The APIC Enterprise Module provides a single point of control to simplify the operation of your enterprise network. The heart of the controller is a rich policy engine that translates higher order business intent into network configuration. The controller exposes a rich REST based API to allow other applications to take advantage capabilities of the controller and unlock the power of the underlying network infrastructure. This session will present the basic constructs of the controller such as the policy engine, and the capabilities of the REST API. There will be examples of how these capabilities can be integrated into other applications to simplify operations, improve security and enhance user experience.
The APIC Enterprise Module provides a single point of control to simplify the operation of your enterprise network. The heart of the controller is a rich policy engine that translates higher order business intent into network configuration. The controller exposes a rich REST based API to allow other applications to take advantage capabilities of the controller and unlock the power of the underlying network infrastructure. This session will present the basic constructs of the controller such as the policy engine, and the capabilities of the REST API. There will be examples of how these capabilities can be integrated into other applications to simplify operations, improve security and enhance user experience. Taught by Adam Redford.
This document provides an overview of the APIs available in the APIC-EM platform. It discusses tools for accessing the APIs, authentication, and gives examples of accessing inventory, topology, path trace, and plug-and-play APIs. The document provides API endpoints and examples of the JSON response for common requests. It also outlines the relationships between different API resources and services available in APIC-EM like IWAN and policy that utilize the northbound REST APIs.
A session in the DevNet Zone at Cisco Live, Berlin. APIC-EM is an SDN controller is for enterprise campus and WAN devices. This session will cover the API's for inventory, topology, Path Visualization, Network Plug and Play (PnP), Intelligent WAN (IWAN) will be covered. The IWAN API allow policy based modification of application QoS and WAN path selection.
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
The document discusses Cisco's Application Policy Infrastructure Controller Enterprise Module (APIC-EM). It provides:
1) An overview of the APIC-EM architecture, which includes Cisco and third party applications, a network information database, policy infrastructure, and automation interfaces to simplify network management and expose network intelligence.
2) Examples of APIC-EM applications like path visualization, policy analysis, EasyQoS, Intelligent WAN, and Network Plug and Play that provide simplified management of networks, applications, and policies through an intuitive user interface and programming interfaces.
3) Details on how APIC-EM can integrate with Cisco Call Manager to dynamically insert and remove access control lists for voice and video calls to prioritize that traffic
Automation is integral to Cisco® Application Centric Infrastructure (ACI). Learn about the basic concepts necessary to begin effectively using the programmatic features of Cisco ACI. The session begins with an overview of the Cisco ACI object model, which describes how the system interprets configuration and represents state to internal and external entities. The Representational State Transfer (REST) API provides the means necessary to manipulate the object store, which contains the configured state of the Cisco Application Policy Infrastructure Controller (APIC) using the object model as the metadata definition. The session also covers the Cisco APIC software development kit (SDK) uses the REST API to read and write the configuration of Cisco APIC, using the object model to describe the current and desired states.
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) is a software controller that automates and simplifies network configuration, provisioning, and management. APIC-EM SDN controller auto-translates business policy into network device-level policy and can enable policy enforcement across an end-to-end network.</p>
<p>The APIC EM is highly programmable through open APIs allowing customers and developers to create innovative network services and applications to fuel business growth.</p>
<p>During this lab, participants will install the controller followed by hands-on experience on multiple SDN applications including inventory, discovery, topology, policy, path visualization, EasyQoS (both static and dynamic) and Secure Network Plug and Play (for zero touch deployment). Participants will also have the opportunity to visualize the IWAN App. Lastly, participants will experience the programmability aspects of APIC-EM by leveraging Swagger and Chrome Postman scripting.</p>
<p>The first version of this lab was created and delivered by the speakers at Cisco Live Berlin. This second and enhanced version of this lab will be available for Cisco Connect Toronto and Cisco Live Las Vegas.
Présentation cisco aci in action fundamentals - fcouderc - v6Dig-IT
This document discusses using Cisco Application Centric Infrastructure (ACI) to configure a pre-production environment for testing a new application. It shows how ACI provides visibility of virtual machines, creates dedicated port groups for application tiers, and segments traffic between tiers through endpoint groups and contracts. This reduces complexity compared to traditional network configurations. The document also explains how the same ACI configuration can easily move the application environment into production.
The APIC Enterprise Module provides a single point of control to simplify the operation of your enterprise network. The heart of the controller is a rich policy engine that translates higher order business intent into network configuration. The controller exposes a rich REST based API to allow other applications to take advantage capabilities of the controller and unlock the power of the underlying network infrastructure. This session will present the basic constructs of the controller such as the policy engine, and the capabilities of the REST API. There will be examples of how these capabilities can be integrated into other applications to simplify operations, improve security and enhance user experience. Taught by Adam Redford.
This document provides an overview of the APIs available in the APIC-EM platform. It discusses tools for accessing the APIs, authentication, and gives examples of accessing inventory, topology, path trace, and plug-and-play APIs. The document provides API endpoints and examples of the JSON response for common requests. It also outlines the relationships between different API resources and services available in APIC-EM like IWAN and policy that utilize the northbound REST APIs.
A session in the DevNet Zone at Cisco Live, Berlin. APIC-EM is an SDN controller is for enterprise campus and WAN devices. This session will cover the API's for inventory, topology, Path Visualization, Network Plug and Play (PnP), Intelligent WAN (IWAN) will be covered. The IWAN API allow policy based modification of application QoS and WAN path selection.
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
The document discusses Cisco's Application Policy Infrastructure Controller Enterprise Module (APIC-EM). It provides:
1) An overview of the APIC-EM architecture, which includes Cisco and third party applications, a network information database, policy infrastructure, and automation interfaces to simplify network management and expose network intelligence.
2) Examples of APIC-EM applications like path visualization, policy analysis, EasyQoS, Intelligent WAN, and Network Plug and Play that provide simplified management of networks, applications, and policies through an intuitive user interface and programming interfaces.
3) Details on how APIC-EM can integrate with Cisco Call Manager to dynamically insert and remove access control lists for voice and video calls to prioritize that traffic
Automation is integral to Cisco® Application Centric Infrastructure (ACI). Learn about the basic concepts necessary to begin effectively using the programmatic features of Cisco ACI. The session begins with an overview of the Cisco ACI object model, which describes how the system interprets configuration and represents state to internal and external entities. The Representational State Transfer (REST) API provides the means necessary to manipulate the object store, which contains the configured state of the Cisco Application Policy Infrastructure Controller (APIC) using the object model as the metadata definition. The session also covers the Cisco APIC software development kit (SDK) uses the REST API to read and write the configuration of Cisco APIC, using the object model to describe the current and desired states.
