Network requirements for enterprise video conferencing include ensuring sufficient bandwidth, deploying QoS to prioritize real-time video and voice traffic, and extending QoS across the entire network including the wireless LAN and WAN. Key aspects that must be addressed are bandwidth calculations and allocation, locating media bridges to minimize WAN usage, and utilizing tools to test and monitor network performance. Security is also critical, requiring a multi-layer approach to protect real-time collaboration applications and data across the wired and wireless network.
Understanding CleanAir Technology to improve Wlan Spectrum Management Cisco Canada
Managing the Radio Frequency and Spectrum is a critical challenge for modern WLAN networks, especially with advanced applications like VoWLAN. This session looks at the theory of operations and best practices for taking advantage of Radio Resource Management and usage of several tools included or available from Cisco like 'Planning Mode' and 'Cisco Spectrum Expert'. This session is updated to reflect new advances contained in release 7.0 of CUWN, like Clean Air, and is of an advanced level.
Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...Gruppo TIM
The document discusses Telecom Italia's strategic plan update. It provides forward-looking statements regarding estimates of future growth across different business lines and the global business. Analysts are cautioned that forward-looking statements are based on assumptions that could prove to be incorrect. The strategic plan focuses on increasing broadband coverage and throughput while increasing capex amounts through investments in access networks, core networks, and IT platforms.
Improving Indoor Coverage How Wi Max Modems Can Play A Major Role In The Subs...Green Packet
With WiMAX indoor traffic taking up more than 80% of total WiMAX traffic, WiMAX Operators are faced with the pressing need to improve indoor coverage. Contrary to common belief that WiMAX Modems are merely variables in the WiMAX subsystem, this whitepaper discusses how WiMAX
Modems can play a major role in the subsystem, particularly in improving indoor coverage.
1) Riverbed is a successful company with over $500 million in annual revenue, half a billion in assets, and over 13,000 customers.
2) The document discusses barriers to cloud computing adoption such as latency issues, security concerns, and lack of standards.
3) Riverbed aims to help customers deliver IT performance for applications both in public and private clouds as well as across WANs connecting different locations.
OSGi + SCA can integrate by having an SCA runtime act as an OSGi distribution provider, allowing OSGi bundles to be used as simple SCA components. The SCA runtime would distribute OSGi services by leveraging OSGi's standardized remote service metadata. This allows OSGi bundles to participate in larger SCA applications alongside other component types while taking advantage of SCA policies and bindings. The presentation discussed the history and specifications of OSGi remote services and SCA, and outlined how the two can be viewed from either an OSGi-centric or SCA-centric perspective.
MASERGY provides premium grade IP bandwidth networks engineered for consistent, superior quality video transmission. The networks allow for high-definition and telepresence video transmission as well as easy migration of data and voice to the same connection. MASERGY's global video networks are backed by strong service level agreements ensuring 100% video packet delivery, guaranteed in-sequence packet delivery, and less than 1ms latency variation.
Blue Coat PacketShaper provides visibility and optimization of network applications through application classification, monitoring, quality of service controls, and compression. It automatically classifies network applications, monitors performance in real time, controls bandwidth with quality of service policies, and increases WAN capacity with compression. PacketShaper supports application delivery networks with deep application visibility and controls to optimize WAN performance.
The document discusses extending data centers with AWS Cloud. It provides context on AWS's global business and experience building web-scale systems. It describes how AWS infrastructure allows elasticity compared to traditional data centers. The agenda covers AWS services, examples, and how to get started.
Understanding CleanAir Technology to improve Wlan Spectrum Management Cisco Canada
Managing the Radio Frequency and Spectrum is a critical challenge for modern WLAN networks, especially with advanced applications like VoWLAN. This session looks at the theory of operations and best practices for taking advantage of Radio Resource Management and usage of several tools included or available from Cisco like 'Planning Mode' and 'Cisco Spectrum Expert'. This session is updated to reflect new advances contained in release 7.0 of CUWN, like Clean Air, and is of an advanced level.
Strategic Outlook - 2009 Results and the 2010-2012 Strategic Plan Update (Cic...Gruppo TIM
The document discusses Telecom Italia's strategic plan update. It provides forward-looking statements regarding estimates of future growth across different business lines and the global business. Analysts are cautioned that forward-looking statements are based on assumptions that could prove to be incorrect. The strategic plan focuses on increasing broadband coverage and throughput while increasing capex amounts through investments in access networks, core networks, and IT platforms.
Improving Indoor Coverage How Wi Max Modems Can Play A Major Role In The Subs...Green Packet
With WiMAX indoor traffic taking up more than 80% of total WiMAX traffic, WiMAX Operators are faced with the pressing need to improve indoor coverage. Contrary to common belief that WiMAX Modems are merely variables in the WiMAX subsystem, this whitepaper discusses how WiMAX
Modems can play a major role in the subsystem, particularly in improving indoor coverage.
1) Riverbed is a successful company with over $500 million in annual revenue, half a billion in assets, and over 13,000 customers.
2) The document discusses barriers to cloud computing adoption such as latency issues, security concerns, and lack of standards.
3) Riverbed aims to help customers deliver IT performance for applications both in public and private clouds as well as across WANs connecting different locations.
OSGi + SCA can integrate by having an SCA runtime act as an OSGi distribution provider, allowing OSGi bundles to be used as simple SCA components. The SCA runtime would distribute OSGi services by leveraging OSGi's standardized remote service metadata. This allows OSGi bundles to participate in larger SCA applications alongside other component types while taking advantage of SCA policies and bindings. The presentation discussed the history and specifications of OSGi remote services and SCA, and outlined how the two can be viewed from either an OSGi-centric or SCA-centric perspective.
