Best Practices for Migrating Previous Versions of Cisco Unified CommunicationsCisco Canada
People that are using previous releases of Cisco Unified Communications Manager (4.X, 5.X, 6.X, 7.X and 8.0) will need to understand the changes in the newest version of Cisco Unified Communications Manager (CUCM) 9.x and how it impacts them from an upgrade perspective.
Enhance your Collaboration Experience by Enabling Pervasive Video on your Cis...Cisco Canada
Shawn Cardinal, Cisco Collaboration CSE discusses enhancing your collaboration experience by enabling pervasive video on your Cisco Unified Communications Manager at Cisco Connect Toronto 2015.
This deck covers the value of using Cisco Prime Collaboration to manage your collaboration environment. Discover new ways of provisioning, reporting and troubleshooting through the single-pane-of-glass that is Cisco Prime Collaboration. For more information please visit our website: http://www.cisco.com/ca/
As pervasive Collaboration Solutions explode out of the boardroom and disrupt our workspace, we are challenged to provide cost effective and scalable conferencing solutions to accommodate these unprecedented levels of continuous growth. More so, the Enterprise is equally torn between how to efficiently deliver both ad hoc and scheduled Conferencing Solutions without oversubscribing their resource base. Cloud vs On-Prem solutions are equally an important factor to consider as part of the overall design. For more information please visit our website here: http://www.cisco.com/web/CA/index.html
Cisco Pervasive Conferencing where Voice, Video and Web MeetCisco Canada
TelePresence is now WebEX enabled. With the expansion of virtual teams, and the increased number of mobile road warriors it can be nearly impossible to get everyone on your team together in a room at the same time. Communication technologies such as TelePresence and WebEX can help but what happens when you need to join these tools together to accommodate a last minute change in plans. Let us introduce you to Cisco Pervasive Conferencing. Pervasive Conferencing is an industry leading standards - based approach that brings together the three most common communication tools used in the business workplace today; voice, video and web collaboration.
Best Practices for Migrating Previous Versions of Cisco Unified CommunicationsCisco Canada
People that are using previous releases of Cisco Unified Communications Manager (4.X, 5.X, 6.X, 7.X and 8.0) will need to understand the changes in the newest version of Cisco Unified Communications Manager (CUCM) 9.x and how it impacts them from an upgrade perspective.
Enhance your Collaboration Experience by Enabling Pervasive Video on your Cis...Cisco Canada
Shawn Cardinal, Cisco Collaboration CSE discusses enhancing your collaboration experience by enabling pervasive video on your Cisco Unified Communications Manager at Cisco Connect Toronto 2015.
This deck covers the value of using Cisco Prime Collaboration to manage your collaboration environment. Discover new ways of provisioning, reporting and troubleshooting through the single-pane-of-glass that is Cisco Prime Collaboration. For more information please visit our website: http://www.cisco.com/ca/
As pervasive Collaboration Solutions explode out of the boardroom and disrupt our workspace, we are challenged to provide cost effective and scalable conferencing solutions to accommodate these unprecedented levels of continuous growth. More so, the Enterprise is equally torn between how to efficiently deliver both ad hoc and scheduled Conferencing Solutions without oversubscribing their resource base. Cloud vs On-Prem solutions are equally an important factor to consider as part of the overall design. For more information please visit our website here: http://www.cisco.com/web/CA/index.html
Cisco Pervasive Conferencing where Voice, Video and Web MeetCisco Canada
TelePresence is now WebEX enabled. With the expansion of virtual teams, and the increased number of mobile road warriors it can be nearly impossible to get everyone on your team together in a room at the same time. Communication technologies such as TelePresence and WebEX can help but what happens when you need to join these tools together to accommodate a last minute change in plans. Let us introduce you to Cisco Pervasive Conferencing. Pervasive Conferencing is an industry leading standards - based approach that brings together the three most common communication tools used in the business workplace today; voice, video and web collaboration.
A deep technical dive into the various integration scenarios available through our expanded product portfolio on the Infrastructure side. During this session we will bring you up to speed on the Telepresence server the TIP implementation. We will also dive into what a trunk between CUCM and VCS will bring to your video and telephony deployments while showcasing best practices to help you get started. Other topics will cover the strength of combining the Content server with the Show and Share product for a truly strong corporate streaming strategy. Overall a deep technical session that aims to deepen your knowledge of our unique infrastructure proposition
Avaya Aura® Communication Manager Greater than 5 Nines AvailabilityAvaya Inc.
A vital component of Avaya Aura® is Communication Manager (AACM), an industry best-in-class redundant server solution that takes into consideration the available uptime today’s businesses demand. This is accomplished by utilizing the high availability standard of nines percentage approach, for AACM the availability is “Greater than 5 Nines” or 99.999%+.
Avaya offers a variety of communication software, servers, gateways and availability features to meet the needs of small, midsize and large enterprises. Avaya can architect a “Five Nines” (99.999% availability) or better solution for any customer at highly competitive price points
Some vendors have different perspectives as to what Five Nines means and how it may be achieved. This document aims to dispel some misconceptions in the market and show how Avaya achieves Five Nines across a range of customer scenarios.
-PacketBase.com
This presentation provides an overview of some of the concepts and functions associated with z/OS Communications Server's exploitation of the System z sysplex capability. This includes topics such as dynamic VIPA, sysplex distributor, and sysplex autonomics.
Managing an Enterprise WLAN with Cisco Prime NCS & WCSCisco Mobility
How to use Cisco Prime Network Control System (NCS) & WCS to deploy and manage your wireless network, an advanced technical deep-dive. Includes migration tips from WCS to NCS. Learn More: http://www.cisco.com/go/wireless
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...zOSCommserver
This presentation describes how IBM Multi-site Workload Lifeline plays a key role in solving two major problems in the Enterprise. The first is enabling intelligent load balancing of TCP/IP workloads across two sites at unlimited distances for near continuous availability. The second role is reducing downtime for planned outages by rerouting workloads from one site to another without disruption to users.
2397 The MQ Appliance as a messaging in a box and MQ MFT hub solutionSandeep Chellingi
MQ Appliance is ready to help you Upgrade & Consolidate all your Distributed MQ footprint to a pair of HA MQ Appliances. Also come listen to how the MQ Appliance makes a perfect MQ/MFT Hub and how it can help you with a "Metadata Driven Framework" around the implementation of MQ/MFT
Making a Pain-free Migration to Unified CommunicationsReadWrite
Every firm, company or enterprise with distributed data and voice networks is looking for ways to control costs and increase efficiency. To achieve these goals, businesses need to integrate both voice and data onto a single, converged network to reduce costs and improve productivity. A converged voice and data network is the foundation for Unified Communications (UC), which fosters productivity through mobility and collaboration. Mobile technology allows users to work smarter with simple, end-to-end solutions that combine time-saving communication tools that boost user performance, such as virtual private networks and wireless applications. UC also promotes effective collaboration by connecting people with the right resources the first time, thereby increasing productivity. This paper examines the value of UC applications, tools and technologies to provide guidance for pain-free migration to a more efficient and high-performance business environment.
A deep technical dive into the various integration scenarios available through our expanded product portfolio on the Infrastructure side. During this session we will bring you up to speed on the Telepresence server the TIP implementation. We will also dive into what a trunk between CUCM and VCS will bring to your video and telephony deployments while showcasing best practices to help you get started. Other topics will cover the strength of combining the Content server with the Show and Share product for a truly strong corporate streaming strategy. Overall a deep technical session that aims to deepen your knowledge of our unique infrastructure proposition
Avaya Aura® Communication Manager Greater than 5 Nines AvailabilityAvaya Inc.
A vital component of Avaya Aura® is Communication Manager (AACM), an industry best-in-class redundant server solution that takes into consideration the available uptime today’s businesses demand. This is accomplished by utilizing the high availability standard of nines percentage approach, for AACM the availability is “Greater than 5 Nines” or 99.999%+.
Avaya offers a variety of communication software, servers, gateways and availability features to meet the needs of small, midsize and large enterprises. Avaya can architect a “Five Nines” (99.999% availability) or better solution for any customer at highly competitive price points
Some vendors have different perspectives as to what Five Nines means and how it may be achieved. This document aims to dispel some misconceptions in the market and show how Avaya achieves Five Nines across a range of customer scenarios.
-PacketBase.com
This presentation provides an overview of some of the concepts and functions associated with z/OS Communications Server's exploitation of the System z sysplex capability. This includes topics such as dynamic VIPA, sysplex distributor, and sysplex autonomics.
Managing an Enterprise WLAN with Cisco Prime NCS & WCSCisco Mobility
How to use Cisco Prime Network Control System (NCS) & WCS to deploy and manage your wireless network, an advanced technical deep-dive. Includes migration tips from WCS to NCS. Learn More: http://www.cisco.com/go/wireless
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...zOSCommserver
This presentation describes how IBM Multi-site Workload Lifeline plays a key role in solving two major problems in the Enterprise. The first is enabling intelligent load balancing of TCP/IP workloads across two sites at unlimited distances for near continuous availability. The second role is reducing downtime for planned outages by rerouting workloads from one site to another without disruption to users.
2397 The MQ Appliance as a messaging in a box and MQ MFT hub solutionSandeep Chellingi
MQ Appliance is ready to help you Upgrade & Consolidate all your Distributed MQ footprint to a pair of HA MQ Appliances. Also come listen to how the MQ Appliance makes a perfect MQ/MFT Hub and how it can help you with a "Metadata Driven Framework" around the implementation of MQ/MFT
Making a Pain-free Migration to Unified CommunicationsReadWrite
Every firm, company or enterprise with distributed data and voice networks is looking for ways to control costs and increase efficiency. To achieve these goals, businesses need to integrate both voice and data onto a single, converged network to reduce costs and improve productivity. A converged voice and data network is the foundation for Unified Communications (UC), which fosters productivity through mobility and collaboration. Mobile technology allows users to work smarter with simple, end-to-end solutions that combine time-saving communication tools that boost user performance, such as virtual private networks and wireless applications. UC also promotes effective collaboration by connecting people with the right resources the first time, thereby increasing productivity. This paper examines the value of UC applications, tools and technologies to provide guidance for pain-free migration to a more efficient and high-performance business environment.