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) is a software controller that automates and simplifies network configuration, provisioning, and management. APIC-EM SDN controller auto-translates business policy into network device-level policy and can enable policy enforcement across an end-to-end network.</p>
<p>The APIC EM is highly programmable through open APIs allowing customers and developers to create innovative network services and applications to fuel business growth.</p>
<p>During this lab, participants will install the controller followed by hands-on experience on multiple SDN applications including inventory, discovery, topology, policy, path visualization, EasyQoS (both static and dynamic) and Secure Network Plug and Play (for zero touch deployment). Participants will also have the opportunity to visualize the IWAN App. Lastly, participants will experience the programmability aspects of APIC-EM by leveraging Swagger and Chrome Postman scripting.</p>
<p>The first version of this lab was created and delivered by the speakers at Cisco Live Berlin. This second and enhanced version of this lab will be available for Cisco Connect Toronto and Cisco Live Las Vegas.
Présentation cisco aci in action fundamentals - fcouderc - v6Dig-IT
This document discusses using Cisco Application Centric Infrastructure (ACI) to configure a pre-production environment for testing a new application. It shows how ACI provides visibility of virtual machines, creates dedicated port groups for application tiers, and segments traffic between tiers through endpoint groups and contracts. This reduces complexity compared to traditional network configurations. The document also explains how the same ACI configuration can easily move the application environment into production.
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
Cisco IP Video Surveillance Design GuideJoel W. King
This document provides a summary of Cisco's IP Video Surveillance Design Guide, which outlines best practices and configurations for deploying Cisco's IP video surveillance solution. The guide covers components of an IP video surveillance system, planning and design considerations, product selection, implementation and configuration guidance. It includes examples of network diagrams, router configurations, and quality of service configurations to optimize video surveillance traffic.
The document is a presentation on ClearPass Policy Manager from Aruba Networks. It discusses ClearPass authorization and profiling capabilities, how the policy model works, and considerations for deploying ClearPass in a clustered configuration. The presentation covers authorization sources, using device profiling data in policies, network requirements for profiling, ClearPass clustering technology, and operations of clustered ClearPass deployments. It provides use cases around authorization, device profiling, and ClearPass clustering.
APIC-EM Update: SDN Automation for the Enterprise NetworkPablo Liesenberg
This document discusses Cisco's Enterprise SDN solution and APIC-EM. It notes that digital business demands operational efficiency and agility, but that installing network circuits is still a manual process. It then introduces Cisco's Digital Network Architecture and APIC-EM, which provides automation, abstraction, policy control, and open programmability. APIC-EM applications can configure and provision network infrastructure in minutes rather than months through zero-touch deployment, accelerated roll-out of routers/switches/APs, and automated provisioning of solutions like IWAN with Cisco best practices.
Watch the replay: http://cs.co/90028vTty
You have heard of NETCONF, YANG, Python, and REST. However, do you really understand what they can do for your business, network, and networking career?
Learn how you can create apps that automate operations, consume network telemetry, and control network resources with minimal programming experience.
Resources:
Watch the New Era of Networking playlist: http://cs.co/90058sI1U
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Canada
The document discusses Cisco Digital Network Architecture (DNA) and its network intuitive capabilities. DNA Center provides automation, analytics, and assurance to translate business intent into network policies and reduce manual operations. It features workflows for network design and deployment, access control policy authoring, and software image management. DNA collects metrics from the network to provide insights through anomaly detection, trend analysis, and machine learning. This allows for guided troubleshooting and self-remediation of issues.
The document discusses using structured data and automation to manage network configuration changes. It recommends storing configuration data in a centralized source of truth like a database to enable programmatic changes. The demonstration shows retrieving firewall configuration data from a database, using it to update firewall rules to support new F5 VIPs, and storing the results back in the database along with audit records. Maintaining structured, machine-readable data in a source of truth allows network changes to be reliably and repeatably implemented through automation.
- Aerotek Design Labs is an aerospace technology company that provides engineering, certification, manufacturing, logistics, and repair services. It holds STCs and PMA approval from the FAA.
- The company's services include engineering design, FAA certification support, PMA manufacturing, kitting, supply chain management, and operating an FAA-certified repair station.
- Aerotek was established in 2006 and aims to become a strategic partner for its customers by providing fully integrated solutions.
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment Sergey Gordeychik
Denis Kolegov, Oleg Broslavsky, Power of Community 2018, Seoul, Korea
Today, «SD-WAN» is a very hot and attractive topic. Software-defined WAN (SD-WAN) is a technology based on software-defined network (SDN) approach applied to wide area networks (WAN) in enterprise networks. According to Gartner’s predictions study, more than 50% of routers will be replaced with SD-WAN solutions by 2020.
In this presentation, we disclose a set of vulnerabilities in widespread and most popular SD-WAN products including Citrix NetScaler and Silver Peak EdgeConnect. We present the new results of our research, consider some technical details of the insecure design and found vulnerabilities, and describe different attack scenarios that may allow an attacker to compromise SD-WAN control and data planes.
NetScaler SD-WAN provides software-defined wide area networking and cloud access capabilities that are secure, reliable and ensure high application quality. It offers various editions with standard features including bonding multiple WAN circuits into a single logical circuit, monitoring link conditions, and delivering applications over the best circuit. The product provides centralized configuration and management without requiring branch configurations.
Cloud and On Premises Collaboration Security ExplainedCisco Canada
The document discusses authentication and authorization in Cisco Spark cloud and hybrid deployments. It covers key concepts like identity management, SAML and OAuth authentication flows, encryption of messages and content, secure search indexing, and e-discovery. Hybrid data security is also explained, where encryption keys, search indexing, and e-discovery services are hosted on-premises rather than in the cloud. Maintaining encryption keys on-premises provides additional security but also responsibilities if keys are lost.
This document provides an overview of a seminar on Cisco's voice and video architecture. It includes an agenda covering the evolution of Cisco's architecture, the collaboration preferred architecture, key sub-systems like call control and conferencing, and simplified sizing. Contact information is also provided for various countries.
With the advent of SDN driven network programmability and abstraction, IT operations management is poised for a transformation to higher levels of agility and automation.
Anuta Networks at Networking Field Day 14Kiran Sirupa
This document provides an overview of Anuta Networks' network services orchestration platform. It begins with an agenda and introduction. It then presents three case studies showing how the Anuta solution has been used by customers for branch automation, enterprise connectivity and managed DC, and managed enterprise services. The document discusses Anuta's model-driven approach, product architecture and extensibility. It also lists over 35 vendors and 100 device platforms supported by Anuta's network models.
Discussion of how microservices are being applied across both web scale and enterprise/government use cases to help speed up development.
Video available at http://www.ustream.tv/recorded/86151804
This document provides instructions for installing and configuring a Remote Access Point (RAP) using an Aruba controller. It describes setting up the firewall to allow communication between the RAP and controller, creating a new RAP virtual AP profile with the correct VLAN and IP addressing, adding the RAP to the whitelist, and troubleshooting connectivity issues. The goal is to allow remote users to access the corporate network by connecting to the RAP using the same SSID and authentication as on-site.
Cisco ONE Enterprise Cloud (UCSD) Hands-on LabCisco Canada
Pre-Requisites: As this is a hands-on lab, students should bring their laptop to take full advantage of the labs throughout the day sessions.