MASERGY provides premium grade IP bandwidth networks engineered for consistent, superior quality video transmission. The networks allow for high-definition and telepresence video transmission as well as easy migration of data and voice to the same connection. MASERGY's global video networks are backed by strong service level agreements ensuring 100% video packet delivery, guaranteed in-sequence packet delivery, and less than 1ms latency variation.
Blue Coat PacketShaper provides visibility and optimization of network applications through application classification, monitoring, quality of service controls, and compression. It automatically classifies network applications, monitors performance in real time, controls bandwidth with quality of service policies, and increases WAN capacity with compression. PacketShaper supports application delivery networks with deep application visibility and controls to optimize WAN performance.
The document discusses extending data centers with AWS Cloud. It provides context on AWS's global business and experience building web-scale systems. It describes how AWS infrastructure allows elasticity compared to traditional data centers. The agenda covers AWS services, examples, and how to get started.
SR Telecom & Co. is a leader in broadband wireless access solutions for voice, internet, and enterprise services. Their symmetryMX product family offers optimized solutions for mobile, nomadic, and fixed WiMAX networks based on their scalable CBS5000 base station platform. The CBS5000 provides high performance in a compact form factor, supporting multiple sectors and channels for mobile, nomadic, and fixed applications using a single hardware platform.
SR Telecom & Co. is a leader in broadband wireless access solutions for voice, internet, and enterprise services. Their symmetryMX product family offers optimized solutions for mobile, nomadic, and fixed WiMAX networks based on their scalable CBS5000 base station platform. The CBS5000 provides high performance in a compact form factor, supporting multiple WiMAX standards and allowing operators to deliver a variety of broadband services to mobile, residential and enterprise customers.
V c loudapi_coffeetalk__pimplaskar_may2010Pablo Roesch
The document discusses a webinar on vCloud APIs, including an overview of the vCloud ecosystem and API concepts, a deep dive into the vCloud API and how it relates to vCloud Express, and an upcoming Java library for the vCloud API. The speaker, Prasad Pimplaskar, has over 15 years of experience in enterprise software and currently works on vCloud and vSphere APIs at VMware.
OpenSplice.org is the forge hosting the OpenSplice DDS Open Source Project. This presentation goes into the details of how the community is managed, what are the processes behind release management as well as roadmap planning and technology incubators.
An Applications and Service talk to the Queensland Regional Networking Organi...James Sankar
1) AARNet held three video workshops in Melbourne, Perth, and Brisbane with 70 attendees from research institutions to demonstrate their new Unified Communications Exchange (UCX) service.
2) The UCX allows for video calls beyond individual enterprises through connections via SIP and H.323 protocols and supports features like firewall traversal and IPv6.
3) AARNet has started testing point-to-point and multipoint video calls through the UCX with Monash University, as well as peering with US sites and developing website instructions for joining calls.
This document outlines the agenda for a TalkTalk Business seminar, including presentations on strategic overviews, Next Generation Network product strategies, voice services over NGN, customer testimony, and customer support. There will also be a question and answer session and tour. Presenters include Rob Buckton, Andy Lockwood, Lance Spencer, Ken Bailey, Andy Phillips, and Mark Wiseman. Attendees are encouraged to use the hashtag #TalkTalkBizSeminar on Twitter during the event.
The document provides an overview of the DBS3900 WiMAX product, including its orientation as a distributed WiMAX BTS that complies with IEEE 802.16e standards. It describes the DBS3900's position in the WiMAX network and highlights its advanced BTS platform, wide network coverage through multi-antenna technologies, and ability to improve maintainability and testability while providing large capacity and high quality wireless broadband services.
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...SSA KPI
AACIMP 2010 Summer School lecture. "Information Technologies" stream. "Problems of Contemporary Communication Companies. Ways and Tools for Solving Them" course.
More info at http://summerschool.ssa.org.ua
The document discusses building multi-tenant virtual data centers with Quantum that abstract away physical infrastructure complexity and provide application developers with on-demand, self-service access to compute, storage, and networking resources in a simple and consistent manner across private, public and hybrid clouds. It explores how to achieve the benefits of virtualization without the complexity of underlying physical infrastructure and addresses important questions around abstraction, exposure versus hiding of capabilities, and planning for future innovation.
1) Traditional data center networks are rigid and complex while modern networks are moving toward flexible, virtualized models with shared storage and software-defined services.
2) QFabric is a revolutionary new switch that simplifies data center networking using a single-switch operational model with federated intelligence and a rich edge with a simple core.
3) QFabric comes in two configurations - the QFX3000-G for large cloud and enterprise environments, and the QFX3000-M for mid-sized networks, both providing high performance, resiliency, and simplified management over traditional networks.
Presentation from physical to virtual to cloud emcxKinAnx
The document discusses three paradigm shifts in information technology: 1) From physical to virtual computing as virtualization becomes mainstream, 2) The network becoming the computer through network-centric architectures, 3) Storage evolving from a server-centric to a virtual, flexible model. These shifts are creating an industrialized "cloud computing" platform for intelligent, on-demand delivery of IT services.
Harmonized Security for Multi-network Video ServicesVerimatrix
Verimatrix provides revenue security solutions for multi-network video services across devices. It has over 590 operator customers in over 90 countries protecting over $5 billion in revenue. As video consumption expands across networks and devices, Verimatrix offers an integrated solution with a single security authority to harmonize protection for linear, on-demand and over-the-top services on any screen.
