Przemysław Borek - Cisco Systems
Language: English
Service orchestration in provider network, Tail-f
Register to the next PLNOG edition today: krakow.plnog.pl
Next Generation Nexus 9000 ArchitectureCisco Canada
In the upcoming year, 2016, the industry will see a significant capacity, capability and cost point shift in Data Center switching. The introduction of 25/100G supplementing the previous standard of 10/40G at the same cost points and power efficiency which represents a 250% increase in capacity for roughly the same capital costs is just one example of the scope of the change. These changes are occurring due to the introduction of new generations of ASICs leveraging improvements in semiconductor fabrication combined with innovative developments in network algorithms, SerDes capabilities and ASIC design approaches. This session will take a deep dive look at the technology changes enabling this shift and the architecture of the next generation nexus 9000 Data Center switches enabled due to these changes. Topics will include a discussion of the introduction of 25/50/100G to compliment existing 10/40G, why next generation fabrication techniques enable much larger forwarding scale, more intelligent buffering and queuing algorithms and embedded telemetry enabling big data analytics based on network traffic
Content Delivery Networks (CDN) play a critical role in optimizing network bandwidth resources and improving content delivery performance. This session covers the architecture of a content distribution service with emphasis on the where and how content origination occurs, methods of distribution, and the impact on network resources. Key principles are highlighted that enable you to maximize the value of a CDN. These caching principles are applicable to any CDN technology whether deployed by the content provider, content aggregator, content distributor, or content consumer. Content delivery architectures are evaluated on how well they serve different content types including Adaptive Bit Rate video such as Apple's HTTP Live Streaming, Microsoft's HTTP Smooth Streaming, and DASH methods. Attention is focused on dimensioning the resources (e.g. cloud compute, storage, and network capacity) to enable efficient content distribution and CDN component optimization. Cisco's Open Media Distribution is used as a reference implementation in the presentation to describe and illustrate these principles.
Cisco® Application Centric Infrastructure (ACI) is an innovative architecture that radically simplifies, optimizes, and accelerates the entire application deployment lifecycle. Cloud, mobility, and big data applications are causing a shift in the data center model. Cisco ACI redefines the power of IT, enabling IT to be more responsive to changing business and application needs, enhancing agility, and adding business value. Cisco ACI delivers a transformational operating model for next-generation data center and cloud applications. This Cisco ACI hands lab will step you through from the ACI Fabric concepts to deployment. • Cisco ACI Overview • ACI Fabric Discovery • ACI Building Basic Network Constructs • ACI Building Policy Filters and Contracts • : Deploying a 3-Tier Application Network Profile • ACI Integrating with VMware • Deploying a Service Graph with Application Network Profile • Exploring Monitoring and Troubleshooting
Application Engineered Routing: Allowing Applications to Program the NetworkCisco Canada
<p>Over the past decade, service providers have invested heavily in network infrastructure due to the exploding growth in IP traffic. Lack of advanced interaction between applications and network infrastructure has contributed to this challenging situation in many ways including stifling service innovation, inefficient use of capital resources, and increased complexity leading to a surge in operating expenses. To solve these challenges a breakthrough solution called Application Engineered Routing (AER) was created based on four architectural goals: simple, agile, scalable, and programmable with three main components: purpose-built applications, intelligent SDN controller, and network infrastructure enabled with Segment Routing. Provided is an in-depth overview of AER with a focus on a phased implementation within current NGN environments. Covered will be business outcomes enabled by AER, use cases, components which comprise AER, and a phased implementation approach to transform current NGN environments to an Evolved Programmable Network
Next Generation Nexus 9000 ArchitectureCisco Canada
In the upcoming year, 2016, the industry will see a significant capacity, capability and cost point shift in Data Center switching. The introduction of 25/100G supplementing the previous standard of 10/40G at the same cost points and power efficiency which represents a 250% increase in capacity for roughly the same capital costs is just one example of the scope of the change. These changes are occurring due to the introduction of new generations of ASICs leveraging improvements in semiconductor fabrication combined with innovative developments in network algorithms, SerDes capabilities and ASIC design approaches. This session will take a deep dive look at the technology changes enabling this shift and the architecture of the next generation nexus 9000 Data Center switches enabled due to these changes. Topics will include a discussion of the introduction of 25/50/100G to compliment existing 10/40G, why next generation fabrication techniques enable much larger forwarding scale, more intelligent buffering and queuing algorithms and embedded telemetry enabling big data analytics based on network traffic
Content Delivery Networks (CDN) play a critical role in optimizing network bandwidth resources and improving content delivery performance. This session covers the architecture of a content distribution service with emphasis on the where and how content origination occurs, methods of distribution, and the impact on network resources. Key principles are highlighted that enable you to maximize the value of a CDN. These caching principles are applicable to any CDN technology whether deployed by the content provider, content aggregator, content distributor, or content consumer. Content delivery architectures are evaluated on how well they serve different content types including Adaptive Bit Rate video such as Apple's HTTP Live Streaming, Microsoft's HTTP Smooth Streaming, and DASH methods. Attention is focused on dimensioning the resources (e.g. cloud compute, storage, and network capacity) to enable efficient content distribution and CDN component optimization. Cisco's Open Media Distribution is used as a reference implementation in the presentation to describe and illustrate these principles.
