooting • OpEx reduction ©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. ACI: Business Outcome and Benefits for Cisco IT “Cisco’s open standards approach makes ACI even stronger. We conducted testing on ACI … it fully delivered everything we expected, and proved to be quite stable and mature.” Nik Weidenbacher Principal Engineer, SunGard “Cisco ACI is an open, future-proofed data center architecture that can continue to grow as we enhance client services.” Chuck Crane Network and Security Architect, Axciom (Transitioning from AWS to Private Cloud) “This will enable Telstra to deliver service agility, security and performance that our customers expect from an enterprise grade cloud.” Erez Yarkoni Executive Director, Telstra Resource Optimization 10-20% Compute and Storage Optimization Greater Business Agility 58% Reduce Network Provisioning Reduced Costs/ Complexity 21% Reduce Management Costs Lower Operating Cost 45% Reduce Power and Cooling Costs Lower Capital Expenses 25% CAPEX Reduction Source: Cisco IT © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. What is ACI? © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Application Centric Infrastructure Building Blocks Rapid Deployment of Applications onto Networks with Scale, Security and Full Visibility APPLICATION CENTRIC NEXUS 9500 AND 9300 POLICY CONTROLLER ACI © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 8. Programmable DC Networking for The Next Decade Nexus 9000 1/10/40/100G* Performance, Scale: Fastest 40G Platform Open Source / APIs / Standards Python, Power Shell, Puppet, Chef … 1011 15% Better Power and Cooling 2.8X Better Reliability $ Multi-million Savings 40/100G on Existing Cables 0010 Standalone / ACI Ready *100G Ready © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 9. Application Policy Infrastructure Controller Embracing SDN and Going Beyond POLICY: Centralized Application-Level Policy VISIBILITY: System-Wide Visibility, Telemetry, Health OPENESS: Open Source / APIs / Standards SECURE: Security and Performance @ Scale EXTENSIBLE: Hypervisors, L4-7, Storage, Compute Centralized Point of Management © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Application Centric Policy is Business Relevant • Application Centric Infrastructure (ACI) allows the entire infrastructure to take commands in a business-relevant language. ACI Policy Aligned with Applications Traditional Policy Aligned with ….? “Let my app servers talk to my web servers.” 1. “Figure out where app lives in physical net” 2. “Trunk VLAN 112 to switch 22.” 3. “Add route….” 4. “Plumb ports 7-12…” 5. “Configure ACL…” 6. “Apply QoS…” 7. Repeat every time app moves or needs more capacity © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Applications and The Network Application Requirements WEB APP DB WAN Firewall LB to App Connect to DB Connect to App High Priority Map existing Networks into Groups WEB APP DB VLAN 100 QOS ACLs Layer 3 F/W WEB APP DB ADC ADC WEB WEB WEB APP APP APP DB DB DB DIRECTLY MAP TO ACI APPLICATION PROFILES Map Groups and Policies into Application Profile © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 12. An Innovative Approach to Policy= Application Profile Provided Contract WEB Consumed Contract WEB OUTSIDE EPG Provided Contract DB DB EPG Consumed Contract DB APP EPG Consumed Contract APP WEB Provided Contract APP FW EPG ADC ADC Service Chain FW Service Chain APP Service Chain WEB What is an Application Profile? 1) End Point Group (EPG): A set of virtual or physical workloads with the same policy 2) Contracts: A set of rules governing communication between groups 3) Service Chains. A set of network services between groups © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Application Policy Model and Instantiation Storage Storage DB Tier Application Client Web Tier App Tier Application policy model: Defines the application requirements (application network profile) Policy instantiation: Each device dynamically instantiates the required changes based on the policies VM VM VM VM VM 10.2.4.7 VM 10.9.3.37 VM 10.32.3.7 All forwarding in the fabric is managed through the application network profile IP addresses are fully portable anywhere within the fabric Security and forwarding are fully decoupled from any physical or virtual network attributes Devices autonomously update the state of the network based on configured policy requirements APIC © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 14. Data Center Automation – Manual versus Policy Driven Architect it Design it Procure it Install it Configure it Secure it QA it Is it ready? Architect it Design it Is installed Is configured Is secured Is QA’d Is