TBIZ2011 - Juniper. Next Generation Data Center TechnologyBIZ
The document discusses next generation data center infrastructure and security requirements. It describes how data center applications have shifted from client-server to service-oriented architectures, changing data flows. The multi-tier legacy network is a barrier due to slow speeds, complexity, and high costs. New solutions like Juniper's QFabric and Virtual Chassis technologies aim to simplify networks and improve performance and scalability. The SRX series of next generation firewalls provide high throughput security for modern data centers.
The document discusses Cisco's WebEx collaboration tools. It describes how WebEx allows for web meetings, communicating, viewing video, recording and archiving meetings, cross-platform access including on smartphones, and its ease of use and affordability. WebEx provides an integrated collaborative workspace for employees and suppliers. The document also discusses how Cisco uses TelePresence to accelerate collaboration in the supply chain and for remote design. TelePresence reduces travel costs and allows for better decision making.
Getting Connected And Trusting The ConnectionSuhaimi Nordin
This document discusses Telekom Malaysia's Multimedia Service Architecture (MASA). MASA has four main components: the core infrastructure, enabling system platform, enabling IP technology, and interactive service platform. It provides an overview of each component and examples of technologies that fall under each. The document emphasizes that MASA is focused on developing a value-chain type of interactive service platform to provide customers a complete one-stop-solution for multimedia services. It also references Telekom Malaysia's strategy to expand into new markets and partnership opportunities through its internet and multimedia services.
The MBR900 is a mobile broadband router that allows up to 30 devices to share an internet connection from a 3G/4G USB modem or wired broadband. It has built-in failover that automatically switches to the USB modem if the wired connection fails, and failback to switch back once the wired connection is restored. It provides security features like VPN, encryption, and firewall at an affordable price for small businesses.
Acme Packet Presentation Materials for VUC June 18th 2010Michael Graves
1) The document discusses Acme Packet's enterprise session border controller (SBC) solutions which control four IP network borders, including SIP trunking, private networks, public internet, and hosted services.
2) It provides an overview of Acme Packet's SBC product portfolio including the Net-Net product family and their session capacity, throughput, and features for securing SIP trunking and enabling interoperability.
3) The SBC helps secure SIP trunking by acting as an application layer gateway, providing dynamic port control, full SIP firewalling, and DDOS protection to establish a "defense in depth" security model for SIP trunk traffic.
Overview presentation I gave back in Nov '03 summarizing some key broadband technologies and related investment strategies. Reflects much of my activity from 2001-2005 that generated 6 venture investment exits and 50%+ IRR.
The document summarizes the ALOHA Load Balancer appliance from Exceliance. It provides load balancing, application delivery, and security services. The appliance is available in various models supporting different throughput, connections, and form factors. It offers high availability, performance optimization, and security features to improve application performance and availability.
SR Telecom & Co. is a leader in broadband wireless access solutions for voice, internet, and enterprise services. Their symmetryMX product family offers optimized solutions for mobile, nomadic, and fixed WiMAX networks based on their scalable CBS5000 base station platform. The CBS5000 provides high performance in a compact form factor, supporting multiple sectors and channels for mobile, nomadic, and fixed applications using a single hardware platform.
SR Telecom & Co. is a leader in broadband wireless access solutions for voice, internet, and enterprise services. Their symmetryMX product family offers optimized solutions for mobile, nomadic, and fixed WiMAX networks based on their scalable CBS5000 base station platform. The CBS5000 provides high performance in a compact form factor, supporting multiple WiMAX standards and allowing operators to deliver a variety of broadband services to mobile, residential and enterprise customers.
V c loudapi_coffeetalk__pimplaskar_may2010Pablo Roesch
The document discusses a webinar on vCloud APIs, including an overview of the vCloud ecosystem and API concepts, a deep dive into the vCloud API and how it relates to vCloud Express, and an upcoming Java library for the vCloud API. The speaker, Prasad Pimplaskar, has over 15 years of experience in enterprise software and currently works on vCloud and vSphere APIs at VMware.
OpenSplice.org is the forge hosting the OpenSplice DDS Open Source Project. This presentation goes into the details of how the community is managed, what are the processes behind release management as well as roadmap planning and technology incubators.
An Applications and Service talk to the Queensland Regional Networking Organi...James Sankar
1) AARNet held three video workshops in Melbourne, Perth, and Brisbane with 70 attendees from research institutions to demonstrate their new Unified Communications Exchange (UCX) service.
2) The UCX allows for video calls beyond individual enterprises through connections via SIP and H.323 protocols and supports features like firewall traversal and IPv6.
3) AARNet has started testing point-to-point and multipoint video calls through the UCX with Monash University, as well as peering with US sites and developing website instructions for joining calls.
This document outlines the agenda for a TalkTalk Business seminar, including presentations on strategic overviews, Next Generation Network product strategies, voice services over NGN, customer testimony, and customer support. There will also be a question and answer session and tour. Presenters include Rob Buckton, Andy Lockwood, Lance Spencer, Ken Bailey, Andy Phillips, and Mark Wiseman. Attendees are encouraged to use the hashtag #TalkTalkBizSeminar on Twitter during the event.
The document provides an overview of the DBS3900 WiMAX product, including its orientation as a distributed WiMAX BTS that complies with IEEE 802.16e standards. It describes the DBS3900's position in the WiMAX network and highlights its advanced BTS platform, wide network coverage through multi-antenna technologies, and ability to improve maintainability and testability while providing large capacity and high quality wireless broadband services.