Cisco® Application Centric Infrastructure (ACI) is an innovative architecture that radically simplifies, optimizes, and accelerates the entire application deployment lifecycle. Cloud, mobility, and big data applications are causing a shift in the data center model. Cisco ACI redefines the power of IT, enabling IT to be more responsive to changing business and application needs, enhancing agility, and adding business value. Cisco ACI delivers a transformational operating model for next-generation data center and cloud applications. This Cisco ACI hands lab will step you through from the ACI Fabric concepts to deployment. • Cisco ACI Overview • ACI Fabric Discovery • ACI Building Basic Network Constructs • ACI Building Policy Filters and Contracts • : Deploying a 3-Tier Application Network Profile • ACI Integrating with VMware • Deploying a Service Graph with Application Network Profile • Exploring Monitoring and Troubleshooting
Application Engineered Routing: Allowing Applications to Program the NetworkCisco Canada
<p>Over the past decade, service providers have invested heavily in network infrastructure due to the exploding growth in IP traffic. Lack of advanced interaction between applications and network infrastructure has contributed to this challenging situation in many ways including stifling service innovation, inefficient use of capital resources, and increased complexity leading to a surge in operating expenses. To solve these challenges a breakthrough solution called Application Engineered Routing (AER) was created based on four architectural goals: simple, agile, scalable, and programmable with three main components: purpose-built applications, intelligent SDN controller, and network infrastructure enabled with Segment Routing. Provided is an in-depth overview of AER with a focus on a phased implementation within current NGN environments. Covered will be business outcomes enabled by AER, use cases, components which comprise AER, and a phased implementation approach to transform current NGN environments to an Evolved Programmable Network
Orchestrating NFV Workloads in Multiple CloudsMichelle Holley
Open Network Automation Platform (ONAP) is missioned to deploy and manage VNFs on multiple infrastructure environments, including virtualized infrastructure and cloud native. Workload deployment and orchestration in multiple clouds is expected to play an essential role in ONAP operational success. This talk introduces overall ONAP architecture and orchestration workflow, and related supporting functions such as homing and optimization.
Speaker: Bin Hu, Bin is an innovation thought-leader in NFV, SDN and Cloud. He is the Convener of OPNFV's Technical Community, PTL of IPv6 and PTL of Gluon in OpenStack for the next generation of NFV networking services. He was the Winner of OPNFV 2015 Annual Award.
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Dr. Christos Kolias – Senior Research Scientist
Keynote Title: “NFV: Empowering the Network”
Keynote Abstract: Network Functions Virtualization (NFV) envisions and promises to change the service provider landscape and has emerged as one of one of today’s significant trends. Although less than two years old, NFV has garnered the industry’s full attention and support. Moving swiftly, a number of key accomplishments have already taken place, and a lot more work is currently under way within ETSI NFV while we are embarking on its future phase. Various proofs-of-concepts (ranging from vEPC to vCPE, vIMS and vCDN) are being developed while issues such as open source and SDN are becoming key ingredients as the can play a pivotal role.
Dr. Christos Kolias' Bio: Christos Kolias is a senior research scientist at Orange Silicon Valley (a subsidiary of Orange). Christos is a co-founder of the ETSI NFV group and had led the formation of ONF’s Wireless & Mobile working group. He has lectured on NFV and SDN at several events. Christos has more than 15 years of experience in networking, he is the originator of Virtual Output Queueing (VOQ) used in packet switching. He holds a Ph.D. in Computer Science from UCLA.