Learn how to configure network, compute, storage and virtualization components then use UCS Director to orchestrate, provision, automate and manage the solution.
IT transformation is a long journey that requires a close, sustained collaboration across the IT organization. For IT organizations that are transitioning to a private cloud architecture, the measure of success isn’t whether they’ve implemented an IT architecture that “works better”—it’s whether IT makes the business work better. By simplifying the design, build, and operational processes for private and hybrid clouds, Cisco ONE Enterprise Cloud Suite (ECS) helps you focus your time and energy on ensuring that your platform remains closely aligned with business requirements.
Labs
• UCS Director Concepts (vDC, Pod, etc.)
• Managing Physical Resources,
• Managing Virtual Infrastructure,
• UCS Director Extensibility
UCS Update: Efficiently Managing your server environment for traditional ente...Cisco Canada
Cisco UCS has helped customers get more out of their IT by providing a simplified physical environment with more efficient management. However, UCS continues to innovate and deliver additional value. This session will focus on updates and new offerings that have enhanced the Cisco UCS portfolio in the previous year. These include M-Series composable infrastructure, Dense Storage servers, next generation Fabric Interconnects, updated servers, additional storage offerings, and more. This will also cover refreshes and best practices to the UCS Management portfolio. Finally, there will be the opportunity for a questions throughout and after the presentation.
The document discusses Cisco's evolution of voice and video architecture and its preferred collaboration architecture. It provides an overview of Cisco's architectural evolution from 2011 to today. It then discusses the goals and components of the preferred architecture, including call control with Unified Communications Manager, conferencing with TelePresence Server and Conductor, and the collaboration edge.
Cisco Connect Halifax 2018 Cisco dna - deeper diveCisco Canada
This document provides a summary of a session on Cisco's Digital Network Architecture. The session discusses how Cisco's latest advances in programmable ASIC hardware and software-defined technologies are driving innovations in their Catalyst 9000 switches and solutions like Encrypted Traffic Analytics and Software-Defined Access. It outlines how the session will provide insight into Cisco's ASIC design process and the capabilities of their latest switching silicon. The session aims to show Cisco's evolution from application-specific integrated circuits to advanced graphical user interfaces that enable customers to more quickly innovate and reduce costs with solutions enabled by their Digital Network Architecture.
Coding 102 REST API Basics Using SparkCisco DevNet
This document provides an overview and agenda for a workshop on REST API basics using the Cisco Spark API. The agenda includes an introduction to REST APIs and what makes them useful, a tour of the Cisco Spark API and its endpoints, and hands-on exercises for interacting with the Cisco Spark API using Postman and JavaScript examples. Attendees will learn how to retrieve room and membership data, add messages to rooms, and call API functions from JavaScript code. The workshop aims to help developers get started using the Cisco Spark API and provides resources for continuing their education on API design and development.
Workshop sobre APIs realizado el 12 de mayo en el Centro de Innovación de BBVA. El objetivo era aprender a consumir APIs autenticadas desde el servidor hasta el cliente, gestionando sesiones y utilizando las últimas tecnologías (NodeJS, Angular, ...)
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
Cisco IP Video Surveillance Design GuideJoel W. King
This document provides a summary of Cisco's IP Video Surveillance Design Guide, which outlines best practices and configurations for deploying Cisco's IP video surveillance solution. The guide covers components of an IP video surveillance system, planning and design considerations, product selection, implementation and configuration guidance. It includes examples of network diagrams, router configurations, and quality of service configurations to optimize video surveillance traffic.
The document is a presentation on ClearPass Policy Manager from Aruba Networks. It discusses ClearPass authorization and profiling capabilities, how the policy model works, and considerations for deploying ClearPass in a clustered configuration. The presentation covers authorization sources, using device profiling data in policies, network requirements for profiling, ClearPass clustering technology, and operations of clustered ClearPass deployments. It provides use cases around authorization, device profiling, and ClearPass clustering.
APIC-EM Update: SDN Automation for the Enterprise NetworkPablo Liesenberg
This document discusses Cisco's Enterprise SDN solution and APIC-EM. It notes that digital business demands operational efficiency and agility, but that installing network circuits is still a manual process. It then introduces Cisco's Digital Network Architecture and APIC-EM, which provides automation, abstraction, policy control, and open programmability. APIC-EM applications can configure and provision network infrastructure in minutes rather than months through zero-touch deployment, accelerated roll-out of routers/switches/APs, and automated provisioning of solutions like IWAN with Cisco best practices.
Watch the replay: http://cs.co/90028vTty
You have heard of NETCONF, YANG, Python, and REST. However, do you really understand what they can do for your business, network, and networking career?
Learn how you can create apps that automate operations, consume network telemetry, and control network resources with minimal programming experience.
Resources:
Watch the New Era of Networking playlist: http://cs.co/90058sI1U
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Canada
The document discusses Cisco Digital Network Architecture (DNA) and its network intuitive capabilities. DNA Center provides automation, analytics, and assurance to translate business intent into network policies and reduce manual operations. It features workflows for network design and deployment, access control policy authoring, and software image management. DNA collects metrics from the network to provide insights through anomaly detection, trend analysis, and machine learning. This allows for guided troubleshooting and self-remediation of issues.
The document discusses using structured data and automation to manage network configuration changes. It recommends storing configuration data in a centralized source of truth like a database to enable programmatic changes. The demonstration shows retrieving firewall configuration data from a database, using it to update firewall rules to support new F5 VIPs, and storing the results back in the database along with audit records. Maintaining structured, machine-readable data in a source of truth allows network changes to be reliably and repeatably implemented through automation.
- Aerotek Design Labs is an aerospace technology company that provides engineering, certification, manufacturing, logistics, and repair services. It holds STCs and PMA approval from the FAA.
- The company's services include engineering design, FAA certification support, PMA manufacturing, kitting, supply chain management, and operating an FAA-certified repair station.
- Aerotek was established in 2006 and aims to become a strategic partner for its customers by providing fully integrated solutions.
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment Sergey Gordeychik
Denis Kolegov, Oleg Broslavsky, Power of Community 2018, Seoul, Korea
Today, «SD-WAN» is a very hot and attractive topic. Software-defined WAN (SD-WAN) is a technology based on software-defined network (SDN) approach applied to wide area networks (WAN) in enterprise networks. According to Gartner’s predictions study, more than 50% of routers will be replaced with SD-WAN solutions by 2020.
In this presentation, we disclose a set of vulnerabilities in widespread and most popular SD-WAN products including Citrix NetScaler and Silver Peak EdgeConnect. We present the new results of our research, consider some technical details of the insecure design and found vulnerabilities, and describe different attack scenarios that may allow an attacker to compromise SD-WAN control and data planes.
NetScaler SD-WAN provides software-defined wide area networking and cloud access capabilities that are secure, reliable and ensure high application quality. It offers various editions with standard features including bonding multiple WAN circuits into a single logical circuit, monitoring link conditions, and delivering applications over the best circuit. The product provides centralized configuration and management without requiring branch configurations.