Justifying Migration of legacy process control systemsBrian Thomas
Why migrate your control system now?
Legacy Systems are hard to maintain…
• They have limited spare parts (and failures increase…)
• The run on old PC hardware and operating systems
• They provide limited communications and diagnostics
• And the people who know them are retiring!
A migration to a modern, sustainable control system will provide new tools to connect to new systems that provide benefits in addition to reliability and parts availability. Their open communications architecture allows for easier connectivity to Historians, Advanced Control, MES for PlantPAx.
This presentation covers the questions asked, migration strategies and risks, and steps that are needed for a control system migration. Two case studies with different approaches are described and the results summarized.
Is your enterprise ready for a real Unified Communications strategy. Find out how unified communications can help give your business the power, flexibility and speed you need to compete.
Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...Cisco Canada
learn the latest enhancements on architecture and dialplan for rich media environments which include voice and video and desktop. The products and solutions discussed are relevant for any deployment of SIP, H.323, audio and video endpoints (either hard endpoints or soft clients). Some of the newer features/capabilities we'll discuss include: Global Dial Plan Replication (GDPR), VCS working as a gateway for cross platform B2B. I will discuss call control integrations with Cisco Unified Communications Manager 10.x and Cisco Video Communications Server 8.x and will give guidance on architectural deployments with Cisco Unified Communications Manager on most common scenarios (single site, multiple site, SME topology) for both point-to-point and multipoint calls. For more information please visit our website here: http://www.cisco.com/web/CA/index.html
Device Programmability with Cisco Plug-n-Play SolutionCisco DevNet
Cisco Open Plug-n-Play solution allows customers to reduce the costs associated with deployment/installation of network devices, increase the speed and reduce the complexity of deployments without compromising the security. Using Cisco Plug-n-Play solution, customers can do Zero Touch Installs of Cisco gear in various deployment scenarios and deployment locations.
Watch the DevNet 2052 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=91108&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Tips to deploy a production grade Kubernetes cluster using SUSE CaaS Platfrom v3.
Created joinly with my colleague Martin Weiss to be used on SUSECON 2019
The DevOps model is rapidly transforming IT operations and development practices. But what are the precursors necessary to implement DevOps? To achieve an agile, virtualized, and highly automated IT environment, what technological requirements need to be in place? OpenStack has the potential to facilitate DevOps implementation and practices at several different layers in the data center. In this session we'll quickly discuss what DevOps is, then discuss many components that are logically required to move towards DevOps in your environment. Finally we'll explore in depth several ways OpenStack can provide these baseline components.
Watch the DevNet 1104 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92695&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
3 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 2013Puppet
"3 Years of Puppet at Cisco: The Secrets to Our Success" by Keith Chambers and Ryan Uber, Cisco WebEx.
Presentation Overview: WebEx Social (WxS) is an enterprise social networking product by Cisco. Customers can subscribe to WxS as a cloud service or they can purchase a license and run WxS on-premise. Puppet is at the core of our technology stack that includes MongoDB, Solr, RabbitMQ, memcached, ZooKeeper, Nagios, and Graphite. We love Puppet. We pioneered embedding Puppet in Cisco products 3 years ago and have been tireless advocates ever since. We have learned valuable technology/process/culture lessons and developed reusable patterns for: - Scaling to thousands hosts with Puppet - Ensuring host upgrades are 100% reliable - Avoiding Puppet codebase spaghetti - Detecting and eliminating system drift at scale - Creating a culture of shared responsibility through architecture design.
Speaker Bio: Keith Chambers,Technical Leader, Cisco
Keith Chambers is the platform architect for the WebEx Social product at Cisco. He joined Cisco in 2000 and is based out of Seattle Washington. In his current role, Keith leads the engineering team responsible for deploying and operating WebEx Social. Prior to joining the WebEx Social team, Keith worked in Cisco's Unified Communication Business Unit and Technical Assistance Center. Keith was instrumental in the successful virtualization of Cisco's entire Unified Communications portfolio and spoke at VMworld 2009 on the topic of "virtualizing real-time applications". VMware presented Keith with their prestigious vExpert award in 2009. Outside of Cisco, Keith is a house deejay and producer. He enjoys traveling the world and spending time with his family, friends, and beautiful wife Jackie.
Breakout sessions tijdens Proact's SYNC 2013.
Cisco UCS Director - Live demo
Cisco UCS Director
Yvo Wiskerke
Solution Architect in Dutch Data Centre and Virtualisation Team
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.