---------------------------------------------------
★ Resources ★
Zerista: http://lcu14.zerista.com/event/member/137765
Google Event: https://plus.google.com/u/0/events/cpeksim4hr4ghhuufv5ic4viirs
Video: https://www.youtube.com/watch?v=tFDnj_342n4&list=UUIVqQKxCyQLJS6xvSmfndLA
Etherpad: http://pad.linaro.org/p/lcu14-400a
---------------------------------------------------
★ Event Details ★
Linaro Connect USA - #LCU14
September 15-19th, 2014
Hyatt Regency San Francisco Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
Integration and Interoperation of existing Nexus networks into an ACI Archite...Cisco Canada
Mike Herbert, Principal Engineer INSBU, at Cisco Connect Toronto focused on the integration and interoperation of existing nexus networks into an ACI architecture.
Atmosphere 2016 - Justin arbuckle - A tale of the constructorsPROIDEA
We are constructors of worlds, of products previously not imagined. What does it mean to be a constructor and how is this different to just hanging out code someone else told you was needed? Oh.. And we might talk about the science fiction of stanislaw lem and the adventures of his constructor robots.
Orchestrating NFV Workloads in Multiple CloudsMichelle Holley
Open Network Automation Platform (ONAP) is missioned to deploy and manage VNFs on multiple infrastructure environments, including virtualized infrastructure and cloud native. Workload deployment and orchestration in multiple clouds is expected to play an essential role in ONAP operational success. This talk introduces overall ONAP architecture and orchestration workflow, and related supporting functions such as homing and optimization.
Speaker: Bin Hu, Bin is an innovation thought-leader in NFV, SDN and Cloud. He is the Convener of OPNFV's Technical Community, PTL of IPv6 and PTL of Gluon in OpenStack for the next generation of NFV networking services. He was the Winner of OPNFV 2015 Annual Award.
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Dr. Christos Kolias – Senior Research Scientist
Keynote Title: “NFV: Empowering the Network”
Keynote Abstract: Network Functions Virtualization (NFV) envisions and promises to change the service provider landscape and has emerged as one of one of today’s significant trends. Although less than two years old, NFV has garnered the industry’s full attention and support. Moving swiftly, a number of key accomplishments have already taken place, and a lot more work is currently under way within ETSI NFV while we are embarking on its future phase. Various proofs-of-concepts (ranging from vEPC to vCPE, vIMS and vCDN) are being developed while issues such as open source and SDN are becoming key ingredients as the can play a pivotal role.
Dr. Christos Kolias' Bio: Christos Kolias is a senior research scientist at Orange Silicon Valley (a subsidiary of Orange). Christos is a co-founder of the ETSI NFV group and had led the formation of ONF’s Wireless & Mobile working group. He has lectured on NFV and SDN at several events. Christos has more than 15 years of experience in networking, he is the originator of Virtual Output Queueing (VOQ) used in packet switching. He holds a Ph.D. in Computer Science from UCLA.
---------------------------------------------------
★ Resources ★
Zerista: http://lcu14.zerista.com/event/member/137765
Google Event: https://plus.google.com/u/0/events/cpeksim4hr4ghhuufv5ic4viirs
Video: https://www.youtube.com/watch?v=tFDnj_342n4&list=UUIVqQKxCyQLJS6xvSmfndLA
Etherpad: http://pad.linaro.org/p/lcu14-400a
---------------------------------------------------
★ Event Details ★
Linaro Connect USA - #LCU14
September 15-19th, 2014
Hyatt Regency San Francisco Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
Integration and Interoperation of existing Nexus networks into an ACI Archite...Cisco Canada
Mike Herbert, Principal Engineer INSBU, at Cisco Connect Toronto focused on the integration and interoperation of existing nexus networks into an ACI architecture.
Atmosphere 2016 - Justin arbuckle - A tale of the constructorsPROIDEA
We are constructors of worlds, of products previously not imagined. What does it mean to be a constructor and how is this different to just hanging out code someone else told you was needed? Oh.. And we might talk about the science fiction of stanislaw lem and the adventures of his constructor robots.
Atmosphere 2016 - Krzysztof Kaczmarek - Don't fear the brackets - Clojure in ...PROIDEA
Find out why Clojure delighted Uncle Bob and why is used by huge corporations like Netflix, Wallmart, Daily Mail, (Allegro is joining this list) and why, regarding Greenspun's tenth rule, you already wrote your software in lisp.