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...SSA KPI
AACIMP 2010 Summer School lecture. "Information Technologies" stream. "Problems of Contemporary Communication Companies. Ways and Tools for Solving Them" course.
More info at http://summerschool.ssa.org.ua
The document discusses building multi-tenant virtual data centers with Quantum that abstract away physical infrastructure complexity and provide application developers with on-demand, self-service access to compute, storage, and networking resources in a simple and consistent manner across private, public and hybrid clouds. It explores how to achieve the benefits of virtualization without the complexity of underlying physical infrastructure and addresses important questions around abstraction, exposure versus hiding of capabilities, and planning for future innovation.
1) Traditional data center networks are rigid and complex while modern networks are moving toward flexible, virtualized models with shared storage and software-defined services.
2) QFabric is a revolutionary new switch that simplifies data center networking using a single-switch operational model with federated intelligence and a rich edge with a simple core.
3) QFabric comes in two configurations - the QFX3000-G for large cloud and enterprise environments, and the QFX3000-M for mid-sized networks, both providing high performance, resiliency, and simplified management over traditional networks.
Presentation from physical to virtual to cloud emcxKinAnx
The document discusses three paradigm shifts in information technology: 1) From physical to virtual computing as virtualization becomes mainstream, 2) The network becoming the computer through network-centric architectures, 3) Storage evolving from a server-centric to a virtual, flexible model. These shifts are creating an industrialized "cloud computing" platform for intelligent, on-demand delivery of IT services.
Harmonized Security for Multi-network Video ServicesVerimatrix
Verimatrix provides revenue security solutions for multi-network video services across devices. It has over 590 operator customers in over 90 countries protecting over $5 billion in revenue. As video consumption expands across networks and devices, Verimatrix offers an integrated solution with a single security authority to harmonize protection for linear, on-demand and over-the-top services on any screen.
TBIZ2011 - Juniper. Next Generation Data Center TechnologyBIZ
The document discusses next generation data center infrastructure and security requirements. It describes how data center applications have shifted from client-server to service-oriented architectures, changing data flows. The multi-tier legacy network is a barrier due to slow speeds, complexity, and high costs. New solutions like Juniper's QFabric and Virtual Chassis technologies aim to simplify networks and improve performance and scalability. The SRX series of next generation firewalls provide high throughput security for modern data centers.
The document discusses Cisco's WebEx collaboration tools. It describes how WebEx allows for web meetings, communicating, viewing video, recording and archiving meetings, cross-platform access including on smartphones, and its ease of use and affordability. WebEx provides an integrated collaborative workspace for employees and suppliers. The document also discusses how Cisco uses TelePresence to accelerate collaboration in the supply chain and for remote design. TelePresence reduces travel costs and allows for better decision making.
Getting Connected And Trusting The ConnectionSuhaimi Nordin
This document discusses Telekom Malaysia's Multimedia Service Architecture (MASA). MASA has four main components: the core infrastructure, enabling system platform, enabling IP technology, and interactive service platform. It provides an overview of each component and examples of technologies that fall under each. The document emphasizes that MASA is focused on developing a value-chain type of interactive service platform to provide customers a complete one-stop-solution for multimedia services. It also references Telekom Malaysia's strategy to expand into new markets and partnership opportunities through its internet and multimedia services.
The MBR900 is a mobile broadband router that allows up to 30 devices to share an internet connection from a 3G/4G USB modem or wired broadband. It has built-in failover that automatically switches to the USB modem if the wired connection fails, and failback to switch back once the wired connection is restored. It provides security features like VPN, encryption, and firewall at an affordable price for small businesses.
Acme Packet Presentation Materials for VUC June 18th 2010Michael Graves
1) The document discusses Acme Packet's enterprise session border controller (SBC) solutions which control four IP network borders, including SIP trunking, private networks, public internet, and hosted services.
2) It provides an overview of Acme Packet's SBC product portfolio including the Net-Net product family and their session capacity, throughput, and features for securing SIP trunking and enabling interoperability.
3) The SBC helps secure SIP trunking by acting as an application layer gateway, providing dynamic port control, full SIP firewalling, and DDOS protection to establish a "defense in depth" security model for SIP trunk traffic.
Overview presentation I gave back in Nov '03 summarizing some key broadband technologies and related investment strategies. Reflects much of my activity from 2001-2005 that generated 6 venture investment exits and 50%+ IRR.
The document summarizes the ALOHA Load Balancer appliance from Exceliance. It provides load balancing, application delivery, and security services. The appliance is available in various models supporting different throughput, connections, and form factors. It offers high availability, performance optimization, and security features to improve application performance and availability.
Blue Coat PacketShaper provides visibility and optimization of network applications through application monitoring, traffic shaping, and compression. It automatically classifies network applications, provides quality-of-service controls, and increases WAN capacity. PacketShaper supports application delivery networks through deep application visibility and controls to optimize WAN performance.
This document provides an overview and biography of Brady Volpe, an expert in cable networking. It discusses his over 20 years of experience working with cable infrastructure equipment and protocols. The rest of the document focuses on introducing concepts related to DOCSIS 3.0 networking standards, including channel bonding, modulation techniques, and advanced troubleshooting of downstream and upstream issues.
The document discusses the evolution of data centers towards virtualization and cloud computing. It highlights how technologies like the x86 platform and VMWare have enabled this change, and how networking, computing and storage systems need to evolve as well to support increased virtualization. This includes improvements in areas like virtual network integration, higher bandwidth connectivity, storage unification, faster provisioning times, and virtual desktop solutions. The network is positioned as the platform enabling these changes in virtualized data centers.
