This presentation will discuss cloud computing at Cisco Canada, including an overview of Cloud Computing, Cisco’s cloud strategy, the unified Data Center, Cisco Solution, Cloud Case study, and advances in technology and platforms.
Cisco ACI: A New Approach to Software Defined NetworkingDebra Jennings
Cisco ACI: A New Approach to Software Defined Networking, presented by Michael Edwards from GTRI. Learn more about Cisco's Application Centric Infrastructure (ACI). As a policy-based automation solution, Cisco ACI is a different approach to Software Defined Networking (SDN). This presentation uncovers what makes it simple, agile and application centric, and how it can reduce errors and accelerate application deployment from weeks to minutes.
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Insight
More organizations are making the shift to Software-Defined Wide Area Networks (SD-WANs), but it can be difficult to decide which solutions are best suited to your business. In this infographic, explore two of the most well-established and widely deployed enterprise-grade Cisco SD-WAN solutions: Meraki MX and Viptela.
Aruba Campus Switching
Aruba 2930f switch
The Changing Role of Network Switches، now HPE (Aruba) Receives the Highest Score in 5 out of 6 Gartner Critical Capabilities Use Cases
High-performance 32G Fibre Channel Module on MDS 9700 Directors:Tony Antony
To better serve the new application requirements, Cisco is introducing a New high-performance Analytics ready 32G Fibre Channel Module on MDS 9700 Directors and a new 32G Host Bus Adapter for UCS C-series. The end to end 32G FC support across Cisco DC platforms set new standards for Storage Networking providing customers with choice. Along with this announcement, Cisco is also announcing NVMe over Fabric support on MDS 9000 Series enabling customers to take advantage of the performance and low latency benefits offered by the new technology to scale efficiently in the post-flash environments.
When bringing any new technology into an enterprise, security is of course a paramount concern. Let’s go “under the hood” and examine in detail how to use data encryption in Azure Storage Service
Cisco ACI: A New Approach to Software Defined NetworkingDebra Jennings
Cisco ACI: A New Approach to Software Defined Networking, presented by Michael Edwards from GTRI. Learn more about Cisco's Application Centric Infrastructure (ACI). As a policy-based automation solution, Cisco ACI is a different approach to Software Defined Networking (SDN). This presentation uncovers what makes it simple, agile and application centric, and how it can reduce errors and accelerate application deployment from weeks to minutes.
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Insight
More organizations are making the shift to Software-Defined Wide Area Networks (SD-WANs), but it can be difficult to decide which solutions are best suited to your business. In this infographic, explore two of the most well-established and widely deployed enterprise-grade Cisco SD-WAN solutions: Meraki MX and Viptela.
Aruba Campus Switching
Aruba 2930f switch
The Changing Role of Network Switches، now HPE (Aruba) Receives the Highest Score in 5 out of 6 Gartner Critical Capabilities Use Cases
High-performance 32G Fibre Channel Module on MDS 9700 Directors:Tony Antony
To better serve the new application requirements, Cisco is introducing a New high-performance Analytics ready 32G Fibre Channel Module on MDS 9700 Directors and a new 32G Host Bus Adapter for UCS C-series. The end to end 32G FC support across Cisco DC platforms set new standards for Storage Networking providing customers with choice. Along with this announcement, Cisco is also announcing NVMe over Fabric support on MDS 9000 Series enabling customers to take advantage of the performance and low latency benefits offered by the new technology to scale efficiently in the post-flash environments.
When bringing any new technology into an enterprise, security is of course a paramount concern. Let’s go “under the hood” and examine in detail how to use data encryption in Azure Storage Service
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
Micro Segmentation for Zero trust security and compliance
1) What is Zero Trust?
2) How does zero trust relate to compliance?
3) Guardicore and Micro Segmentation,
4) YouAttest and Compliance
5) Short Demo and Q&A session
Estimating Development Security Maturity in About an HourPriyanka Aash
The session describes a simple method of estimating a development team’s security maturity, i.e. how well they make a secure software product, by looking at five key factors. The factors and a simple rating system will be shown coupled with real-world samples. Applicable usage scenarios as well as comparison to other security maturity models will be given.