MCE^3 - Jorge D. Ortiz - Fuentes - Escape From Mars PROIDEA
Everybody involved in a mid size project or bigger is concerned about architecture. We have all been told that a good architecture can help us to have a more agile, robust, and easier to work with application, but it is not always clear how nor the architecture everybody else is talking about. By establishing parallelisms with Andy Weir's story, The Martian, I will go through the most relevant problems we usually find, explain how a well though out architecture can be valuable to us, and share some code that implements it.
I will use Swift in all of the code examples, because, in my opinion, it is very well suited to implement those advanced architectures. I will highlight its advantages and disadvantages compared Objective-C and other languages from an architectural point of view.
If you care:- The talk includes only minor spoilers- No, it isn't about MVC, but beyond that
Jednym z najistotniejszych czynników wspierających ochronę krytycznej infrastruktury sieciowej jest czas reakcji zespołu reagowania na incydenty bezpieczeństwa (Incident Response Team).
Im szybciej, tym lepiej. Rozwiązania wspomagające wczesne wykrywanie ataków oparte o pasywną analizę zapytań DNS, zbiorów danych Netflow czy PCAP warto wesprzeć coraz częściej docenianą i wykorzystywaną produkcyjnie infrastrukturą typu honeynet. Rozsądne osadzenie sond honeypotowych w różnych segmentach sieci pozwoli na wykrycie ataku już w początkowych fazach rekonesansu i enumeracji. Dzięki honeypotom niejednokrotnie uzyskamy także szczegółowe informacje na temat nowej techniki ataku, próby wykorzystania błędu typu 0-day czy bardzo specyficznego użycia znanych od lat narzędzi.
"Know your enemy" - to dewiza, którą powinniśmy się kierować w trosce o rozwój defensywnych umiejętności zespołów bezpieczeństwa i honeypotowa sieć zdecydowanie posiada tu dużą wartość.
Podczas prelekcji postaram się przedstawić sposoby wykorzystania jak i możliwości oferowane przez open source'owe rozwiązania typu honeypot. Będziemy mówić o pojedynczych projektach imitujących rzeczywiste usługi (DNS, SMB, SSH, SCP/SFTP, FTP, telnet, HTTP, TFTP, MySQL/MSSQL, RDP i wiele innych), wstrzykiwaniu poprzez reverse proxy honeypotowych zawartości do aplikacji webowych, atakowaniu atakujących;) , kończąc na dedykowanych platformach z wbudowanych stackiem ELK.
Konrad Kokosa - Pamięć w .NET - od ogólu do szczegółu- 4developers2016PROIDEA
.NET ma zarządzaną pamięć, to wie każdy. Ale jak to wszystko naprawdę działa? Czy mamy się w ogóle czym przejmować? Czy znajomość szczegółów implementacyjnych Garbage Collectora jest nam do czegoś potrzebna i co z tego wynika dla codziennego życia .NET deva? Przyglądając się temu jak CLR zarządza pamięcią z tej i owej strony poznamy przy okazji kilka smaczków, ciekawostek ale i zagrożeń.
[4developers2016] - Security in the era of modern applications and services (...PROIDEA
Security is hard. Old days are over and it requires way more then providing login form, comparing password hash and maintaining HTTP session. With the raise of mobile and client side apps, (micro) services and APIs it has become a fairly complex topic. At the same time with security breaches hitting the news on the monthly basis it is everyone's concern. Being an area every developer or architect needs to understand very well. Thankfully a number of modern standards and solutions emerged to help with current challenges. During this talk you will learn how to approach typical security needs using modern token based security and standards like OAuth2, OpenID Connect or SAML. We’ll discuss wide variety of security related topics around multi factor authentication or identity federation and brokering . You will also learn how you can leverage modern open source identity and access management solutions in your applications.
4Developers 2015: Refactoring za duże pieniądze, pierwsze kroki - Michał GrucaPROIDEA
Michał Gruca
Language: Polish
Wielu z nas miało ten moment w trakcie kariery (albo dopiero cała zabawa przed nimi), kiedy idzie się do szefa powiedzieć, że tak już się nie da dalej ciągnąć i trzeba cały ten soft przepisać albo zrifaktorować (i to bez szwagra).