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesCisco Mobility
Learn how to plan evaluate and implement wireless in demanding high density environments such as lecture halls classrooms and auditoriums. Learn how to evaluate end user throughput requirements and translate this into the number of channels required. Learn how to manage cell size co-channel interference and successfully apply these principles using Cisco´s Unified Wireless Network. Learn More: http://www.cisco.com/go/wireless
The PA-5000 Series is Palo Alto Networks' next-generation firewall that provides high performance network security across multiple platforms. The series includes the PA-5020, PA-5050, and high-end PA-5060 models, which can handle 5-20Gbps of throughput. The firewalls tightly integrate application, user, and content identification technologies to enable granular visibility and control over network traffic.
Supporting Real-time Traffic: Preparing Your IP Network for ...Videoguy
This document provides guidance on preparing an IP network to support real-time video conferencing traffic. It discusses how real-time traffic differs from typical data traffic in terms of bandwidth utilization and sensitivity to delay and packet loss. It recommends implementing Quality of Service (QoS) using Differentiated Services across the network to prioritize real-time traffic. The document also covers classifying and managing bandwidth demand, and testing and monitoring the network to support video conferencing.
1. The document contains technical specifications and service details related to TOT's 3G and next generation network (NGN) rollout plans, call center operations, and corporate social responsibility programs.
2. Key points include details on expanding 3G coverage nationwide, migrating to NGN infrastructure, services offered through call centers and websites, and youth programs promoting green IT and volunteerism.
3. The document outlines TOT's strategic goals and initiatives across multiple business units to enhance connectivity services and digital inclusion through technology and community engagement.
This lecture covered networking architecture and distributed systems. It discussed tiered network architectures with multiple layers like middleware and client/server models. Design requirements for distributed systems include performance, quality of service, dependability, scalability, reliability and security. The lecture also covered different types of networks like PAN, LAN, WAN, MAN, and wireless networks. It compared characteristics of different networks and discussed network principles such as transmission modes, switching schemes, protocols, and routing.
The document discusses how WAN virtualization and colocation facilities can enable enterprises to build reliable hybrid cloud networks at lower costs. WAN virtualization provides significantly more bandwidth at lower prices by combining multiple internet connections. Colocation allows enterprises to centralize network complexity while maintaining performance. This transforms the enterprise WAN and provides an evolutionary path for enterprises to leverage both private and public cloud computing.
The document discusses how WAN virtualization and other technologies can enable enterprises to build next-generation WAN architectures and leverage cloud computing in a practical, evolutionary manner. WAN virtualization provides massive bandwidth increases at much lower costs and greater reliability compared to traditional WANs. These technologies provide a reliable, hybrid cloud networking solution that allows enterprises to consolidate infrastructure and benefit from both private and public cloud services.
This document provides a summary of specifications and features for various Palo Alto Networks platform models - PA-4060, PA-4050, PA-4020, PA-2050, PA-2020, and PA-500. It includes details on their throughput and capacity for firewall, threat prevention and IPSec VPN, as well as hardware specifications and key features supported across all platforms such as application identification, policy-based controls, SSL/IPSec VPN, file/data filtering, and high availability.
The document provides a table comparing different configurations for wide area networks (WANs) and local area networks (LANs) in terms of their suitability for Voice over Internet Protocol (VoIP) phone systems. For WANs, dedicated and managed connections like MPLS are best, while consumer DSL or wireless are poor. For LANs, fully managed switches, quality of service, and CAT5/6 wiring are best, while unmanaged equipment and CAT3 wiring are poor. The document advises having a professional network assessment before deploying VoIP.
The document discusses how Provider Backbone Bridging (PBB) can help address scaling challenges in service provider Ethernet networks. PBB introduces a backbone MAC and service identifier tag that encapsulates customer traffic. This allows hiding customer MAC addresses within the network core and provides up to 16 million service instances. The document explains how PBB can be used on its own in native Ethernet networks or combined with Hierarchical Virtual Private LAN Service (H-VPLS) to reduce the number of label switched paths and pseudowires needed for large VPLS implementations.
The document discusses how Provider Backbone Bridging (PBB) can help address scaling challenges in service provider Ethernet networks. PBB introduces a backbone MAC and service identifier tag that encapsulates customer traffic. This allows hiding customer MAC addresses within the network core and provides up to 16 million service instances. The document explains how PBB can be used on its own in native Ethernet networks or combined with Hierarchical Virtual Private LAN Service (H-VPLS) to reduce the number of label switched paths and pseudowires needed for large VPLS implementations.
This document discusses cloud computing and the Cisco Nexus 5500 series switches. It defines cloud computing and lists its key characteristics as on-demand access, access over the internet/network, pooling of resources independent of location, elasticity, and measurable service. It also discusses different cloud service models (SaaS, PaaS, IaaS) and deployment models (public, private, hybrid, virtual private). The document then focuses on the Cisco Nexus 5500 series switches, outlining their scalability, performance, versatility, and flexibility features like unified ports. It introduces new expansion modules and routing capabilities for the Nexus 5500 platform.
This document describes a proposed Wi-Fi solution for the Northern Railways headquarters office by Nexgen Techtronics. The current network has issues like internet backbone failures, poor performance, lack of redundancy and management. The proposed solution uses Ruckus ZoneFlex 802.11n systems with adaptive antenna technology for better coverage, performance and reliability. It will implement a centralized managed wireless LAN with secure guest access and future support for voice, data and video applications over Wi-Fi. Point-to-point radio links and a load balancer will provide network redundancy.