(Source: RSA USA 2016-San Francisco)
Data center networks are reaching a breaking point. What today’s enterprises need is a new solution that reduces network complexity, improves performance, and scale. The HPE FlexFabric portfolio provides an open approach to data center network fabric. This approach enables automated connectivity and is designed to deliver software-defined network services. Join us to hear the latest on FlexFabric.
AI model efficiency is crucial for making AI ubiquitous, leading to smarter devices and enhanced lives. Besides the performance benefit, quantized neural networks also increase power efficiency for two reasons: reduced memory access costs and increased compute efficiency.
The quantization work done by the Qualcomm AI Research team is crucial in implementing machine learning algorithms on low-power edge devices. In network quantization, we focus on both pushing the state-of-the-art (SOTA) in compression and making quantized inference as easy to access as possible. For example, our SOTA work on oscillations in quantization-aware training that push the boundaries of what is possible with INT4 quantization. Furthermore, for ease of deployment, the integer formats such as INT16 and INT8 give comparable performance to floating point, i.e., FP16 and FP8, but have significantly better performance-per-watt performance. Researchers and developers can make use of this quantization research to successfully optimize and deploy their models across devices with open-sourced tools like AI Model Efficiency Toolkit (AIMET).
Presenters: Tijmen Blankevoort and Chirag Patel
Stellar Protocol: What is Stellar and Why It MattersSoroush Pour
An overview of the Stellar protocol (www.Stellar.org), what it allows and why it can reshape financial transactions around the world. We are building a USD gateway on the Stellar network at www.HubbleGateway.com
How to apply security in an agile environment. Using old frameworks in an agile environment fails. By using a new model and an agile aligned security strategy, information security can be integrated into agile development projects.
VRF (Virtual Routing and Forwarding) is a technology that allows multiple instances of a routing table to
co-exist within the same router at the same time. This increases functionality by allowing network paths
to be segmented without using multiple devices. Because traffic is automatically segregated, VRF also
increases network security and can eliminate the need for encryption and authentication. Internet
service providers (ISPs) often take advantage of VRF to create separate virtual private networks (VPNs)
for customers; thus the technology is also referred to as VPN routing and forwarding. Because the
routing instances are independent, the same or overlapping IP addresses can be used without
conflicting with each other.
An introduction to the reference architectures content from the Microsoft patterns & practices team.
This covers common IaaS (infrastructure) and PaaS (managed services) scenarios.
http://aka.ms/architecture
Be sure to read the notes!
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
A description of Azure Key Vault. Why do we need Azure Key Vault where does it fit in a solution. The details of storing keys, secrets and certificate inside of key vault. Using key vault for encryption and decryption of data
How Hess Has Continued to Optimize the AWS Cloud After Migrating - ENT218 - r...Amazon Web Services
Hess Corporation is a leading global independent energy company engaged in exploration for and production of crude oil and natural gas. Early in Hess's journey to the cloud, they operated the AWS platform in a manner similar to how they operated their on-premises data centers, creating a number of challenges. In this session, Hess Corporation discusses how they worked to further optimize their use of the AWS Cloud following their data center migration. They also cover technical strategies implemented to improve security, governance, and financial reporting and examine changes to their corporate culture that encourage innovation while improving cost controls.
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...GoGrid Cloud Hosting
This presentation "Complex Infrastructure Made Easy - Learn About the GoGrid 3.0 Release & Our New East Coast Datacenter" is primarily for current GoGrid customers. The Webinar was recorded on 6/28/10. Presenters were Mario Olivarez & Justin Kitagawa of GoGrid and Ryan Holland of TrendMicro.
The webinar is available here: http://www.vimeo.com/13335979
Topics:
- Overview: Complex Infrastructure Made Easy - GoGrid's unique value proposition
- GoGrid 3.0: The latest version of the GoGrid platform - East Coast demo
- GoGrid Security: New services from Cisco, Fortinet, TrendMicro & Sentrigo
- PCI Compliance: PCI compliance in the GoGrid Cloud - Demo with TrendMicro
- Questions & Answers
Switch to NEW Flash Player
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
Micro Segmentation for Zero trust security and compliance
1) What is Zero Trust?
2) How does zero trust relate to compliance?
3) Guardicore and Micro Segmentation,
4) YouAttest and Compliance
5) Short Demo and Q&A session
Estimating Development Security Maturity in About an HourPriyanka Aash
The session describes a simple method of estimating a development team’s security maturity, i.e. how well they make a secure software product, by looking at five key factors. The factors and a simple rating system will be shown coupled with real-world samples. Applicable usage scenarios as well as comparison to other security maturity models will be given.
(Source: RSA USA 2016-San Francisco)
Data center networks are reaching a breaking point. What today’s enterprises need is a new solution that reduces network complexity, improves performance, and scale. The HPE FlexFabric portfolio provides an open approach to data center network fabric. This approach enables automated connectivity and is designed to deliver software-defined network services. Join us to hear the latest on FlexFabric.
AI model efficiency is crucial for making AI ubiquitous, leading to smarter devices and enhanced lives. Besides the performance benefit, quantized neural networks also increase power efficiency for two reasons: reduced memory access costs and increased compute efficiency.
The quantization work done by the Qualcomm AI Research team is crucial in implementing machine learning algorithms on low-power edge devices. In network quantization, we focus on both pushing the state-of-the-art (SOTA) in compression and making quantized inference as easy to access as possible. For example, our SOTA work on oscillations in quantization-aware training that push the boundaries of what is possible with INT4 quantization. Furthermore, for ease of deployment, the integer formats such as INT16 and INT8 give comparable performance to floating point, i.e., FP16 and FP8, but have significantly better performance-per-watt performance. Researchers and developers can make use of this quantization research to successfully optimize and deploy their models across devices with open-sourced tools like AI Model Efficiency Toolkit (AIMET).
Presenters: Tijmen Blankevoort and Chirag Patel
Stellar Protocol: What is Stellar and Why It MattersSoroush Pour
An overview of the Stellar protocol (www.Stellar.org), what it allows and why it can reshape financial transactions around the world. We are building a USD gateway on the Stellar network at www.HubbleGateway.com
How to apply security in an agile environment. Using old frameworks in an agile environment fails. By using a new model and an agile aligned security strategy, information security can be integrated into agile development projects.
VRF (Virtual Routing and Forwarding) is a technology that allows multiple instances of a routing table to
co-exist within the same router at the same time. This increases functionality by allowing network paths
to be segmented without using multiple devices. Because traffic is automatically segregated, VRF also
increases network security and can eliminate the need for encryption and authentication. Internet
service providers (ISPs) often take advantage of VRF to create separate virtual private networks (VPNs)
for customers; thus the technology is also referred to as VPN routing and forwarding. Because the
routing instances are independent, the same or overlapping IP addresses can be used without
conflicting with each other.
An introduction to the reference architectures content from the Microsoft patterns & practices team.
This covers common IaaS (infrastructure) and PaaS (managed services) scenarios.
http://aka.ms/architecture
Be sure to read the notes!
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
A description of Azure Key Vault. Why do we need Azure Key Vault where does it fit in a solution. The details of storing keys, secrets and certificate inside of key vault. Using key vault for encryption and decryption of data
How Hess Has Continued to Optimize the AWS Cloud After Migrating - ENT218 - r...Amazon Web Services
Hess Corporation is a leading global independent energy company engaged in exploration for and production of crude oil and natural gas. Early in Hess's journey to the cloud, they operated the AWS platform in a manner similar to how they operated their on-premises data centers, creating a number of challenges. In this session, Hess Corporation discusses how they worked to further optimize their use of the AWS Cloud following their data center migration. They also cover technical strategies implemented to improve security, governance, and financial reporting and examine changes to their corporate culture that encourage innovation while improving cost controls.
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...GoGrid Cloud Hosting
This presentation "Complex Infrastructure Made Easy - Learn About the GoGrid 3.0 Release & Our New East Coast Datacenter" is primarily for current GoGrid customers. The Webinar was recorded on 6/28/10. Presenters were Mario Olivarez & Justin Kitagawa of GoGrid and Ryan Holland of TrendMicro.
The webinar is available here: http://www.vimeo.com/13335979
Topics:
- Overview: Complex Infrastructure Made Easy - GoGrid's unique value proposition
- GoGrid 3.0: The latest version of the GoGrid platform - East Coast demo
- GoGrid Security: New services from Cisco, Fortinet, TrendMicro & Sentrigo
- PCI Compliance: PCI compliance in the GoGrid Cloud - Demo with TrendMicro
- Questions & Answers
Switch to NEW Flash Player
Digital Transformation through Product and Service Innovation - Session Spons...Amazon Web Services
Today large enterprises are under pressure to innovate faster than ever, drive down costs, and deliver increased value to their organisations through more responsive and flexible IT. Organisations that are shifting to a data-driven, insight-powered culture will be in the best position to defend, differentiate and disrupt in their respective industries, potentially expanding their business with new products and revenue sources. Learn how some leading companies are leveraging data – from IoT sources, social sources, enterprise, partners, competitors, and consumers – to unlock new sources of insight.
Speaker: Amit Bansal, Digital Delivery & Analytics Lead, APAC, Accenture
This presentation highlights practical key learnings on operating a global saas cloud. It focuses on the release management approach, core dna elements of saas ops, and new engagement models with product and engineering.
Setting the Foundation for Data Center Virtualization Cisco Canada
Today the Data Centre is at the heart of IT and business innovations. As the Data Centre evolves from a pure cost centre to a strategic asset to achieve business goals, Cisco is evolving our Data Centre Architectural Framework to help accelerate IT Innovations that deliver better business value. Ed Bugnion will explain that to do this successfully it is important to have a reliable and strategic roadmap to establish the DC foundation, the virtualized services that support the key cloud capabilities such as automation, provisioning and metering.
This presentation will discuss Cisco’s distinct approach to collaboration in the cloud, the collaboration applications architecture and the future of the workspace.
Slides from our Lunch n' Learn webinar show how a Cisco Business Edition VOIP phone solution and related collaboration technologies deliver immediate and lasting benefits for companies who are not willing to settle for less than what they need to get the job done. We'll even show you some great financing offers to help make the transition even easier on your budget.
Request link to recording at: http://info.ali-inc.com/UnifiedCommunications_WebinarRegistration.html
This session will provide attendees with an overview of Enterprise Cloud Computing and how technology and service solutions from Cisco will enable to path to private cloud computing. Cloud computing is changing the economics and operations of IT. IT organizations are consolidating IT resources around consistent building blocks, virtualizing those resources to increase efficiency and flexibility, and automating service creation processes.
This presentation looks at the new Borderless Networks solutions that deliver the capabilities you need to transform your business into one that is borderless and future-ready.
Technology Development and Innovation at CiscoCisco Canada
This presentation will cover, how to align your network to the business, delivering innovation-hardware, delivering innovation-software and how to tie it all together.
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCisco Service Provider
Presented by Simon Aspinall, Cisco Senior Director, SP Data Center and Mobility Solutions at Cloud Connect 2011
Cloud provides the appearance of unlimited resources and opens new possibilities for the delivery of services within the enterprise and from service providers to fixed and mobile users. Cisco's approach to the cloud opportunity includes helping to build out the data centers powering the cloud as well as applying capabilities in the network to enable intelligent connectivity within and beyond the data center. Join us to explore how to enable distinctive functionality across a secure, trusted, and ubiquitous platform.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.