Dla tej (podejrzewam, że większej) części z nas, która zna gorycz porażki w walce z biznesem o jakość, dedykuję ten talk. Przechodziłem w swoim życiu kilka razy ten cykl, próbowałem przepchnąć zmiany większe i mniejsze. Po kilku latach (i próbach), mam pewne sukcesy na tym polu i czas podzielić się z innymi jak do tematu można podejść.
Podczas wykładu spojrzymy na to czym jest ten cały refactoring, jak można do tematu podejść, zaplanować oraz przede wszystkim jak przekonać biznes by na niego kasę wyłożył.
Nie będę ściemniać, sukces nie jest murowany więc pochylimy się też nad tematem co zrobić jak kasy nie będzie a kod trzeba i tak ratować.
4Developers 2015: Parę słów o odpowiedzialności projektanta UX - Igor FarafonowPROIDEA
Igor Farafonow
Language: Polish
Często traktujemy naszą pracę- projektantów UX, jak pracę rzemieślników. Uznajemy, że nie jest ważnym to "jak" robimy nasze projekty, ale sam fakt projektowania produktu. Stawiamy doświadczenia i interfejsy ponad użytkowników którzy z nich korzystają, Projektujemy kierując się naszym ego i ambicjami, wedle których produkty stają się piękne designersko - flatowe, z ładną typografią i wyszukanymi ikonami. Najważniejszy jednak użytkownik, staje się drugorzędny.
User centered design zamienia się w experience centered design.
I to jest błąd - bo stajemy się artystami i przestajemy odpowiadać za nasz design. Z roku na rok, coraz więcej usług przechodzi w kanał online i odpowiedzialność na nas spoczywająca jest coraz większa. Ludzie przez internet kupują, zaciągają kredyty, podpisują umowy na lata, a tym samym rozwiązują problemy bezpośrednio wpływające na ich życie.
Podczas wykładu wskażę, w których miejscach najczęściej popełniamy błędy. Podpowiem również jak w trakcie procesu projektowego uwzględniać zachowania i przyzwyczajenia naszych person. Określę te fragmenty prowadzenia projektów, gdzie najczęściej popełniamy błędy. Na przykładach pokażę, jak nasze błędy wpływają na biznes, pieniądze, i przede wszystkim Klientów.
Atmosphere Conference 2015: Building And Releasing A Massively Multiplayer On...PROIDEA
Speaker: Jamie Winsor
Language: English
When a small startup of experienced game developers in Seattle finished their first game, an open-world single player zombie survival game, to rave reviews they continuously received the same feedback - "No multiplayer?". Building the necessary software infrastructure for a massively multiplayer online game historically requires large engineering teams, even larger operational support organizations, and can take years to finish. With a big success under their belts the organization had a choice to make: Go through a massive growth period, potentially ruining the culture they worked so hard to cultivate or hire smart, work even smarter, and use the right tools for the job.
In this talk you will experience this story from to back. Come hear how Undead Labs grew from a small 20 person game development shop creating a single player Xbox 360 Live Arcade Game, State of Decay, to a multi-game studio bringing State of Decay and more to the online space. You will hear how Undead Lab's leveraged Chef, Elixir, and fully embraced the DevOps development pattern to create the foundations of their new online platform while simultaneously developing multiple titles while cultivating the personnel required to lock in a bright future of the studio.
Visit our website: http://atmosphere-conference.com/
MCE^3 - C. Todd Lombardo - Organizational Dynamics of InnovationPROIDEA
It is not the strongest that survives, rather the most adaptable. What structural, behavioral, cultural, and organizational factors play into a company's success in producing hit product after hit product? Examining both successful and unsuccessful examples, this talk presents a framework for teams to set themselves up for repeated innovation success
PLNOG 17 - Konrad Kulikowski - Cisco WAE - Wan Automation Engine - Co SDN moż...PROIDEA
W swojej prezentacji Konrad omówi WAN Automation Engine (WAE), czyli oprogramowanie instalowane na serwerze, które pozwala na wielowarstwową widoczność sieci, historię pracy, optymalizację ścieżek i optymalizację przepływu ruchu. WAE jest unikalnym, centralnym punktem posiadający pełny aktualny ogląd sieci.