This document describes AscenFlow's intelligent WAN traffic management products for optimizing bandwidth resources across networks. It provides specifications for various AscenFlow models including supported bandwidth, connections, classes, ports, features like traffic shaping for QoS and monitoring. The models range from smaller branch office solutions to larger enterprise solutions handling up to 10 Gbps of bandwidth.
Similar to Deep dive network requirementsfor enterprise video conferencing (20)
The document discusses key decisions that need to be made before adopting cloud computing. It introduces a panel of experts on the topic, including an InformationWeek Analytics director, a CTO, and an IT director. It also shares the results of an InformationWeek poll which found that 42% of organizations are already moving forward with cloud adoption, while 30% currently have no plans to adopt cloud services.
The document discusses the status and outlook of 4G mobile networks including WiMAX and LTE. It notes that Clearwire has deployed mobile WiMAX in many US markets and plans further expansion. Sprint and some cable companies use Clearwire's network. Trials of LTE are underway in 2010 with deployments planned for 2011 at AT&T and Verizon. The global 4G infrastructure market is expected to reach $5 billion by 2013. Key issues for 4G include spectrum availability, driving consumer demand, and the role of devices and services in adoption.
This document summarizes a presentation on migrating from Windows XP to Windows 7. It discusses the main factors driving migration to Windows 7 like the end of support for XP and improved security in Windows 7. It also shows survey results on adoption plans and top concerns around testing and compatibility. The presentation examines deployment options and integrating Windows 7 with Windows Server 2008 R2 features. It encourages audiences to start testing Windows 7 and develop migration timelines rather than procrastinating on the transition.
Overview and current topics in solid state storageInterop
This document provides an overview of solid state storage, including what it is, the economics of SSD compared to rotating disks, different SSD architectures, and current topics related to enterprise adoption. It discusses how SSD can help address the long-standing "I/O problem" by providing much faster access times than HDDs. While SSD capacity and cost per gigabyte are improving, rotating disks still have an advantage in those areas. The document surveys various SSD form factors and technologies and how SSDs are being incorporated into storage hierarchies using tiering approaches.
Outsourcing it security yes, it’s still your problemInterop
The document discusses outsourcing IT security. It notes that outsourcing is common now and companies must decide when, not if, to outsource. When outsourcing, companies must select the right provider, establish who is in control, own the risks, architect the right solution, maintain flexibility, manage SLAs, balance needs, establish governance through collaboration, consider the provider part of the team, and realize governance has costs. The key messages are that outsourcing is normal now and companies must thoughtfully partner with providers while maintaining ownership of security.
The document discusses the challenges of current local area networks (LANs) and outlines a vision for next generation LAN infrastructure. It notes shortcomings of Ethernet like lossiness and inefficient topologies. Wireless LANs are crowded and aggregation points create choke points. Key challenges for nextgen LANs are more efficient usage of technologies like TRILL and MPLS in the LAN, improved mobility with 802.11n, higher speeds like 10Gbps Ethernet, and adaptability through standards like DCB. The document provides examples of 10Gbps adoption and advocates for open standards.
The next generation of vulnerability management will integrate disparate enterprise data sources to better correlate vulnerabilities. It will collect and normalize data from vulnerability assessment scanners and asset inventory systems to get a unified view of enterprise assets and vulnerabilities. This will allow intelligently connecting related information from security information and event management, data loss prevention, application scanners, and other monitoring tools to help detect zero-day threats. A 3-step process begins with gathering and standardizing vulnerability and asset data across the organization.
The National Institute of Standards and Technology (NIST) has developed a process to help cloud computing systems interoperate with each other more seamlessly. The process involves establishing common standards for key components like data formats, application programming interfaces, and security. By adopting these standards, cloud providers can build interoperable systems that allow data and applications to be more easily transferred between platforms.
Mobile security new challenges practical solutionsInterop
Mobile security is a growing challenge as smartphones become more popular in the enterprise. Security has not kept pace with the rise of smartphones, leaving companies' data at risk. While laptop security is strong, smartphones like the iPhone sometimes have laxer security policies. Going forward, enterprises want locked-down smartphones with only approved apps and settings that can be easily reset if needed. A panel discusses these issues and potential solutions from Blackberry, Symantec, Kaspersky Lab, and Trend Micro.
Mobile devices are increasingly powerful, connected, and vulnerable to attacks. As more data moves to mobile, it is exposed to greater risks outside of typical enterprise protections. New threats will continue to emerge targeting the latest mediums of information exchange, like social networks and mobile devices. While mobility provides advantages, organizations must implement proper security measures like encryption, authentication, firewalls, and antivirus to safeguard data on devices and in transit.
The document outlines strategies for mobile application development. It discusses competing mobile platforms like Android, BlackBerry, iPhone, and Windows Mobile. It also summarizes potential application architectures like native, web, and hybrid development. Third-party development frameworks like WebKit, Titanium, and RhoMobile are presented. The document concludes with best practices for mobile development and how to drive ROI.
This document discusses managing virtual environments and the challenges organizations face. It identifies common pain points such as backup difficulties, storage challenges, and troubleshooting performance issues. The document also examines barriers to virtualizing business-critical applications like lack of support, performance concerns, and budget constraints. Finally, it notes the rapidly changing virtualization management landscape and challenges of ensuring successful growth while managing both physical and virtual infrastructures.
This document discusses managing change in the data center network as it transitions to a more virtualized environment. It provides a brief history of computing eras from mainframes to today's virtual era. It then discusses the need for data center network management to change to address challenges of legacy networks in supporting virtualization and scale. Specifically, it argues that next generation data center networks require automation, dynamic resource optimization, and unified infrastructure management. The document proposes Dell's Advanced Infrastructure Manager as a way to unify management of compute, storage and networking infrastructure from a single console. It also discusses emerging technologies like iSCSI, FCoE, and DCB that can help data centers transition while maintaining investment in current technologies.
Managing a public cloud involves three main roles: end users, developers, and infrastructure/datacenter managers. It presents challenges including maintaining security and reliability across devices for users, resources for developers, and leveraging remote services like performance and availability for managers. Providers offer enterprises, mid-market businesses, and consumers core capabilities like shared infrastructure, billing, and monitoring. Managing the cloud requires provisioning, processing, storing, and securing data across servers, applications, and compliance frameworks. Developing an integrated service catalog and managing across technical and business domains with multiple partners is key.
This document discusses using behavior analysis to improve security by examining how users can be manipulated through social engineering. It argues that traditional security focuses only on technical threats and misses underlying human vulnerabilities. Behavioral analysis could help predict human actions, as is already done in spam filtering and targeted advertising. Game theory models how individuals might rationally interact and could guide analysis. The document raises ethical questions around using deep behavioral data optimization but argues it may be needed to keep up with evolving threats.
Extending the lifecycle of your storage area networkInterop
This document discusses techniques for extending the lifecycle of a Storage Area Network (SAN). It begins by providing context on IT spending breakdowns and the growth of the iSCSI market. Key considerations for network storage are then outlined, including price, reliability, scalability, performance, flexibility, and ease of management. Virtual storage approaches are presented as a way to lower costs, improve performance, and increase flexibility. Methods for extending the life of a SAN discussed include extended warranty options, hardware upgrades, firmware upgrades, ensuring performance and connectivity for future needs, and using volume virtualization. The document then profiles D-Link's xStack iSCSI SAN arrays and provides a case study of Luce Forward implementing a D-Link solution. It
Desktop virtualization primer one size does not fit allInterop
This document summarizes a presentation about virtual desktop delivery and application strategies. It discusses how one size does not fit all when it comes to virtualization strategies. It covers definitions of desktop and application virtualization and different virtualization architectures. Key considerations for virtual desktop strategies are also outlined.
The document discusses best practices for desktop virtualization. It categorizes users into five groups - task workers, remote workers, guest workers, office workers, and mobile workers - and identifies common requirements and suitable delivery technologies for each. The key recommendations are to start by targeting a specific user segment, choose the proper delivery method for that segment, understand associated infrastructure needs, scale solutions gradually, and consider return on investment between capital and operational expenditures.
Deep dive why networking must fundamentally changeInterop
The document discusses how networking in data centers must fundamentally change to adapt to virtualization and growth in storage. Legacy physical networks are challenging to manage at scale and cannot keep up with modern demands, while next generation virtualized networks provide scalability, flexibility, and automation. The document argues that instead of replacing legacy networks, data centers need unified infrastructure management across computing, storage, and networking to efficiently orchestrate flexible infrastructure and realize performance and economic benefits.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
15. UC becomes a network app…
…And in doing so exposes its soft underbelly
Old Approach New Approach
• Offered physical security – • UC apps exposed to TCP/IP security
risks on data networks
only commonality is at the
physical level • DoS, Eavesdropping
(VOMIT), Spoofing, VoIP 15
16. Voice and Video Collaboration
Requires more intelligence in wiring closets
RADI
US VLAN, QoS ?
Multi-service applications creates new challenges
1. How to securely authenticate multiple devices on a port ?
2. How to easily deploy device configuration ?
3. How to proactively monitor and deliver a reliable network ?
4. How to demonstrate regulatory compliance ?
Convergence requires more intelligence and control at the
edge where users and devices connect
16
17. What organizations need today
1. Leverage capabilities in the network
• More security with less complexity
2. Enable network access control
• Mitigate fraud & DoS attacks, by allowing
only trusted clients onto the network
3. Protect the entire wired & wireless
network, not just a few strategic
points
• Unified secure wire & wireless
management
4. Provide automated network
response to security attacks
• Assure uninterrupted real-time services
17
18. Multimedia Security Requirements
Layer 2 Hardening
• Secure management access (SSHv2, SSL, SNMPv3, TACACS+, etc)
• Prevent man-in-the-middle attacks (ARP inspection, IP lockdown, DHCP)
Network Access Control (NAC / NAP)
• Multi-User, Multi-Role Access Control (802.1X, Web-auth, MAC-auth)
• Port-based policy based on centrally deployed NAC / RADIUS
QoS & Bandwidth Limits
• Flexible QoS policy engine, with ability to remark 802.1p/DSCP for trust
• Guaranteed minimums, maximum bandwidth to limit problem clients
Layer 3
• Granular, flexible Access Control List (ACL) policy engine at full wire speed
• Best-in-breed threat management solutions distributed within the network
Network Resiliency
• Leverage built-in DoS prevention features to limit effect of attacks
• Monitoring technologies, such as sFlow, for broad security visibility
18
19. VoIP Security Summary
Business Needs Security Solution
Maximize
availability • Use multi-layer security approach to
protect the entire network
Regulatory
compliance
• Log and report network access …
Users, phones, dates/times, usage
Investment
protection • Use best-in-breed solutions based on
open industry standards
Affordability • Leverage security within network
devices, to minimize costs
19
28. Enterprise Video Network Trends
Video has doubled from 2 years ago and expected to double again
a year from now
Companies are likely to say they will spend more on video
conferencing, Telepresence, and digital security cameras
Expected spending on video
applications in the next year
Median percent of total network traffic that is video 100
90
Will spend
30 more
80
Will spend
25 70
about the
60
same
20 Will spend
50
less
15 Will not spend
40
10 30
Don't know
20
5
10
0
Two years Last year Current Expected in Expected in 0
ago one year two years e ng video e eras all
nc enci ag oc
se g ign cam ick t
re fer in
tal
s ty
cl
lep con tream igi ecu
ri at/
Source: Cisco Business video study — December, 2009 Te eo op s D s ch
Vid skt git
al eo
De Di Vid
28
29. Business Video
Increasing demands on the network
Streaming Digital Media Telepresence
Bandwidth Bandwidth
5 0
50
4 0
40
3 0
30
2 0
Concurrent Sessions Latency,Loss,Jitter
20
1 0
Concurrent Sessions Latency,Loss,Jitter
10
0
0
Dynamic Sessions Multicast Dynamic Sessions Multicast
Digital Signage TelePresence
Video on Demand Conferencing
IP Video Surveillance Desktop Collaboration
Bandwidth
Bandwidth 50
50
40
40
30
30
20
20
Concurrent Sessions Latency,Loss,Jitter
Concurrent Sessions Latency,Loss,Jitter 10
10
0
0
Dynamic Sessions Multicast Dynamic Sessions Multicast
Collaboration
IP Video Surveillance CCTV
WebCam
29
30. Enterprise Video Services
Medianet Architecture
webex
Cisco Video & Voice Applications • End-to-End
Medianet Service Interface APIs Architecture
Enable Rich Optimize User
Media Experience • Intelligent
Solutions
Multicast NetFlow Media Monitoring endpoints/apps
Media Aware
Routing RSVP integrated with
the intelligent
SAF
IPSLA network
Content virtualization PfR QoS Media Optimization
• Any device,
anywhere
• Optimized
Seamless Security
experience
30
31. Cisco Catalyst QoS Model
QoS is overlooked/challenged with Gig/10G Networks
Stack Egress
Policer Marker Ring Queues
Ingress
Policer Marker Queues
Traffic Classify SRR SRR
Policer Marker
Policer Marker
Ingress Egress
Ingress Queue/ Egress Queue/
Schedule Schedule
Classification Policing Marking
Congestion Congestion
Control Control
• Inspect • Act on
• Ensure • SRR (vs WRR) or shaped
policer • Two queues/port
incoming conformance to servicing
decision • One queue is
packets based a specified rate • Egress queue shaping
• Reclass or configurable for
on ACLs or on an • Egress port rate limiting
drop strict priority
policy aggregate or
out-of-policy servicing
individual flow SRR Benefits:
packets • WTD for
basis Balanced traffic flow to
congestion control
prevent high priority queues
(three thresholds
impacting low priority queues
per queue)
• SRR to service
queues
31
32. Network Traffic vs. Network Capacity
Network
Traffic
Network
Capacity
Overprovisioning Congestion Control Admission Control
Adjust network capacity Adapt elastic traffic flows Reject traffic flows that
to accommodate peak to their share of network exceed network capacity
traffic capacity or violate policy
32
33. Cisco’s CAC Solution
Policy and Differentiation
by Media Type by Call Type + User Type
Direction
Call Room
Voice Video Internal Center Trader Desktop System Telepresence
Voice Voice Voice Video Video Video
33
34. Service Advertisement Framework (SAF)
Simplifying Service Routing with “Call Control Discovery”
Call Agent Call Agent Call Agent Call Agent
Call Agent
Call Agent
Call Agent
Call Agent Configuration
Call Agent
Call Agent
Call Agent
Call Agent
complexity,
IP Network Speed of
IP Network Call Agent G
K
GK
Call Agent
Call Agent Call Agent
deployment
Call Agent
Call Agent
Call Agent
Call Agent
High
Toda
Call Agent
Call AgentCall Agent
Call Agent Call Agent
Call AgentCall Agent
Call Agent
operational
y ith
W costs, TCO
Call Agent Call Agent
Call Agent
Call agents discover each other
SAF Call Agent
Availability,
through the SAF network by:
Consume
Advertise
Call Agent
Call Agent Business
Advertising their call control service
SAF-enabled Call Agent
Continuity
Requesting call control services
Call Agent
IP Network Call agents dynamically route calls to
Call Agent
Call Agent remote destinations based on received
Call Agent
advertisements
Call Agent
Call AgentCall Agent
34
35. Packet Loss & Video Impairment Test
50/500 ms network outage causes 500/1000 ms impairment
Video streams impacted 2-10X longer than network outages
35
36. HA Design Considerations
L2/L3 rapid convergence, RSTP and nonstop
forwarding, for network disruptions
Resilience via Cross-stack EtherChannel to mitigate
switch failover
36
37. Medianet: Making the Video Experience
Resource Reservation and Prioritization, QoS, Context-Aware
Poor Collaboration Experience High Quality, Real-Time Video
High Business Travel Cost Collaboration, Sports Blocked
CEO M&A CEO M&A
Meetin NegotiatioSports Meetin NegotiatioSports
g n Event g n Event
Global Business,
WW Offices
Introducing: Medianet on Catalyst switching and ISR portfolio
37