procured It is ready ACI Policy Driven Service ARCHITECT DESIGN COMPUTE Request SERVICES SECURITY NETWORK Application Available Application Available ©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. Data Center Automation and IT Collaboration Today: Serialized Configuration and Management MANUAL PROCESS LEADS TO INCREASED DEPLOYMENT TIMES COMPUTE SERVICES NETWORK SECURITY Application Requirements Configuration Mismatch Policy Violation Successful Deployment Deployment Trigger Service ARCHITECT DESIGN COMPUTE Request SERVICES SECURITY NETWORK Application Available ©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Data Center Automation and IT Collaboration ACI: Common Policy Framework and Operational Model POLICY-BASED AUTOMATION STORAGE SECURITY Application Policy COMPUTE NETWORK APPLICATION CLOUD Application Requirements Defined set of application requirements Team builds application policy and template Deployment Trigger Operations team deploys with minimal risk and maximum speed Service ARCHITECT DESIGN Request Application Available ©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Application Awareness ACI: Application-Level Visibility Actions: No new hosts or VMs Evacuate hypervisors Re-balance clusters CiscoLive Event PetStore Dev • Leaf 1 and 2 • Spine 1 – 3 • Atomic counters Triggered Events or Queries PetStore Prod • Leaf 2 and 3 • Spine 1 – 2 • Atomic counters PetStore QA • Leaf 3 and 4 • Spine 2 – 3 • Atomic counters APIC VXLAN Per-Hop Visibility Physical and Virtual as One ACI Fabric provides the next generation of analytic capabilities Per application, tenants, and infrastructure: • Health scores • Latency • Atomic counters • Resource consumption Integrate with workload placement or migration © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 18. ACI Addresses the Security Challenge in the DC Automate Compliance, Centralized Audit Visibility, Analytics, Forensics Simplified Policy-based Segmentation Network Services Automation, Open Eco- System Security Expressed in Application Language Centralized Security Across Physical and Virtual © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. Open Open Source, Open S tandards, Open Interfaces ©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. Open: Choice and Investment Protection OPERATIONAL MODELS 1. Scripting/Languages RESTful APIs, Python etc. 2. IT Automation 3. OpenSource OpFlex APPLICATION NETWORK SECURITY 4. Integrated ACI Approach RICH ECOSYSTEM Hypervisors L4-L7 Services Management Security Storage Automate CLOUD Operational Choice—Service Provider, Enterprise, Commercial © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 21. How ACI fits into Private and Public Clouds? © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. ACI is Multi-Hypervisor-Ready Virtual Integration ! Integrated gateway for VLAN, VxLAN, and NVGRE networks from virtual to physical ! Normalization for NVGRE, VXLAN, and VLAN networks ! Customer not restricted by a choice of hypervisor ! Fabric is ready for multi-hypervisor Network Admin Application Admin VLAN VXLAN BARE METAL SERVER VLAN VXLAN Any to Any VLAN NVGRE VMware © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential VLAN Hyper-V KVM Hypervisor Management APIC APIC VMware Microsoft Red Hat XenServer Microsoft Red Hat C240 M3 with OmniStack
  • 23. ACI is Part of Cisco Intercloud Fabric Value Proposition: Secure Workload Mobility Cisco Intercloud Fabric Provider Cloud Fixed Workloads Variable Workloads Consistency Security/Networking as an extension of Private Cloud Control Unified workload management across clouds DC/Private Cloud Choice Freedom to place workloads across heterogeneous Clouds Compliance Policy-based deployment with ACI/ governance in cloud © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 24. ACI is Part of Data Center Automation Prime Services Catalogue Stack Designer IaaS PaaS SaaS ITaaS Intercloud Process Orchestrator 3rd Party Orchestrator Intercloud Fabric UCS Director Openstack UCS Manager Application Policy Infrastructure Controller Converged Infrastructure Managers OpenDaylight Virtual Machine Manager PORTAL SERVICES ORCHESTRATION AUTOMATION INFRASTRUCTURE MANAGEMENT Open Integration MANAGEMENT AUTOMATION POLICY SECURITY ECOSYSTEM PARTNERS © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 25. Summary © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. Summary: Our Direction Data centers and cloud network infrastructures, both physical and virtual, will no longer be configured, will not be software defined (or programmed), but instead will be Policy Driven and Application Centric. © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26