Running or planning on deploying a large ClearPass cluster? See what others are doing in larger environments to improve their deployments This session is designed to help customers that run the largest and most demanding networks learn how to deal with multiple locations, 100k+ endpoints, and strict SLA’s. Come to this session to discuss architecture for distributed deployments and how to better design your install for high performance, high availability needs. This is the one session where we’ll include the most experienced ClearPass team members for what will be a highly interactive session.
During this webinar, we will discuss how starting from ArubaOS 8.2.0.0, selected APs can run in both controller-based mode and controller-less mode and the implications tied to that. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-AP-Discovery-amp-Deployment-Policy-ArubaOS-8-x/m-p/394540/
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
After your successful ClearPass deployment, how will you know if it's still performing properly? In this session, you'll leran how to use our built-in dashboard, logging and trending tools to identify problem areas, and reasonable threshold levels related to authentications, as well as overall appliance performance numbers. See how to turn on and use proactive notifications before problems occur that can keep users from connecting. Hear about best-practices for operationalizing ClearPass as the growth of devices, authentications, and collected data increases.
In this presentation, we will cover an overview of ArubaOS 8.x Licensing from Supported/ Unsupported Topology to Server Failover behaviour and license generation and transfer.
Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-How-Licensing-works-in/td-p/306162
This guide covers Aruba Mobility Controllers and is considered part of the foundation guides within the VRD core technologies series. This guide will help you understand the capabilities and options you have when deploying an Aruba Mobility Controller. This guide describes operating modes for the mobility controller, licensing, forwarding modes, logical and physical deployment, redundancy, and how to select the appropriate mobility controller based on scalability requirements. Version 9 includes information on the 7200 series controller.
During this webinar, we will discuss how starting from ArubaOS 8.2.0.0, selected APs can run in both controller-based mode and controller-less mode and the implications tied to that. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-AP-Discovery-amp-Deployment-Policy-ArubaOS-8-x/m-p/394540/
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
After your successful ClearPass deployment, how will you know if it's still performing properly? In this session, you'll leran how to use our built-in dashboard, logging and trending tools to identify problem areas, and reasonable threshold levels related to authentications, as well as overall appliance performance numbers. See how to turn on and use proactive notifications before problems occur that can keep users from connecting. Hear about best-practices for operationalizing ClearPass as the growth of devices, authentications, and collected data increases.
In this presentation, we will cover an overview of ArubaOS 8.x Licensing from Supported/ Unsupported Topology to Server Failover behaviour and license generation and transfer.
Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-How-Licensing-works-in/td-p/306162
This guide covers Aruba Mobility Controllers and is considered part of the foundation guides within the VRD core technologies series. This guide will help you understand the capabilities and options you have when deploying an Aruba Mobility Controller. This guide describes operating modes for the mobility controller, licensing, forwarding modes, logical and physical deployment, redundancy, and how to select the appropriate mobility controller based on scalability requirements. Version 9 includes information on the 7200 series controller.
In this presentation, we will cover the Central platform which provides a standard Web-based interface that allows you to configure and monitor multiple Aruba Instant networks / Switches from anywhere with a connection to the Internet. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Cloud-Managed-Networks/Technical-Webinar-Aruba-Central-with-Instant-AP/td-p/429366
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
This presentation will offer an overview on what are the frequently occurring 802.1x authentication based issues and how to quickly diagnose/troubleshoot the IAP WLAN network. Check out the webinar recording where this presentation was used. https://attendee.gotowebinar.com/register/5818157412807394306
In this day and age, it's probably a good idea to get your WLAN ready for voice and video. And it's also a good idea to classify and prioritize web applications based on policies you set. Protecting your mobile devices and network infrastructure against outside or inside attacks needs to be part of the plan, too. Join to us to learn more about these and other functions of Aruba's policy enforcement firewall integrated to its access points, switches, and controllers.
Join us at this session to hear about the challenges you might face as you try to support a large group of mobile users and devices for 802.1x authentication. While username & password authentication (eg. 802.1x PEAP) is easily deployed, requiring each device to authenticate with its own unique credential (eg. certificate-based 802.1x EAP-TLS) is a much secure implementation. Join us as we discuss ways to identify the most appropriate 802.1x authentication mechanisms for variety of environments and user profiles.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
This document describes the process for leveraging the ClearPass Guest captive portal to bypass the Captive Network Assistant (web sheet) that is displayed on iOS devices such as iPhone, iPad, and more recently, OS X machines running Lion (10.7) and above.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
Clustering is a new feature introduced in AOS 8.0 that enables seamless roaming of clients between APs, hitless client failover and load balancing of users across Mobility Controllers in the cluster. This solution provides the configuration required to create a cluster of Mobility Controllers that are managed by the same Mobility Master.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Airheads-Tech-Talks-Advanced-Clustering-in-AOS-8-x/td-p/506441
This lab setup document emulates the recommended campus and remote access point networks discussed in the Aruba Campus Networks Validated Reference Design and the Aruba Remote Access Point (RAP) Networks Validated Reference Design. All the screenshots and command-line interface (CLI) configurations in the Aruba Campus Networks Validated Reference Design and the Aruba Remote Access Point (RAP) Networks Validated Reference Design are from this setup.
During this presentation, we will cover a deep dive into Aruba Central and its features. Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Cloud-Managed-Networks/Technical-Webinar-Advance-Aruba-Central/m-p/496064
Nesta apresentação faremos um overview sobre a solução ClearPass da Aruba Networks que traz funções de BYOD, Network Access Control e Gerenciamento de visitantes.
In this presentation, we will run through some Rogue AP troubleshooting scenarios and best practices. The agenda covers Rogue AP Detection, classification techniques and containment, wired containment and wireless containment without Tarpit. Check out the webinar recording where this presentation was used:
http://community.arubanetworks.com/t5/Aruba-Instant-Cloud-Wi-Fi/Technical-Webinar-Recording-Slides-ArubaOS-Rogue-AP/m-p/289230
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
For WLANs to be able to reliably support mission-critical, high-throughput, or time-sensitive applications, RF interference must be continuously monitored. The WLAN must automatically and dynamically adapt to mitigate the effects of any interference in the environment. WLAN infrastructure has to provide the administrators with real-time, historical, and proactive visibility into the air to diagnose and mitigate interference. In this application note we will look at some of the tools that Aruba offers as a part of its WLAN solution that enable administrators to ensure reliable, high performing RF.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
ClearPass OnGuard agents perform endpoint posture assessment and ensure that compliance is met before granting access to the network. This session will cover the ClearPass OnGuard Agent components and work-flow in detail.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Security/Airheads-Tech-Talks-Understanding-ClearPass-OnGuard-Agents/td-p/524288
The application note focuses on configuration and operation of guest access solutions on ArubaOS. The native guest access solution including configuration of the guest access and guest provisioning profiles, guest administration, and captive portal configuration.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
As billions of devices connect to enterprise networks, IT is struggling to gain more visibility and control using multiple, disparate security systems and management tools. ClearPass Exchange fixes this problem by acting as a central decision point, providing context for a unified network access defense for wired and wireless access, and leveraging downstream security and productivity systems and context to improve end-user workflows and secure devices wherever they connect. Learn how to leverage ClearPass Exchange to deploy and use endpoint, access, traffic inspection and data visiblitiy solutions for mobile workfoce productivity and threat prevention.
Citi Tech Talk: Monitoring and Performanceconfluent
The objective of the engagement is for Citi to have an understanding and path forward to monitor their Confluent Platform and
- Platform Monitoring
- Maintenance and Upgrade
In this presentation, we will cover the Central platform which provides a standard Web-based interface that allows you to configure and monitor multiple Aruba Instant networks / Switches from anywhere with a connection to the Internet. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Cloud-Managed-Networks/Technical-Webinar-Aruba-Central-with-Instant-AP/td-p/429366
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
This presentation will offer an overview on what are the frequently occurring 802.1x authentication based issues and how to quickly diagnose/troubleshoot the IAP WLAN network. Check out the webinar recording where this presentation was used. https://attendee.gotowebinar.com/register/5818157412807394306
In this day and age, it's probably a good idea to get your WLAN ready for voice and video. And it's also a good idea to classify and prioritize web applications based on policies you set. Protecting your mobile devices and network infrastructure against outside or inside attacks needs to be part of the plan, too. Join to us to learn more about these and other functions of Aruba's policy enforcement firewall integrated to its access points, switches, and controllers.
Join us at this session to hear about the challenges you might face as you try to support a large group of mobile users and devices for 802.1x authentication. While username & password authentication (eg. 802.1x PEAP) is easily deployed, requiring each device to authenticate with its own unique credential (eg. certificate-based 802.1x EAP-TLS) is a much secure implementation. Join us as we discuss ways to identify the most appropriate 802.1x authentication mechanisms for variety of environments and user profiles.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
This document describes the process for leveraging the ClearPass Guest captive portal to bypass the Captive Network Assistant (web sheet) that is displayed on iOS devices such as iPhone, iPad, and more recently, OS X machines running Lion (10.7) and above.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
Clustering is a new feature introduced in AOS 8.0 that enables seamless roaming of clients between APs, hitless client failover and load balancing of users across Mobility Controllers in the cluster. This solution provides the configuration required to create a cluster of Mobility Controllers that are managed by the same Mobility Master.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Airheads-Tech-Talks-Advanced-Clustering-in-AOS-8-x/td-p/506441
This lab setup document emulates the recommended campus and remote access point networks discussed in the Aruba Campus Networks Validated Reference Design and the Aruba Remote Access Point (RAP) Networks Validated Reference Design. All the screenshots and command-line interface (CLI) configurations in the Aruba Campus Networks Validated Reference Design and the Aruba Remote Access Point (RAP) Networks Validated Reference Design are from this setup.
During this presentation, we will cover a deep dive into Aruba Central and its features. Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Cloud-Managed-Networks/Technical-Webinar-Advance-Aruba-Central/m-p/496064
Nesta apresentação faremos um overview sobre a solução ClearPass da Aruba Networks que traz funções de BYOD, Network Access Control e Gerenciamento de visitantes.
In this presentation, we will run through some Rogue AP troubleshooting scenarios and best practices. The agenda covers Rogue AP Detection, classification techniques and containment, wired containment and wireless containment without Tarpit. Check out the webinar recording where this presentation was used:
http://community.arubanetworks.com/t5/Aruba-Instant-Cloud-Wi-Fi/Technical-Webinar-Recording-Slides-ArubaOS-Rogue-AP/m-p/289230
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
For WLANs to be able to reliably support mission-critical, high-throughput, or time-sensitive applications, RF interference must be continuously monitored. The WLAN must automatically and dynamically adapt to mitigate the effects of any interference in the environment. WLAN infrastructure has to provide the administrators with real-time, historical, and proactive visibility into the air to diagnose and mitigate interference. In this application note we will look at some of the tools that Aruba offers as a part of its WLAN solution that enable administrators to ensure reliable, high performing RF.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
ClearPass OnGuard agents perform endpoint posture assessment and ensure that compliance is met before granting access to the network. This session will cover the ClearPass OnGuard Agent components and work-flow in detail.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Security/Airheads-Tech-Talks-Understanding-ClearPass-OnGuard-Agents/td-p/524288
The application note focuses on configuration and operation of guest access solutions on ArubaOS. The native guest access solution including configuration of the guest access and guest provisioning profiles, guest administration, and captive portal configuration.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
As billions of devices connect to enterprise networks, IT is struggling to gain more visibility and control using multiple, disparate security systems and management tools. ClearPass Exchange fixes this problem by acting as a central decision point, providing context for a unified network access defense for wired and wireless access, and leveraging downstream security and productivity systems and context to improve end-user workflows and secure devices wherever they connect. Learn how to leverage ClearPass Exchange to deploy and use endpoint, access, traffic inspection and data visiblitiy solutions for mobile workfoce productivity and threat prevention.
Citi Tech Talk: Monitoring and Performanceconfluent
The objective of the engagement is for Citi to have an understanding and path forward to monitor their Confluent Platform and
- Platform Monitoring
- Maintenance and Upgrade
Cassandra Tools and Distributed Administration (Jeffrey Berger, Knewton) | C*...DataStax
At Knewton we operate across five different VPCs a total of 29 clusters, each ranging from 3 nodes to 24 nodes. For a team of three to maintain this is not herculean, however good tools to diagnose issues and gather information in a distributed manner are vital to moving quickly and minimizing engineering time spent.
The database team at Knewton has been successfully using a combination of Ansible and custom open sourced tools to maintain and improve the Cassandra deployment at Knewton. I will be talking about several of these tools and giving examples of how we are using them. Specifically I will discuss the cassandra-tracing tool, which analyzes the contents of the system_traces keyspace, and the cassandra-stat tool, which gives real-time output of the operations of a cassandra cluster. Distributed administration with ad-hoc Ansible will also be covered and I will walk through examples of using these commands to identify and remediate clusterwide issues.
About the Speaker
Jeffrey Berger Lead Database Engineer, Knewton
Dr. Jeffrey Berger is currently the lead database engineer at Knewton, an education tech startup in NYC. He joined the tech scene in NYC in 2013 and spent two years working with MongoDB, becoming a certified MongoDB administrator and a MongoDB Master. He received his Cassandra Administrator certification at Cassandra Summit 2015. He holds a Ph.D. in Theoretical Physics from Penn State and spent several years working on high energy nuclear interactions.
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
Discover how to avoid common pitfalls when shifting to an event-driven architecture (EDA) in order to boost system recovery and scalability. We cover Kafka Schema Registry, in-broker transformations, event sourcing, and more.
How Automation And Intelligence Can Simplify Your High AvailabilityPrecisely
The demand for resilient IT systems continues to accelerate. Today’s IBM i customers increasingly understand the need for a high availability solution to keep these critical business systems available and prevent data loss.
An important driver for customers choosing an HA solution is the ease-of-use and automation. As these IBM i customers evaluate how to leverage new technologies and deployments options, like running their HA in a cloud environment, IT resources are challenged to find new approaches to increasing efficiency and productivity. In short, they need an HA solution that requires a minimum of configuration effort and ever-increasing automation.
Assure MIMIX, the leader in IBM i high availability and disaster recovery, has new several capabilities that can dramatically simplify configuration tasks, make monitoring easy and assist customers moving to the cloud. We can help these customers keep their mission-critical business applications running continuously, even while migrating to the cloud. During the webinar, we will show a demo of the highly automated Journal-Driven Configuration that takes the complexity out of setting up Assure MIMIX replication.
In addition to the demo, join us on this webinar to learn about:
- Initial synchronization improvements
- Streamlining migration to a new system with replication
- Support for IBM’s new Virtual Serial Number
Join Marc Trouard-Riolle from Citrix Cloud Product Marketing for the latest presentation in the Citrix Cloud Master Class series.
In this session you will hear about building private enterprise clouds with Citrix CloudPlatform:
Learn about hypervisor, storage and networking considerations within private cloud use cases
Build a tailored availability zone for traditional workloads
See a step-by-step demonstration of building an enterprise private cloud
Francisco Javier Ramirez Urea - Hopla - OSL19marketingsyone
Title: Building Modern Applications with Docker 3.0
Docker Enterprise provides an enterprise grade solution to allow your team to modernize your applications. In this talk we will see how Docker will help us to build, ship and run applications faster. Integrating Docker Enterprise Solutions in our development pipelines.
We will review all new features that came with release 3.0 to improve our application building workflow.
What's new in confluent platform 5.4 online talkconfluent
To stay informed about the latest features in Confluent Platform 5.4 join Martijn Kieboom Solutions Engineer at Confluent, for the ‘What’s New in Confluent 5.4?’ on February 12 at 11 am GMT/ 12 Noon CET. Martijn will talk through the new features including:
Role-Based Access Control and how it enables highly granular control of permissions and platform access
Structured Audit Logs and how they enable the capture of authorization logs
How Multi-Region Clusters deliver asynchronous replication at the topic level, allowing companies to run a single Kafka Cluster across multiple data-centres
Schema validations role in enabling businesses that run Kafka at scale to deliver data compatibility across platforms
Dataservices based on mesos and kafka kostiantyn bokhan dataconf 21 04 18Olga Zinkevych
Topic of presentation: Dataservices based on mesos and kafka
The main points of the presentation: У своїй доповіді Костянтин поділіться досвідом побудови датасервісів на основі таких технологій як: Kafka, Docker, Mesos, Aerospike та Spark. Будуть розглянуті наступні питання: оркестрація, ізоляція, управляння ресурсами, service discovery and load balancing, взаємодія датасервісів. Будуть обговорені проблеми управління ресурсами Java-based та Spark-based сервісів під керування mesos кластера, а також реалізація CI та CD датасервісів.
*CI - continuous integration, CD - continuous delivery
http://dataconf.com.ua/speaker-page/kostiantyn-bokhan.php
https://www.youtube.com/watch?v=4d41DDyKuwU&list=PL5_LBM8-5sLjbRFUtXaUpg84gtJtyc4Pu&t=0s&index=3
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...eG Innovations
A great user experience is key for the success of any Citrix application virtualization or desktop virtualization initiative. To ensure user satisfaction and productivity, Citrix administrators should monitor the user experience proactively, detect times when users are likely to be seeing slowness, pinpoint the cause of such issues and initiate corrective actions to quickly resolve issues, thereby ensuring user satisfaction and productivity.
A key question is where should the monitoring of the Citrix infrastructure be performed from - the network, the server infrastructure, or from the client?
View this presentation to:
• Learn about the different approaches to Citrix user experience monitoring, their benefits and shortcomings
• Hear about a hybrid approach that provides the most cost-effective yet comprehensive monitoring for a Citrix server farm
• See a live demonstration of the hybrid Citrix monitoring approach and its ability to cover all aspects of Citrix user experience
Protecting your data at rest with Apache Kafka by Confluent and Vormetricconfluent
Learn how data in motion is secure within Apache Kafka and the broader Confluent Platform, while data at rest can be secured by solutions like Vormetric Data Security Manager.
Session on CloudStack, intended for new users to CloudStack, provides an overview to varied audience levels information on usages, use cases, deployment and its architecture.
Cloud Platform Symantec Meetup Nov 2014Miguel Zuniga
Openstack Lessons learned
Continuous Integration and Deployment using Openstack
Tuning Openstack for High Availability and Performance in Large Production Deployments
Similar to Large scale, distributed access management deployment with aruba clear pass (20)
Aruba Central user may need a centralized web-server to host captive portal page for their distributed networks across the globe like coffee shops, restaurant or hotels. Aruba central 2.0 has a new feature called Cloud Guest or Guest Management that allows administrator to create a splash page for guest users using Web server and radius server running in the cloud.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Cloud-Managed-Networks/Airheads-Tech-Talks-Cloud-Guest-SSID-on-Aruba-Central/td-p/524320
During this webinar, we will cover AppRF - a suite of application visibility and control features that are part of Aruba's Policy Enforcement Firewall. AppRF is a PEF feature that is designed to give network administrators insight into the applications that are running on their network, and who is using them. Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Aruba-AppRF-AOS-6-x-amp-8-x/td-p/490800
In this presentation, we will cover how the ArubaOS switch virtualization technologies can deliver high-performance and highly available switching while simplifying management and lowering costs. Check out the webinar recording where this presentation was used: https://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Technical-Webinar-Switch-Stacking-ArubaOS-Switch/td-p/471348
In this presentation, we will discuss how IEEE standard 802.3ad and its implications allow third-party devices such as switches, servers, or any other networking device that supports trunking to interoperate with the distributed trunking switches (DTSs) seamlessly. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Technical-Webinar-LACP-and-distributed-LACP-ArubaOS-Switch/td-p/458170
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, e will discuss AirWave 10, a new software build that lets us streamline code, add performance, clustering. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Network-Management/Technical-Webinar-Introduction-to-AirWave-10/td-p/454762
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will discuss how Virtual Switching Framework (VSF) allows supported switches connected to each other through Ethernet connections (copper or fibre) to behave like a single chassis switch. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Controllerless-Networks/Technical-Webinar-Virtual-Switching-Framework-ArubaOS-Switch/td-p/445696
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will discuss how AirGroup configurations have changed to support hierarchical configuration in release 8.2. AirGroup configs will now be profile based and can be applied at any node. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-AirGroup-profiling-changes-across-8-1-amp-8-2/td-p/417153
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will explore the RESTApi as the ClearPass API integrations and further developments are more focused to RESTApi than the other existing API services like xml-rpc, SOAP, etc.Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Security/Technical-Webinar-Getting-Started-with-the-ClearPass-REST-API/td-p/410214
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will discuss the L3 Redundancy Requirement which primarily comes from customers who want to handle the complete Data Center Failure during natural disasters or other catastrophic events. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Layer-3-Redundancy-for-Mobility-Master-ArubaOS/td-p/382029
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will discuss how branch controllers work and run through different deployments examples in 6.x and 8.x.
Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-Manage-Devices-at-Branch/td-p/351983
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
The existing channel and power assignment functions in ARM support channel scanning, channel assignment and power adjustments, locally. Decisions are made locally at the AP without looking at the entire network. Thanks to the dynamic machine learning techniques, AirMatch centralises this function in the Mobility Master while dynamically learning the network and adapting the RF planning for the entire network. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-What-does-AirMatch-do/td-p/314413
These slides were used during our Airheads Meetup Event at Jaarbeurs Utrecht on October 27th 2017.
If you have ideas, new speaker topics and recommendations for the events, please help us to improve for next year’s event by commenting on the community page: http://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Event-The-Netherlands-October-27th-2017/m-p/313566#M75870
These slides were used during our Airheads Meetup Event at Jaarbeurs Utrecht on October 27th 2017.
If you have ideas, new speaker topics and recommendations for the events, please help us to improve for next year’s event by commenting on the community page: http://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Event-The-Netherlands-October-27th-2017/m-p/313566#M75870
These slides were used during our Airheads Meetup Event at Jaarbeurs Utrecht on October 27th 2017.
If you have ideas, new speaker topics and recommendations for the events, please help us to improve for next year’s event by commenting on the community page: http://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Event-The-Netherlands-October-27th-2017/m-p/313566#M75870
These slides were used during our Airheads Meetup Event at Jaarbeurs Utrecht on October 27th 2017.
If you have ideas, new speaker topics and recommendations for the events, please help us to improve for next year’s event by commenting on the community page: http://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Event-The-Netherlands-October-27th-2017/m-p/313566#M75870
In this presentation, we will run through different API types and cases: configuration APIs (REST API), context APIs (NBAPIs), SDN APIs and explain how to make API calls via CLI. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-Configuring-different-APIs-in/td-p/312011
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will be debugging Aruba RAP commands, run through troubleshooting and logs and tackle RAP clusters.
Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-Aruba-Remote-Access-Point-RAP/td-p/310448
In this presentation, we will cover basic requirements and supported topologies for Multizone AP, how to bring up APs in multi version and how the AP's image upgrade differs in 8.x
Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-Multi-zone-AP-and-Centralized/td-p/308499
This webinar will cover how to bring up Aruba Mobility Master, Managed Device & Access Point and also go through some basic troubleshooting commands.Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-Bringing-up-Aruba-Mobility/td-p/307599
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will run through the 8.x Architecture configuration model and share some UI navigation features such as managed controllers and spectrum monitoring, geolocation and maps.
Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-Aruba-8-x-Architecture/td-p/302349
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
More from Aruba, a Hewlett Packard Enterprise company (20)
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
9. 9#ATM16@ArubaNetworks |
ClearPass Cluster
Config database Insight database Session log DB Multi-master cache
Purpose
• Configuration
• Provisioning
• Endpoints
• Profiles
• Guests
• Onboard certificates
• Cluster-wide reporting
• Bandwidth checks
• Access Tracker
• Event Viewer
• Machine authentication
• Session information (CoA)
• Role and posture cache
Replication
Replicated from publisher to all
subscribers
Duplicated at each Insight
node
Not replicated
Full mesh replication within a
Zone
Size 50 MB to 500 MB 1 GB to 200+ GB 1 GB to 100 GB 1 MB to 100 MB
Guidance
Review Endpoint and Guest
cleanup settings
Review database retention
settings
Review cleanup
settings
Configure Zones per location
Databases
10. 10#ATM16@ArubaNetworks |
ClearPass Cluster
• UDP port 123 (NTP)
• TCP port 5432 (PostgreSQL)
• TCP port 443 (HTTPS)
Publisher Standby
Subscriber
NTP, PostgreSQL, HTTPS
NTP, PostgreSQL, HTTPS
Subscriber
Caveats:
• Releases before the latest ClearPass
6.5 release may need additional ports
open
• Port 80 is used to render System
Monitor data from a remote node. Can
be modified using the cluster-wide
parameter “Performance Monitor
Rendering Port”.
• Subscriber to subscriber
communication is not required, as long
as the subscriber will not be promoted
to publisher
Intra-cluster communication
11. 11#ATM16@ArubaNetworks |
ClearPass Cluster
• Join nodes to AD for
MSCHAPv2
• Can join multiple
independent AD domains
• Deploy nodes close to AD
domain controllers
• Can override AD
Password Servers
Active Directory (AD) integration
12. 12#ATM16@ArubaNetworks |
ClearPass Cluster
Publisher
Standby Subscriber Subscriber
Publisher failure
• Subscribers handle authentication requests
• Standby node detects failure and promotes to publisher
• Following operations are affected
• Policy Manager and Guest configuration / provisioning
• Guest, Onboard and Endpoint updates
13. 13#ATM16@ArubaNetworks |
ClearPass Cluster
• Publisher upgrades first
• Subscribers join back post upgrade
• Use the Cluster Upgrade Tool (CUT)
*additional details later
• Plan for sufficient downtime
Upgrade
15. 15#ATM16@ArubaNetworks |
ClearPass Zones
Profile
Publisher
Subscriber Subscriber
C
Subscriber
Subscriber
Zone A
Zone B
P
P
Profile Inputs
(DHCP, HTTP UA
etc.)
Profile Inputs
Profile Inputs
P Profile master node in zone
DB update
Proxy profile input to
profile master node
Profile Inputs
24. 24#ATM16
Monitoring
ClearPass Customers running on the CP 25K server can take advantage of the Integrated
Remote Access Controller remote management features (iDRAC7). The iDRAC7 allows
administrators to monitor, manage, update, troubleshoot, and remediate CP 25K servers
from any location.
iDRAC7
25. 25#ATM16
Monitoring
ClearPass user interfaces enable ClearPass administrators to view Authentication,
Authorization, Accounting, and System events. ClearPass has the capability to store these
messages, encapsulate them and retransmit them as RFC 5424 compliant Syslog
messages to any Syslog Receiver. ClearPass can also format Syslog messages in Log
Event Extended Format (LEEF) and Common Event Format (CEF).
ClearPass Syslog
26. 26#ATM16
Monitoring
ClearPass has a Private Enterprise SNMP MIB exposing 70+ OID’s covering....
ClearPass SNMP
• System information
• Authentication counters
• Authorization counters
• Network traffic counters
• Traps for various system
and application events
27. 27#ATM16
Monitoring
ClearPass Insight is an advanced application to deliver enhanced analytics, in-depth
reporting, and Alerting. Insight provides the ability to track detailed authentication records,
audit trails, and develop systematic reports on network-access trends
ClearPass Insight
• Consolidated Reporting
• In-depth Analytics
• Ready-to-use Templates
• Alerts
33. 33#ATM16
Operations
The Cluster Upgrade Tool is a simple user interface that automates the upgrade procedure
for a ClearPass cluster.
Cluster Upgrade Tool (CUT)
What does it do?
• Helps administrators upgrade multi node clusters (large or small)
• Task automation, reduces operational overhead and time
• Provides pre/post upgrade checks to flag/fix potential issues and ensure cluster health
Technical Details
• Available as a patch for Publishers running 6.2.6, 6.3.x, 6.4.x
• Software images distributed from publisher to subscribers
• Database lock time reduced to minutes versus hours
• Upgrade multiple subscribers simultaneously
• Does not upgrade patches (roadmap feature)
34. 34#ATM16
Operations
Customized upgrade models, choose all or subset
of subscribers. If all are chosen they will be
started after Publisher completes, staggering start
times every 5 minutes
View of entire process as well as access to
individual drilldown logging for Publisher and each
Subscriber
Cluster Upgrade Tool (CUT)
35. 35#ATM16
Operations
• MDM / EMM solutions
• Messaging and / or escalation platforms
• Helpdesk and trouble ticketing solutions
• Log management/retention systems (syslog)
• Network security / compliance engines (bi-directional)
ClearPass Exchange
Leverage ClearPass Exchange to integrate with existing Enterprise management systems.
36. 36#ATM16
Operations
ClearPass Policy Manager provides the ability to push scheduled data backups securely to
an external server. You can push the data using the SFTP and SCP protocols.
Backups
37. 37#ATM16
Operations
When you need to review performance or troubleshoot issues in detail, Policy Manager can
compile and save transactional and diagnostic data into several log files. These files are
saved in Local Shared Folders and can be downloaded to your computer.
Log collection
38. 38#ATM16
Operations
From the Log Configuration menu, you can view and change the verbosity of the data
collected into the Log Files.
Available levels include:
DEBUG
INFO
WARN
ERROR
FATAL
Log Configuration
39. 39#ATM16
Operations
Remote Assistance enables the ClearPass administrator to allow an Aruba Networks
support engineer to remotely log in using Secured Shell (SSH) to the ClearPass server and
also view the UI to debug any issues customer is facing or to perform pro-active monitoring
of the server.
Remote Assistance
41. 41#ATM16
Enterprise ClearPass Deployment
Design Phase
• Identify individual use cases
• Determine necessary ClearPass Policy Manager (CPPM) Modules
• Discover/Determine Customer Environments
•Regional Data Centers
•Estimated number of Endpoints per region
• Define Initial CPPM Cluster Architecture
• Define Licensing requirements
Use Case Analysis
(Design)
Planning and
Pilot
Design
Modifications
Production
Roll out
42. 42#ATM16
Planning/Pilot Phase
• Develop draft roll out plan for Enterprise
• Develop communications plan for notifying End Users
• Identify pilot locations to meet criteria set in Use Cases
• Leverage environment as close to production for pilot testing
• Capture pilot results
Use Case Analysis
Planning and
Pilot
Design
Modifications
Production
Roll out
Enterprise ClearPass Deployment
43. 43#ATM16
Design Modification Phase
• Analyze pilot results to determine effectiveness of CPPM Modules based on Use
Case requirements
• Adjust Architecture Design as necessary
•Additional or missed backend business processes identified
•Discovery of new or unexpected environment elements
•Endpoint devices
•Infrastructure obstacles
Use Case Analysis
Planning and
Pilot
Design
Modifications
Production
Roll out
Enterprise ClearPass Deployment
44. 44#ATM16
Production Roll out Phase
• Adjust deployment plan for production roll out
• Begin communication plan to end users with expected changes
• Execute deployment according to schedule
Use Case Analysis
Planning and
Pilot
Design
Modifications
Production
Roll out
Enterprise ClearPass Deployment
45. 45#ATM16
Join Aruba’s Titans of Tomorrow
force in the fight against network
mayhem. Find out what your
IT superpower is.
Share your results with friends
and receive a free superpower
t-shirt.
www.arubatitans.com
46. Thank you
Venkatraju T V – venkatraju@hpe.com
Steve Eubanks – steve.eubanks@hpe.com
Drew Wyskida – drew.wyskida@hpe.com
Cluster for scale and redundancy
One Publisher, multiple subscribers
Writes allowed only on the publisher
Publisher is typically the single point for all management operations
Always setup a Standby that will take over the publisher role on publisher failure
Insight – cluster-wide reporting, analytics and alerts
- Most deployments should enable Insight on two nodes in the cluster for fault-tolerance
- Insight data is duplicated (not replicated). All ClearPass nodes in the cluster stream events to all nodes in the cluster
- Insight is not “Zone” aware
- Typical deployment: enable Insight on Publisher and Subscriber
- Limit use of Insight database as an authorization source where possible
- The node designated as ”Insight master” generates reports and alerts
Each ClearPass must be joined to the Active Directory domain for EAP-PEAP MSCHAPv2 authentications
Nodes can be joined to multiple independent AD forests or domains
Deploy ClearPass nodes close to AD domain controllers and join to local AD
Configure AD Password Servers for each node to use a local/nearby AD domain controller
Publisher upgrades first
Subscribers join back post upgrade
Plan adequate downtime depending on DB size, number of nodes and nature of deployment
Use the Cluster Upgrade Tool (CUT) to automate upgrade workflow
Zone:
Groups of nodes can be assigned to a “Zone”. Zones are typically geographic boundaries.
Cache replication is limited to nodes within a zone
Other features like Profile and OnGuard are also affected by Zone definition
Profile: classifies endpoints using attributes obtained from software components called “Collectors”
Profile nodes form temporary clusters per zone:
A master node is elected per zone
Any node in the cluster can handle incoming profile data (ex. any node can be setup to receive DHCP traffic)
All nodes in the zone proxy profiling requests to current active master
Master correlates profile information, runs profile rules and updates Publisher DB
Updated profile information from publisher DB replicates to all nodes in the cluster (config DB replication)
* Simplest and most convenient deployment
* All nodes in the cluster are in the same location / data center
* Nodes are connected by low latency, high bandwidth network links
Typical deployment: Large university
Multiple locations, possibly connected by high latency network links
Publisher and Standby in a central location
One or more nodes at each location based on capacity and redundancy requirements
Each location is configured as a Zone
Recommendation: Deploy ClearPass nodes close to authentication source.
Recommendation: Whitelist ClearPass traffic in WAN accelerators / firewalls between nodes
Multiple independent clusters
Con: Multiple independent points for configuration and reporting
One cluster could use another cluster as an Authentication source
Use cases:
Functional clusters: Ex. Separate AAA and Guest cluster; HCG cluster and AAA cluster
Regional clusters: Cluster per region / location
Large clusters: Recommend limiting cluster size to 30 nodes
Recommend latency of <200ms between nodes in a cluster
ClearPass Access Tracker, Audit Viewer and Event Viewer user interfaces enable ClearPass administrators to view Authentication, Authorization, Accounting, and System events. ClearPass has the capability to store these messages, encapsulate them and retransmit them as RFC 5424 compliant Syslog messages to any Syslog Receiver. ClearPass can also format Syslog messages in Log Event Extended Format (LEEF) and Common Event Format (CEF).
Policy Manager sends SNMP traps that expose the following server information:
System up-time— Provides information about how long the system is running.
Network interface statistics [up/down]— Provides information if the network interface is up or down.
Process monitoring information— Check for the processes that should be running. Sends traps if there is a change in value of maximum and minimum numbers.
Disk usage— Check for disk space usage of a partition. The agent can check the amount of available disk space and make sure it is above the set limit.
CPU load information— Check for unreasonable load average values. For example, if 1-minute CPU load average exceeds the configured value [in percentage] then system sends a trap to the configured destination.
Memory usage— Report the memory usage of the system.
ClearPass Insight is an advanced application to deliver enhanced analytics, in-depth reporting, and Alerting. Insight provides the ability to track detailed authentication records, audit trails, and develop systematic reports on network-access trends.
Additional features associated with Insight are described below.
Consolidated Reporting. Insight is capable of aggregating data from multiple Policy Manager appliances, or external stores, containing archived network access logs. It presents a powerful combination of near real-time analytics, as well as the ability to look into the past to satisfy historical analysis and compliance needs.
In-depth Analytics. Insight uses a powerful analytics engine that mines network access logs in order to generate trending report on various parameters. Network managers can utilize these trends to get an overview of authentication and access activity, elaborate client access distribution, load-averages, and analyze authentication traffic flow through various network devices.
Ready-to-use Templates. Insight includes several ready-to-use templates that help reduce the time associated with creating custom reports. The templates guide users through the process of capturing data for a number of use cases with minimal configuration.
Alerts. Insight can generate near real-time alerts on anomalous network activity. Network managers can configure alerts based on a number of various parameters. Alerts can be delivered via SMS or e-mail notification to multiple recipients to prompt action.
Make networks mobility-defined instead of fixed
Make networks mobility-defined instead of fixed
This is a sample Two Pictures with Captions slide ideal for including two pictures with brief descriptive statements.
To Replace the Pictures on this Sample Slide (this applies to all slides in this template that contain replaceable pictures)
Select the sample picture and press Delete. Click the icon inside the shape to open the Insert Picture dialog box. Navigate to the location where the picture is stored, select desired picture and click on the Insert button to fit the image proportionally within the shape.
Note: Do not right-click the image to change the picture inside the picture placeholder. This will change the frame size of the picture placeholder. Instead, follow the steps outlined above.
Tip: use the Crop tool to reposition a picture within a placeholder. From the Picture Tools Format tab on the ribbon, click the Crop button. Click and drag the picture within the placeholder to reposition. To scale the picture within the placeholder (while Crop is active), grab a round corner handle and drag to resize. Hold Shift key to constrain picture aspect ratio when resizing.
Make networks mobility-defined instead of fixed
Contest Overview
- Aruba is running a marketing campaign where we ask “What is your IT superpower?”
- Go to arubatitans.com to take a quick quiz to discover your superpower.
- Share your results with friends and encourage others to play the game
- Once you share, go to the Social and Community Hub, Gracia Commons, 3rd fl to pick up your free superpower shirt.
FAQ
1. What do I have to do to get a shirt?
Share your IT superpower results with friends and encourage them to play the game. Then come to the Social & Community Hub, 3rd Floor Gracia Commons to pick up your shirt. We just need your name and badge for verification.
2. Where do I get my shirt?
Come to the #ATM16 Social & Community hub located at Gracia Commons on the 3rd Floor
3. Do I have to be at the event to get the shirt?
Yes. You have to be at #ATM16 to get a shirt.
4. Can I get my colleague a shirt? He/she is in a session right now.
Unfortunately not. We encourage your colleague to participate so that they can win a shirt for themselves.
5. Can I bring a shirt home for my colleague?
Unfortunately not. You have to be at #ATM16 to get a shirt.
6. You don’t have a shirt in my size, can you ship the right size to me later?
Unfortunately not. Please select the best size from our inventory on site.