Cloud and On Premises Collaboration Security ExplainedCisco Canada
The document discusses authentication and authorization in Cisco Spark cloud and hybrid deployments. It covers key concepts like identity management, SAML and OAuth authentication flows, encryption of messages and content, secure search indexing, and e-discovery. Hybrid data security is also explained, where encryption keys, search indexing, and e-discovery services are hosted on-premises rather than in the cloud. Maintaining encryption keys on-premises provides additional security but also responsibilities if keys are lost.
This document provides an overview of a seminar on Cisco's voice and video architecture. It includes an agenda covering the evolution of Cisco's architecture, the collaboration preferred architecture, key sub-systems like call control and conferencing, and simplified sizing. Contact information is also provided for various countries.
With the advent of SDN driven network programmability and abstraction, IT operations management is poised for a transformation to higher levels of agility and automation.
Anuta Networks at Networking Field Day 14Kiran Sirupa
This document provides an overview of Anuta Networks' network services orchestration platform. It begins with an agenda and introduction. It then presents three case studies showing how the Anuta solution has been used by customers for branch automation, enterprise connectivity and managed DC, and managed enterprise services. The document discusses Anuta's model-driven approach, product architecture and extensibility. It also lists over 35 vendors and 100 device platforms supported by Anuta's network models.
Discussion of how microservices are being applied across both web scale and enterprise/government use cases to help speed up development.
Video available at http://www.ustream.tv/recorded/86151804
This document provides instructions for installing and configuring a Remote Access Point (RAP) using an Aruba controller. It describes setting up the firewall to allow communication between the RAP and controller, creating a new RAP virtual AP profile with the correct VLAN and IP addressing, adding the RAP to the whitelist, and troubleshooting connectivity issues. The goal is to allow remote users to access the corporate network by connecting to the RAP using the same SSID and authentication as on-site.
Cisco ONE Enterprise Cloud (UCSD) Hands-on LabCisco Canada
Pre-Requisites: As this is a hands-on lab, students should bring their laptop to take full advantage of the labs throughout the day sessions.
Learn how to configure network, compute, storage and virtualization components then use UCS Director to orchestrate, provision, automate and manage the solution.
IT transformation is a long journey that requires a close, sustained collaboration across the IT organization. For IT organizations that are transitioning to a private cloud architecture, the measure of success isn’t whether they’ve implemented an IT architecture that “works better”—it’s whether IT makes the business work better. By simplifying the design, build, and operational processes for private and hybrid clouds, Cisco ONE Enterprise Cloud Suite (ECS) helps you focus your time and energy on ensuring that your platform remains closely aligned with business requirements.
Labs
• UCS Director Concepts (vDC, Pod, etc.)
• Managing Physical Resources,
• Managing Virtual Infrastructure,
• UCS Director Extensibility
UCS Update: Efficiently Managing your server environment for traditional ente...Cisco Canada
Cisco UCS has helped customers get more out of their IT by providing a simplified physical environment with more efficient management. However, UCS continues to innovate and deliver additional value. This session will focus on updates and new offerings that have enhanced the Cisco UCS portfolio in the previous year. These include M-Series composable infrastructure, Dense Storage servers, next generation Fabric Interconnects, updated servers, additional storage offerings, and more. This will also cover refreshes and best practices to the UCS Management portfolio. Finally, there will be the opportunity for a questions throughout and after the presentation.
The document discusses Cisco's evolution of voice and video architecture and its preferred collaboration architecture. It provides an overview of Cisco's architectural evolution from 2011 to today. It then discusses the goals and components of the preferred architecture, including call control with Unified Communications Manager, conferencing with TelePresence Server and Conductor, and the collaboration edge.
Cisco Connect Halifax 2018 Cisco dna - deeper diveCisco Canada
This document provides a summary of a session on Cisco's Digital Network Architecture. The session discusses how Cisco's latest advances in programmable ASIC hardware and software-defined technologies are driving innovations in their Catalyst 9000 switches and solutions like Encrypted Traffic Analytics and Software-Defined Access. It outlines how the session will provide insight into Cisco's ASIC design process and the capabilities of their latest switching silicon. The session aims to show Cisco's evolution from application-specific integrated circuits to advanced graphical user interfaces that enable customers to more quickly innovate and reduce costs with solutions enabled by their Digital Network Architecture.
Coding 102 REST API Basics Using SparkCisco DevNet
This document provides an overview and agenda for a workshop on REST API basics using the Cisco Spark API. The agenda includes an introduction to REST APIs and what makes them useful, a tour of the Cisco Spark API and its endpoints, and hands-on exercises for interacting with the Cisco Spark API using Postman and JavaScript examples. Attendees will learn how to retrieve room and membership data, add messages to rooms, and call API functions from JavaScript code. The workshop aims to help developers get started using the Cisco Spark API and provides resources for continuing their education on API design and development.
Workshop sobre APIs realizado el 12 de mayo en el Centro de Innovación de BBVA. El objetivo era aprender a consumir APIs autenticadas desde el servidor hasta el cliente, gestionando sesiones y utilizando las últimas tecnologías (NodeJS, Angular, ...)
The document discusses the Cisco Cloud Services Router 1000V (CSR 1000V). Key points:
- The CSR 1000V is a virtual router that runs the same IOS-XE operating system as physical Cisco routers. It provides routing and firewall capabilities in a virtual machine.
- It supports zone-based firewalling with unlimited interfaces, compared to the limited capabilities of IOS firewalling. Maximum throughput is 1Gbps.
- The document provides configuration examples for deploying and configuring the CSR 1000V on VMware ESXi, including enabling the RESTful API and zone-based firewall.
- onePK and RESTful APIs allow programmatic access and automation of the router for tasks like
Cisco Application Infrastructure Controller (APIC) enables Application Centric Infrastructure (ACI). APIC provides network abstraction and automation for WAN and access domains as part of the Cisco ONE platform, broadening its capabilities beyond the data center. The Cisco ONE Enterprise Networks Architecture uses APIC as its control layer to simplify configuration and provisioning of networks for the application economy through programmability and automation of network configuration.
Workshop sobre APIs realizado el 27 de abril en el Centro de Innovación de BBVA. En este evento hemos visto los detalles del funcionamiento, gestión de errores y conceptos de seguridad aplicados a APIs.
Hope you did not miss our deep dive: Cisco APIC-EM: IT Speed and Simplicity Through Automation
Ronnie Ray walked through Cisco's purpose-built enterprise controller. Purpose build to help you move to software-defined networking (SDN) that works both on existing networks and on new infrastructure.
Watch and Listen to the workshop replay at cs.co/6017Bl8Kb
(check out the Digital Network Architecture episodes Part 1 and 2 at http://www.techwisetv.com)
You will learn how Cisco engineers created the world’s best network automation controller, which provides enterprise resiliency and scale, an open and extensible platform, and a full suite of policy-driven SDN applications.
You’ll learn about multiple time-saving apps that cover the complete network service lifecycle and drive policy enforcement consistently across the enterprise to make sure of zero-touch infrastructure deployment, quality of experience, and rapid troubleshooting.
Moving to software-driven networking is the future. Join us and find out how to start your journey today.
DEVNET-2002 Coding 201: Coding Skills 201: Going Further with REST and Python...Cisco DevNet
Are you ready to dive deeper into using Python and REST? This class continues the Coding Skills 101 topics and goes deeper into techniques for parsing JSON, and debugging.
DEVNET-1114 Automated Management Using SDN/NFVCisco DevNet
How is the open source community using SDN/NFV to create truly heterogeneous, inter-operable, multi-tenant cloud data centers? We’ll present results from our independent testing of cloud orchestration, middleware, SaaS, and Iaas multi-vendor solutions, including SDN’s inroads to the telecommunication world and how networking influences emerging trends like Docker virtual containers in the cloud.
A session in the DevNet Zone at Cisco Live, Berlin. The APIC REST API is a programmatic interface to the Application Policy Infrastructure Controller (APIC) that uses a Representational State Transfer (REST) architecture. The API accepts and returns HTTP or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. Developers can use any programming language to generate the messages and the JSON or XML documents that contain the API methods or managed object (MO) descriptions.
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
This document provides an overview of software defined networking (SDN). It discusses how SDN enables data center teams to use software to efficiently control network resources, compared to traditional network switches. The document outlines several SDN topics and related technologies, including SDN standards, network function virtualization, use cases, sample projects, surveys, case studies, online courses, and software tools. It also includes sections on SDN architecture and how SDN is important for virtual environments and VM mobility.
How to Build Advanced Voice Assistants and ChatbotsCisco DevNet
Learn more about the CodeMotion Voice Machine and Cisco DevNet Chatbot. Understand what a typical bot journey is and where to go to get more information about Cisco Spark and Tropo.
This document summarizes a book about the creation and growth of Google. It describes how Larry Page and Sergey Brin founded Google based on their PhD research at Stanford. They created the PageRank algorithm to better rank search results and founded Google as their own search business in 1998. The document then discusses Google's culture of prioritizing the customer experience. It recommends the book for those interested in business, marketing, or learning more about one of the most influential technology companies.
This document is a curriculum vitae for Robert Dolman that summarizes his personal and employment details. It lists his name, address, contact information, date of birth, education history, and qualifications. It then outlines his work experience at four companies from 1997 to the present, describing his roles and responsibilities at each job. These roles involved color matching, formulation, customer service, production, and technical support within the polymer and printing industries. The CV also lists some of his skills, hobbies including music and sports, and his ambition to succeed in his career.
Vassili Soumelis - Programme d’analyse globale et intégrative du micro-enviro...SiRIC_Curie
Programme d’analyse globale et intégrative du
micro-environnement tumoral - Vassili SOUMELIS, MD, PhD
Laboratoire d’Immunologie Clinique et Inserm U932
This document discusses Microsoft's focus on mobile-first and cloud-first technologies. It describes Microsoft's principal technical evangelist and his background. It then covers Microsoft events like Connect, tools like Visual Studio, Visual Studio Code, and Visual Studio Team Services. It discusses building mobile apps and services like Visual Studio Mobile Center. It also outlines Microsoft's Azure cloud computing platform and services it provides like AI, data, and serverless computing.
e-KTP Information Extraction with Google Cloud Function & Google Cloud VisionImre Nagi
I presented this talk during Google Developer Group Developer Festival 2018 in Jakarta. This talk presents the usage of serverless Cloud Function & Google Cloud Vision API to extract information from Indonesia's e-KTP.
Worked as network and security engineer. Have good configuration knowledge of Cisco routers, switches, WSA, ISE, ASA and FTD firewall appliances. I also worked on Juniper SRX and Palo alto firewall series.
Service Mesh @Lara Camp Myanmar - 02 Sep,2023Hello Cloud
Sai Linnthu is a founding partner at HelloCloud.io and discusses service meshes and Istio. Istio provides a framework-agnostic approach for managing communication policies and observability across cloud-native microservices. While Istio addresses many challenges of microservices, its complexity makes it difficult to use and manage across multiple clouds without additional capabilities like centralized metrics, access logging and lifecycle management.
(SEC309) Amazon VPC Configuration: When Least Privilege Meets the Penetration...Amazon Web Services
Enterprises trying to deploy infrastructure to the cloud and independent software companies trying to deliver a service have similar problems to solve. They need to know how to create an environment in AWS that enforces least-privilege access between components while also allowing administration and change management. Amazon Elastic Cloud Compute (EC2) and Identity and Access Management (IAM), coupled with services like AWS Security Token Service (STS), offer the necessary building blocks. In this session, we walk through some of the mechanisms available to control access in an Amazon Virtual Private Cloud (VPC). Next, we focus on using IAM and STS to create a least-privilege access model. Finally, we discuss auditing strategies to catch common mistakes and discuss techniques to audit and maintain your infrastructure.
Cisco Connect 2018 Thailand - Software defined access a transformational appr...NetworkCollaborators
The document discusses Cisco's approach to software-defined access networking and the challenges of traditional network designs. It introduces Cisco's intent-based networking model which uses automation, analytics, and policy-based segmentation to simplify network management and operations. Key components of Cisco's SDA solution include the Cisco DNA Center for network design, provisioning, policy management, and assurance across switching, routing, and wireless platforms.
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
This set of slides showcases how you can interact with PowerVC via its OpenStack-based REST APIs. It also demonstrates how to mimic the REST APIs made from your web browser in familiar command line utilities like curl.
Forward Networks - Networking Field Day 13 presentationForward Networks
On November 17th, 2016, Forward Networks conducted its first public unveiling of its Network Assurance platform at Networking Field Day 13. Visit https://www.forwardnetworks.com/ for more details.
As your use of the AWS platform matures and evolves you need to be continuously looking at ways to improve your security posture and take advantage of new security services and features. In this advanced technical session we will share architecture patterns for different workloads, IAM policy tips & tricks, how to implement security automation and for forensics. Be prepared for a technically deep session on AWS security.
Speaker: Ben Potter, AWS Cloud Security Consultant, Amazon Web Services
OpenSource API Server based on Node.js API framework built on supported Node.js platform with Tooling and DevOps. Use cases are Omni-channel API Server, Mobile Backend as a Service (mBaaS) or Next Generation Enterprise Service Bus. Key functionality include built in enterprise connectors, ORM, Offline Sync, Mobile and JS SDKs, Isomorphic JavaScript and Graphical API creation tool.
SharePoint and Office 365 Development WorkshopEric Shupps
Progress can sometimes be difficult. Unlike times past, when developers had limited options for building Office and SharePoint solutions, the current landscape offers a confusing array of options for building on-premises, cloud and hybrid solutions. From SharePoint add-ins to Azure web applications, there is a lot to know about how, when, where and why to use each development model. In this full day interactive workshop, we will explore each option, discuss the pros and cons, determine the optimal conditions for each, and see them in action with a series of deep-dive demonstrations. You will learn the pre-requisites for building modern Office and SharePoint applications, gain exposure to the tools and platforms, walk through detailed use cases and equip yourself with the knowledge of not only how to create apps and add-ins but also which to use in each situation.
Slides from the May 20th workshop at the Seattle Node.js Meetup presented by Shubhra Kar titled: "Develop, Deploy, Monitor and Hyper-scale REST APIs Built in Node.js"
Integrating Jira Software Cloud With the AWS Code SuiteAtlassian
This document discusses integrating Jira Software Cloud with the AWS Code Suite. It covers using Atlassian Connect and Spring Boot to build a Jira app, deploying the necessary AWS infrastructure including ECS, CodePipeline, Lambda, and ECR, and using Lambda functions and triggers to integrate development workflows and send build data from AWS to Jira. The presentation provides an overview of the key AWS services and development tools used, sample code and configurations, and best practices for building and hosting containerized Jira apps on AWS.
Asgard is a web interface created by Netflix for deploying applications and managing cloud resources on Amazon Web Services (AWS). It provides features like load balancing, auto-scaling, and security that address limitations of AWS management console. Key advantages of Asgard include centralized access control, audit logging, enforcement of naming conventions, and integration with other systems. It can automate workflows for deploying applications on AWS through a single form submission.
Enterprise Network Transformation Powered by OrangeX, with Nokia Nuage and AW...Amazon Web Services
Come learn how OrangeX in Spain is transforming enterprise networks with AWS Cloud and Nokia's Nuage SD-WAN. Nuage's SD-WAN is delivered with management, control, and user plane in the AWS cloud. It is powered by Amazon EC2 i3.metal and AWS hybrid IT services via true multi-tenant, built-in multi-segment orchestrators, and multi-tier management spanning from operators to partners to direct enterprise portals. This enables the solution to be extended directly to service provider private backbones and cloud data centers and services, as well as between enterprise sites. The solution further enables SD-WAN over last mile broadband and leased wholesale circuits to access existing private backbones to leverage their reliable mid-mile connectivity and existing connectivity to enterprise sites. With SD-WAN becoming an essential function in vCPE deployments, Nuage’s SD-WAN has been established as the platform for simplifying the delivery and deployment of virtual network functions, such as security and agility, on-premises, and in the cloud. Learn factors to consider in using SD-WAN solution with AWS, agile implementation of the solution, and leveraging a cloud-ready operating model. We share sufficient references for you to take away to continue learning.
Cloud Analytics Engine Value - Juniper Networks Juniper Networks
The Cloud Analytics Engine provides a new way to analyze networks that is automated, proactive, and gives visibility into both physical and virtual environments. It collects data at wire speed and uses this to give insights into application performance, network usage, and troubleshooting across physical and software-defined infrastructure. The open and standards-based system integrates analytics, visibility, and orchestration to provide a holistic view of both underlay networks and overlay applications and workloads.
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
This document discusses how to effectively monitor SD-WAN and SASE environments with ThousandEyes. It begins with an agenda that includes why SD-WAN is important, the challenges of monitoring complex networks, testing scenarios for applications and underlays, a demo, and Q&A. SD-WAN offers benefits like high availability, performance for critical apps, traffic management, simplified cloud connectivity, and supporting hybrid infrastructures. However, visibility is challenging with many variables that could impact performance across branches, clouds, security functions, and more. ThousandEyes provides testing from global vantage points to identify issues throughout these environments.
ADDO 2022 Putting the Sec in DevSecOps for an AWS Lambda Based SystemCraeg Strong
What does it mean to implement zero-trust and DevSecOps principles in a serverless environment? This is our story of hardening an AWS application based on serverless architecture. It all began with an idea for a brand-new plugin for the Atlassian Jira Agile tool. Our plugin uses an innovative design based on GoLang, AWS Athena, Lambdas, and DynamoDB, and the Atlassian AtlasKit SDK for ReactJS. Serverless applications have many nice features that help make them secure. Lambdas get their credentials injected at runtime, eliminating the need to store keys or credentials. Our SSO solution improves security still further, by creating temporary credentials for every session, eliminating static keys and credentials. Given this excellent foundation, we thought our MVP was ready for production! Alas, how mistaken we were...
In order to meet Atlassian’s strict cybersecurity guidelines, we implemented security tools including GitHub’s dependabot, AWS credential management services, AWS app firewall, gosec, ZAP tester, and Nessus. We will discuss lessons learned and what was unique to the serverless environment. We will also cover privilege audits, data, and disaster recovery.
Using serverless architecture confers many benefits, and by reducing the attack surface, they can be inherently more secure than alternative architectures. Nevertheless, there are important steps that must be taken to further improve security. This talk will shed light on how to get where we need to be.
Learn how and why John McDonough contributes to Ansible and how you can too. We’ll arm you with what you need to know, things like Python, Git, and YAML.
Rome 2017: Building advanced voice assistants and chat botsCisco DevNet
If it takes minutes to code a simple bot, building professional bots represents quite a challenge. Soon you realize you need serious programming and API architecture experience but also “Bot” specific skills. In this session, we'll first show the code of advanced Chat and Voice interactions, and then explore the challenges faced when building advanced Bots (Context storage, NLP approaches, Bot Metadata, OAuth scopes), and discuss interesting opportunities from latest industry trends (Bot platforms, Serverless, Microservices). This talk is about showing the code and sharing lessons learned.
Cisco Spark and Tropo and the Programmable WebCisco DevNet
This document discusses integration platforms as a service (iPaaS) and provides examples of how Cisco Spark, Tropo, and Webex can be integrated using iPaaS solutions. It outlines key iPaaS concepts, popular iPaaS solutions like IFTTT, Zapier and Built.io, and use cases for both consumers and enterprises. It also describes an anatomy of a potential iPaaS solution using Built.io and highlights opportunities to learn more through Cisco DevNet labs and sessions.
Device Programmability with Cisco Plug-n-Play SolutionCisco DevNet
Cisco Open Plug-n-Play solution allows customers to reduce the costs associated with deployment/installation of network devices, increase the speed and reduce the complexity of deployments without compromising the security. Using Cisco Plug-n-Play solution, customers can do Zero Touch Installs of Cisco gear in various deployment scenarios and deployment locations.
Watch the DevNet 2052 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=91108&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Building a WiFi Hotspot with NodeJS: Cisco Meraki - ExCap APICisco DevNet
This document discusses building a WiFi hotspot using Node.js and the Cisco Meraki ExCap API. It describes using Node.js and Express to create web services that handle click-through, sign-on, and social login splash pages. Sessions are stored in MongoDB. Templates are rendered using Handlebars. The API provides parameters like login URLs and splash page URLs. Code examples show routing and passport authentication strategies for social logins.
Application Visibility and Experience through Flexible NetflowCisco DevNet
The world of applications is changing rapidly in the enterprise; from the way applications are increasingly hosted in the cloud, the diverse nature of apps and to the way they are consumed by many devices. The need for organizations and network administrators is to focus on "Fast IT" - "Innovation in the Enterprise" is growing, which means having to spend less time on daily operations, maintenance and troubleshooting and more time on delivering business value with newer services. Cisco AVC with its NBAR2 technology is designed to detect applications and measure application performance through measuring round trip time, retransmission rates, jitter, delay, packet loss, MoS, URL statistics etc. Those details are transmitted using Flexible Netflow/IPFIX, so partners could leverage the data for application usage reporting, performance reporting and troubleshooting application issues to deliver best possible application experience.
Watch the DevNet 2047 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92664&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
The WAN Automation Engine (WAE) is a software platform that provides multivendor and multilayer visibility and analysis for service provider and large enterprise networks. It plays a critical role in answering key questions of network resource availability, and when appropriate can automate and simplify Traffic Engineering mechanisms such as RSVP-TE and Segment Routing. This session will focus on use-cases and APIs for developers.
Watch the DevNet 2035 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92720&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Cisco's Open Device Programmability Strategy: Open DiscussionCisco DevNet
Cisco DNA is an open and extensible, software-driven architecture built on a set of design principles with the objective of providing:
- Insights & Actions to drive faster business innovation
- Automaton & Assurance to lower IT costs and complexity while meeting business and user expectations
- Security & Compliance to reduce risk as the organization continues to expand and grow. The architecture extends to Cisco network elements.
This session will focus on the open, model-driven, programmable interfaces available across Cisco's network elements which enable you to leverage and extend your network through applications that directly access the routers and switches in your network.
Watch the DevNet 1028 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=91041&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)Cisco DevNet
In this small group, hands-on workshop session you'll learn how to write your first Python application that uses YANG, NETCONF and , RESTCONF to access operational and configuration data on a device.
Watch the DevNet 2044 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92725&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
NETCONF & YANG Enablement of Network DevicesCisco DevNet
A technical discussion and a demo showing how Tail-f's ConfD management agent can be used to implement NETCONF and YANG, the industry-leading solution for providing a programmable management interface in a network element. ConfD is recognized as the best-in-breed embedded software for implementing management functions in network elements, including physical devices and virtualized network functions (VNF) for NFV.
This Workshop is a best fit for engineers who are involved in the design and development of embedded software for network devices. Attendees will gain a basic understanding of what NETCONF and YANG are and how ConfD provides a solution for embedding this technology in the network devices. More information about ConfD can be found at: https://developer.cisco.com/site/confD/
Watch the DevNet 1216 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92703&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
UCS Management APIs A Technical Deep DiveCisco DevNet
The document provides an overview and technical details of the UCS Management APIs:
- It discusses the structure, features, object model, and workflow of the UCS XML API. It also covers methods for sessions, queries, filters, and configurations.
- The API uses HTTP/HTTPS and XML, with role-based authentication and a published object model hierarchy. It supports transactions, high availability, and event subscriptions.
- Key methods and functionality covered include sessions, queries with filtering, resolving objects by DN/class/scope, configurations, and events/statistics. Understanding the low-level UCS API enables programmatic access to UCS environments.
The DevOps model is rapidly transforming IT operations and development practices. But what are the precursors necessary to implement DevOps? To achieve an agile, virtualized, and highly automated IT environment, what technological requirements need to be in place? OpenStack has the potential to facilitate DevOps implementation and practices at several different layers in the data center. In this session we'll quickly discuss what DevOps is, then discuss many components that are logically required to move towards DevOps in your environment. Finally we'll explore in depth several ways OpenStack can provide these baseline components.
Watch the DevNet 1104 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92695&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...Cisco DevNet
This document provides an agenda and overview for a presentation on network automation using APIs, Ansible, and Python. The presentation introduces network programmability and automation tools like Ansible, discusses using infrastructure as code approaches, and provides examples of automating network device configurations and modules using Python and Jinja templates. It aims to help network engineers get started with network automation.
The document outlines an agenda for a presentation on developing Tropo applications. The presentation covers topics like making incoming and outgoing calls, text messaging, call control features, and advanced speech concepts. Sample code is provided for different programming languages.
The document describes a Cisco Spark & Tropo API workshop that covers setting up a quiz application using the Cisco Spark and Tropo APIs. The workshop includes touring a demo quiz app, setting up an interactive voice response system with Tropo, adding a SMS bridge to onboard participants to a Cisco Spark room, and connecting an interactive assistant bot to a Spark room. Hands-on exercises guide attendees on configuring the various components.
Cisco APIs: An Interactive Assistant for the Web2Day Developer ConferenceCisco DevNet
Stève Sfartz is an API evangelist at Cisco who presented on Cisco APIs and leveraging them through examples. The presentation covered Cisco technologies like Connected Mobile Experience (CMX), Mobility IQ, and Cisco Spark which have REST APIs that can be used to access location data, analytics, and collaboration features. It encouraged developers to join the Cisco DevNet community to learn about APIs, take labs, and interact with other developers.
DevNet Express - Spark & Tropo API - Lisbon May 2016Cisco DevNet
Direct from the Cisco DevNet Lisbon Portugal Express event in May 2016. Learn about Cisco DevNet, Spark and Tropo APIs any why there's never been a better time to innovate with Cisco.
Direct from DevNet@TAG in Milan and Rome in May 2016! Learn about Cisco DevNet, Spark and Tropo APIs any why there's never been a better time to innovate with Cisco.
Choosing PaaS: Cisco and Open Source Options: an overviewCisco DevNet
This document discusses container platforms and PaaS. It provides context on containers and supporting technologies like Docker. It describes how containers are limited when confined to a single host, and how schedulers can distribute containers across multiple hosts. It outlines common production tools used with containers like configuration management, monitoring, and logging. It compares PaaS and containers, noting how PaaS consumed containers before they were widely known, and how the lines between the two are blurring as container platforms provide more services. It introduces Mantl as Cisco's container stack designed to run container workloads and big data applications across clouds.
A session in the DevNet Zone at Cisco Live, Berlin. Learn what use cases are good fits for Tropo, how you can make money with Tropo, discover how to get support from Tropo, and see how some real businesses are making or saving money using Tropo.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
3. Common Policy Approach
Consistent Policy Across Cloud, DC, WAN and Access
Cloud Data Center WAN Access
Application Network Profile
SLA, Security, QoS, Load Balancing
User/Things Network Profile
QoS, Security, SLA, Device
APIC APICAPIC APIC
4. The Cisco APIC Enterprise Module (APIC-EM)
Advanced Visualization
for low risk SDN adoption
Elastic Services
for scalability &
HA
Existing & New Installations
Catalyst, ISR, ASR
Agile
Integration Model
Network Abstraction and Automation
APIC
Masking Network Complexity, Exposing Network Intelligence.
5. Cisco APIC Enterprise Module Architecture
Abstracts Network Devices to Mask Complexity
Treat Network as a System
Exposes Network Intelligence
For Business Innovation
Cisco APIC Enterprise Module
Cisco and Third Party Applications
Network Devices
Catalyst, ASR, ISR
Network Info
Database
Policy
Infrastructure
Automation
REST API
Southbound Interface: CLI
Security QoS IWAN Network PnP
6. APIC-EM: Services Layered View
NB REST API
Pxgrid Client +
LDAP client
Radius Proxy +
LDAP client
Inventory
Topology
Policy Analysis
PnP
Network
Discovery
Network
Programmer
Policy
Programmer
(QoS, ACL)
Network
Tapping
Easy QoS
Network Events
Policy Manager
Conflict Detection and
Resolution
(BI and NI)
Business Intent to
Network Intent
Conversion
NETWORK
MODEL
DEVICE
MODEL
DEVICE
INTERFACE
Application
Visibility
PfR
APIC-EMServicesAPIC-EMApps
IWAN Services
APIC-EM Services
IWAN Services
Basic Services for Controller Availability
Inventory
Visualizer
Topology
Visualizer
Application
Visualizer
Discovery
Easy QoS
Visualizer
Compliance
Check
ACL
Visualizer
Network PnP
Network
Tapping
Visualizer
Policy
Manager
20. Netops
ACL
• Get ACL for a Device
https://test-apic/api/v0/acl/device/cceaf2fe-c3d9-4d37-bf14-fba071c27d6e
• Get ACL for Interface GigabitEthernet0/0/0
https://test-apic/api/v0/acl/interface/ad8c543b-c698-468b-bb64-e0a418d6c517
• Check for consistency of an ACL
https://test-apic/api/v0/acl/conflict/dea7a366-4cdd-4006-ad51-27f0a0b2fb40
Cisco Confidential
$python check-acl.py
23. Applications
{
"id": "46de799b-7f51-4a5e-8d08-46e2e78ff619",
"applicationGroup": "other",
"category": "voice-and-video",
"subCategory": "consumer-video-streaming",
"encrypted": "false",
"p2pTechnology": "false",
"tunnel": "false",
"name": "appleqtc",
"enabled": "true",
"nbarId": "92",
"engineId": "3",
"globalId": "L4:458",
"selectorId": "458",
"helpString": "apple quick time",
"longDescription": "Apple QuickTime is an extensible proprietary multimedia framework developed by Apple Inc.,
capable of handling various formats of digital video, picture, sound, panoramic images, and interactivity.
QuickTime is available for Windows XP and later, as well as Mac OS X Leopard and later operating systems.",
"appProtocol": "tcp/udp",
"tcpPorts": "458",
"udpPorts": "458",
"references": "http://www.apple.com/quicktime/",
"url": "",
"valid": true
}
28. Task for Policy creation - failure
https://test-apic/api/v0/task/f5c07be7-ae8e-4350-80b0-1971874803c8 GET
"response": {
"id": "f5c07be7-ae8e-4350-80b0-1971874803c8",
"rootId": "f5c07be7-ae8e-4350-80b0-1971874803c8",
"serviceType": "Policy Service",
"progress": "Policy Creation Failed",
"errorCode": "PartialSuccess",
"failureReason": "04ea2f11-1e9d-435a-9db2-ded3fbcd732f: Inactive Policy - Interfaces
where this policy needs to be programmed are not within the same policy scope. Hence skipping
policy creation for this policy.",
"isError": true,
"startTime": 1412425907975,
"endTime": 1412425910331
},
29. Policy for Security
https://test-apic/api/v0/policy POST
{
"policyName": "deny_some",
"policyOwner": "Admin",
"actions": ["DENY"],
"networkUser": {"userIdentifiers": ["40.0.0.15"]},
"resource": {"userIdentifiers": ["10.10.20.3"], "applications":[{"raw":
"81;TCP"}]}
}
Cisco Confidential
Sourcefire use case.
<<<<<THIS CAN BE DANGEROUS IN A SHARED LAB>>>>
Remove "resource" components (10.10.4.2)
1) deny tcp host 40.0.0.15 host 10.10.20.3 eq 81
2) deny tcp host 40.0.0.15 any eq 81
3) deny ip host 40.0.0.15 any
30. API Structure
31
/application
/qos
QoS Marking -> (policy)
App -> Class -> Mapping (cvd)
Queuing on interfaces
Bandwidth allocation to classes
/policy
/network-
device/{tags}
/host
/user
ACL
Traffic Redirection
QoS Marking
/qos API's automatically
create policies for QoS
Marking.
33. PnP Server
Use Case: Device Deployment in Campus
DHCP Server
Switch running
PnP Agent
Device receives PnP server
specific metadata info
configured in DHCP option 43
Device validates server’s location and
establishes a communication with the server
Installer
Remote Installer
• Mount and cable
devices
• Power-on
Day 1
Network Admin remotely
monitors status of install
while in progress.
Day 1
Cisco
APIC -
Enterprise
Module
38. Create a site
https://adam-iwan/api/v1/ztd-site POST
{
"siteName": "Sydney"
}
{
"response": {
"taskId": "832e26a7-b10a-4a4a-9cd9-1dfc2a9d3da3",
"url": "/api/v1/task/832e26a7-b10a-4a4a-9cd9-1dfc2a9d3da3"
},
"version": "0.0"
}
39. Result of the task
{
"response": {
"rootId": "db96e8f5-cf68-4f1f-9cc2-f6c18fdeeaaf",
"serviceType": "Ztd Service",
"progress": "{"message":"Success creating new site","siteId":
"05159d12-3654-4ce1-b391-b5f4a3cdc6a9"}",
"startTime": 1420948314682,
"endTime": 1420948314714,
"id": "db96e8f5-cf68-4f1f-9cc2-f6c18fdeeaaf"
},
"version": "0.0"
}
40. Create a Rule
https://adam-iwan/api/v1/ztd-site/device POST
{
"hostName" : "test-switch6",
"site" : "Sydney",
"platformId" : "WS-C2960X-48FPD-L"
}
IMPORTANT: Name of "site" rather than UUID
These are only three mandatory attributes
Default "status" is PENDING
"serialNumber", "configId", "imageId", are often used
41. Result of the Rule task
{
"response": {
"rootId": "c8c9fec8-e564-4368-a0fe-1f3559926ce6",
"serviceType": "Ztd Service",
"progress": "{"message":"Success creating new site
device(rule)","ruleId":"8fbc09aa-87b2-4c4a-bc91-6d1b851429d8"}",
"startTime": 1420965737439,
"endTime": 1420965737492,
"id": "c8c9fec8-e564-4368-a0fe-1f3559926ce6"
},
"version": "0.0"
}
42. Rules for a specific site
https://adam-iwan/api/v1/ztd-site/device?site_id=05159d12-3654-
4ce1-b391-b5f4a3cdc6a9&offset=1&limit=10 GET
{
"response": [
{
"hostName": "test-switch6",
"platformId": "WS-C2960X-48FPD-L",
"site": "Sydney",
"state": "PENDING",
"attributeInfo": {},
"id": "8fbc09aa-87b2-4c4a-bc91-6d1b851429d8"
}
],
"version": "0.0"
}