PLNOG 17 - Marcin Aronowski - Technologie dostępowe dla IoT. Jak się w tym ws...PROIDEA
BLE, BT, Wifi, Z-Wave, Zigbee, EnOcean, 802.15.4, NB-IoT, EC-GSM, LoRa, SigFox. Lista jest długa a cały czas się jeszcze wydłuża. Która technologia będzie najlepsza dla Twojego projektu IoT? Jak się nie pogubić w tej mnogości i szybkości zmian?
Sesja postara się odpowiedzieć na te i kilka innych pytań związanych z łącznością bezprzewodową w świecie Internet of Things.
DOD 2016 - Sebastian Krzyszkowiak - Jenkins: The PipelinePROIDEA
YouTube: https://www.youtube.com/watch?v=t1WM4IraoiM&list=PLnKL6-WWWE_VtIMfNLW3N3RGuCUcQkDMl&index=14
With the introduction of the Pipeline feature, Jenkins has made a great paradigm shift from its classic UI-based job configuration to a domain-specific language, providing bunch of major advantages when it comes to maintaining the continuous delivery cycle. While previously Jenkins worked best with sequential tasks with well-defined responsibilities and outcomes, now it has become possible to properly instrument the whole delivery process, including code reviews, testing and going through staging environments. Let's take a look at how to take most out of it and how does it compare now to other popular CI tools out there.
PLNOG 17 - Tomás Strašák - Latencja jest decydentemPROIDEA
Jak latencja wpływa na nasze decyzje przy budowie naszych połączeń. Czy latencja jest narzędziem do poprawy naszej konkurencyjności? Jakie są trendy na rynku jeśli chodzi o latencja?
Cisco Prime for IP Next -Generation Networks (IP NGN) drastically simplifies the design, provisioning, and management of carrier - grade networks.
This comprehensive solution centralizes and automates service design, fulfillment, assurance, and performance analysis to help you lower costs while meeting high customer expectations.
Cisco's Open Device Programmability Strategy: Open DiscussionCisco DevNet
Cisco DNA is an open and extensible, software-driven architecture built on a set of design principles with the objective of providing:
- Insights & Actions to drive faster business innovation
- Automaton & Assurance to lower IT costs and complexity while meeting business and user expectations
- Security & Compliance to reduce risk as the organization continues to expand and grow. The architecture extends to Cisco network elements.
This session will focus on the open, model-driven, programmable interfaces available across Cisco's network elements which enable you to leverage and extend your network through applications that directly access the routers and switches in your network.
Watch the DevNet 1028 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=91041&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)Cisco DevNet
In this small group, hands-on workshop session you'll learn how to write your first Python application that uses YANG, NETCONF and , RESTCONF to access operational and configuration data on a device.
Watch the DevNet 2044 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92725&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Network Function Virtualization (NFV) BoF, by Santanu Dasgupta.
A presentation given at the APNIC 40 APNIC Network Function Virtualization (NFV) BoF session on Tue, 8 Sep 2015.
Learn more about how today's service provider's networks are built to deliver yesterday's services and how the Next generation service require a new approach with our Evolved Programmable Network's offerings will enable business transformation for new service deliveries.
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...PROIDEA
Krzysztof Konkowski - Cisco Systems
Language: English
Service Provider networks evolve to benefit from virtualisation, programmability, automation and other cutting edge technologies, enabling SPs to streamline their services and keep profitable on competitive market. Being able to adopt new technologies is bound to alleging network architecture, adding new components on top of Access, Aggregation, Core, and Service Edge. Cisco for past years has been developing CVD program - Cisco Validated Design. One of the work groups is dedicated to creating and maintaining EPN solution - Evolved Programmable Network - along with documentation based on cyclic test campaigns, Design & Implementation Guides, and other information. The session will cover EPN - its fundamental blocks, scenarios & equipment tested, where to search for information and how to use them.
Register for the next PLNOG edition: krakow.plnog.pl
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPROIDEA
Nick Martin - Cisco Systems
As Data Centre operations teams look to improve the efficiency of provisioning and managing the physical and virtual infrastructure they have begun to apply the tools and approaches they have leveraged for server management to the network. Cisco’s Application Centric Infrastructure uses a policy driven approach to provide an integrated overlay delivering a natural abstraction between application design, and infrastructure deployment. This new paradigm for networking overcomes silos, drastically reducing cost and complexity.
To put it simply: 1) Cisco ACI is a new network platform 2) we have a new management model based on (group) policy 3) this simplifies things and thus saves money
Register to the next PLNOG edition: krakow.plnog.pl
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks