The document discusses Cisco's Application Policy Infrastructure Controller Enterprise Module (APIC-EM). It provides:
1) An overview of the APIC-EM architecture, which includes Cisco and third party applications, a network information database, policy infrastructure, and automation interfaces to simplify network management and expose network intelligence.
2) Examples of APIC-EM applications like path visualization, policy analysis, EasyQoS, Intelligent WAN, and Network Plug and Play that provide simplified management of networks, applications, and policies through an intuitive user interface and programming interfaces.
3) Details on how APIC-EM can integrate with Cisco Call Manager to dynamically insert and remove access control lists for voice and video calls to prioritize that traffic
This document provides an overview of the APIs available in the APIC-EM platform. It discusses tools for accessing the APIs, authentication, and gives examples of accessing inventory, topology, path trace, and plug-and-play APIs. The document provides API endpoints and examples of the JSON response for common requests. It also outlines the relationships between different API resources and services available in APIC-EM like IWAN and policy that utilize the northbound REST APIs.
Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
APIC-EM Update: SDN Automation for the Enterprise NetworkPablo Liesenberg
This document discusses Cisco's Enterprise SDN solution and APIC-EM. It notes that digital business demands operational efficiency and agility, but that installing network circuits is still a manual process. It then introduces Cisco's Digital Network Architecture and APIC-EM, which provides automation, abstraction, policy control, and open programmability. APIC-EM applications can configure and provision network infrastructure in minutes rather than months through zero-touch deployment, accelerated roll-out of routers/switches/APs, and automated provisioning of solutions like IWAN with Cisco best practices.
A session in the DevNet Zone at Cisco Live, Berlin. APIC-EM is an SDN controller is for enterprise campus and WAN devices. This session will cover the API's for inventory, topology, Path Visualization, Network Plug and Play (PnP), Intelligent WAN (IWAN) will be covered. The IWAN API allow policy based modification of application QoS and WAN path selection.
Hope you did not miss our deep dive: Cisco APIC-EM: IT Speed and Simplicity Through Automation
Ronnie Ray walked through Cisco's purpose-built enterprise controller. Purpose build to help you move to software-defined networking (SDN) that works both on existing networks and on new infrastructure.
Watch and Listen to the workshop replay at cs.co/6017Bl8Kb
(check out the Digital Network Architecture episodes Part 1 and 2 at http://www.techwisetv.com)
You will learn how Cisco engineers created the world’s best network automation controller, which provides enterprise resiliency and scale, an open and extensible platform, and a full suite of policy-driven SDN applications.
You’ll learn about multiple time-saving apps that cover the complete network service lifecycle and drive policy enforcement consistently across the enterprise to make sure of zero-touch infrastructure deployment, quality of experience, and rapid troubleshooting.
Moving to software-driven networking is the future. Join us and find out how to start your journey today.
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) is a software controller that automates and simplifies network configuration, provisioning, and management. APIC-EM SDN controller auto-translates business policy into network device-level policy and can enable policy enforcement across an end-to-end network.</p>
<p>The APIC EM is highly programmable through open APIs allowing customers and developers to create innovative network services and applications to fuel business growth.</p>
<p>During this lab, participants will install the controller followed by hands-on experience on multiple SDN applications including inventory, discovery, topology, policy, path visualization, EasyQoS (both static and dynamic) and Secure Network Plug and Play (for zero touch deployment). Participants will also have the opportunity to visualize the IWAN App. Lastly, participants will experience the programmability aspects of APIC-EM by leveraging Swagger and Chrome Postman scripting.</p>
<p>The first version of this lab was created and delivered by the speakers at Cisco Live Berlin. This second and enhanced version of this lab will be available for Cisco Connect Toronto and Cisco Live Las Vegas.
This document provides an overview of the APIs available in the APIC-EM platform. It discusses tools for accessing the APIs, authentication, and gives examples of accessing inventory, topology, path trace, and plug-and-play APIs. The document provides API endpoints and examples of the JSON response for common requests. It also outlines the relationships between different API resources and services available in APIC-EM like IWAN and policy that utilize the northbound REST APIs.
Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
APIC-EM Update: SDN Automation for the Enterprise NetworkPablo Liesenberg
This document discusses Cisco's Enterprise SDN solution and APIC-EM. It notes that digital business demands operational efficiency and agility, but that installing network circuits is still a manual process. It then introduces Cisco's Digital Network Architecture and APIC-EM, which provides automation, abstraction, policy control, and open programmability. APIC-EM applications can configure and provision network infrastructure in minutes rather than months through zero-touch deployment, accelerated roll-out of routers/switches/APs, and automated provisioning of solutions like IWAN with Cisco best practices.
A session in the DevNet Zone at Cisco Live, Berlin. APIC-EM is an SDN controller is for enterprise campus and WAN devices. This session will cover the API's for inventory, topology, Path Visualization, Network Plug and Play (PnP), Intelligent WAN (IWAN) will be covered. The IWAN API allow policy based modification of application QoS and WAN path selection.
Hope you did not miss our deep dive: Cisco APIC-EM: IT Speed and Simplicity Through Automation
Ronnie Ray walked through Cisco's purpose-built enterprise controller. Purpose build to help you move to software-defined networking (SDN) that works both on existing networks and on new infrastructure.
Watch and Listen to the workshop replay at cs.co/6017Bl8Kb
(check out the Digital Network Architecture episodes Part 1 and 2 at http://www.techwisetv.com)
You will learn how Cisco engineers created the world’s best network automation controller, which provides enterprise resiliency and scale, an open and extensible platform, and a full suite of policy-driven SDN applications.
You’ll learn about multiple time-saving apps that cover the complete network service lifecycle and drive policy enforcement consistently across the enterprise to make sure of zero-touch infrastructure deployment, quality of experience, and rapid troubleshooting.
Moving to software-driven networking is the future. Join us and find out how to start your journey today.
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) is a software controller that automates and simplifies network configuration, provisioning, and management. APIC-EM SDN controller auto-translates business policy into network device-level policy and can enable policy enforcement across an end-to-end network.</p>
<p>The APIC EM is highly programmable through open APIs allowing customers and developers to create innovative network services and applications to fuel business growth.</p>
<p>During this lab, participants will install the controller followed by hands-on experience on multiple SDN applications including inventory, discovery, topology, policy, path visualization, EasyQoS (both static and dynamic) and Secure Network Plug and Play (for zero touch deployment). Participants will also have the opportunity to visualize the IWAN App. Lastly, participants will experience the programmability aspects of APIC-EM by leveraging Swagger and Chrome Postman scripting.</p>
<p>The first version of this lab was created and delivered by the speakers at Cisco Live Berlin. This second and enhanced version of this lab will be available for Cisco Connect Toronto and Cisco Live Las Vegas.
The APIC Enterprise Module provides a single point of control to simplify the operation of your enterprise network. The heart of the controller is a rich policy engine that translates higher order business intent into network configuration. The controller exposes a rich REST based API to allow other applications to take advantage capabilities of the controller and unlock the power of the underlying network infrastructure. This session will present the basic constructs of the controller such as the policy engine, and the capabilities of the REST API. There will be examples of how these capabilities can be integrated into other applications to simplify operations, improve security and enhance user experience.
This session will cover new and upcoming innovations to our ISR4K routing platform, as well as introduce a new solution that simplifies operations and redefines architecture at the branch.
The APIC Enterprise Module provides a single point of control to simplify the operation of your enterprise network. The heart of the controller is a rich policy engine that translates higher order business intent into network configuration. The controller exposes a rich REST based API to allow other applications to take advantage capabilities of the controller and unlock the power of the underlying network infrastructure. This session will present the basic constructs of the controller such as the policy engine, and the capabilities of the REST API. There will be examples of how these capabilities can be integrated into other applications to simplify operations, improve security and enhance user experience. Taught by Adam Redford.
With the advent of SDN driven network programmability and abstraction, IT operations management is poised for a transformation to higher levels of agility and automation.
"A session in the DevNet Zone at Cisco Live, Berlin. Analytics of network telemetry data (such as flow records, IPSLA measurements, and time series of MIB data) helps address many important operational problems. Traditional Big Data approaches run into limitations even as they push scale boundaries for processing data further. One reason for this is the fact that in many cases, the bottleneck for analytics is not analytics processing itself but the generation and export of the data on which analytics depends. Data does not come for free. The amount of data that can be reasonably collected from the network runs into inherent limitations due to bandwidth and processing constraints in the network itself. In addition, management tasks related to determining and configuring which data to generate lead to significant deployment challenges.
This presentation provides an overview of DNA (Distributed Network Analytics), a novel technology to analyze network telemetry data in distributed fashion at the network edge, allowing users to detect changes, predict trends, recognize anomalies, and identify hotspots in their network. Analytics processing occurs at the source of the data using an embedded DNA Agent App that dynamically configures data sources as needed and analyzes the data using an embedded analytics engine. This provides DNA with superior scaling characteristics while avoiding the significant operational and bandwidth overhead that is associated with centralized analytics solutions. An ODL-based SDN controller application orchestrates network analytics tasks across the network, providing a network analytics service that allows users to interact with the network as a whole instead of individual devices one at a time. DNA is enabled by the IOx App Hosting Framework and integrated with light-weight embedded analytics engines, CSA (Connected Service Analytics) and DMO (Data in Motion). "
It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. The advent of big data and analytics helps to enable better real-time decision making, automation, and efficiencies necessary to deliver such digitalized applications. Cisco DNA automation and assurance are built on a software-defined networking (SDN) controller, rich contextual analytics, network virtualization and the cloud.
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Canada
The document discusses Cisco's Digital Network Architecture (DNA) and the Cisco DNA Center. It introduces DNA as an open, programmable network architecture powered by automation, analytics, and intent-based policies. It describes how DNA Center allows network administrators to automate network operations, gain deep insights through assurance and analytics features, and translate business objectives into network policies through an intent-based model. Key capabilities of DNA Center discussed include automated network provisioning and deployment, software management, and gathering metrics to identify issues and make data-driven decisions.
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaCisco Canada
Cisco's SD-WAN solution aims to address challenges facing the modern WAN and branch networks, including:
- Increasing use of cloud services and bandwidth demands from more users, devices, and applications.
- Need for flexible connectivity and transport independence beyond traditional MPLS-based WANs.
- Requirements for application-aware policies for quality of experience, segmentation, and security across hybrid WAN transports.
Cisco acquired Viptela to build upon their leading SD-WAN platforms and help customers innovate faster through a cloud-managed and feature-rich SD-WAN solution.
Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends the security perimeter to the Internet - rendering network-centric security methods obsolete.
UCS Update: Efficiently Managing your server environment for traditional ente...Cisco Canada
Cisco UCS has helped customers get more out of their IT by providing a simplified physical environment with more efficient management. However, UCS continues to innovate and deliver additional value. This session will focus on updates and new offerings that have enhanced the Cisco UCS portfolio in the previous year. These include M-Series composable infrastructure, Dense Storage servers, next generation Fabric Interconnects, updated servers, additional storage offerings, and more. This will also cover refreshes and best practices to the UCS Management portfolio. Finally, there will be the opportunity for a questions throughout and after the presentation.
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...Cisco Canada
This document discusses digital buildings and the concept of a "4th utility" network. It begins with an overview of business drivers for digital buildings such as cost savings, sustainability goals, tenant experience, and security. It then defines what a digital building is and discusses network convergence and the role of a common IP network, or "4th utility", in connecting building systems. The document outlines digital building network architectures including topologies and considerations for critical infrastructure. It also covers cybersecurity challenges and how network segmentation can help isolate systems while still allowing connectivity. Finally, it discusses models for converging building and IT systems networks.
1. The document describes an agile network solution that features plug-and-play deployment, centralized configuration, free user mobility, service orchestration, unified security, and intelligent fault location.
2. The solution allows for automated management channel creation between devices, centralized management of configurations, flexible policy-based access control, and concentration of security resources for improved protection.
3. Key benefits include easy deployment of new devices, consistent policies for wired and wireless users, mobile access based on user attributes, and network-wide security monitoring, evaluation and response.
This document discusses simplifying security in the data center. It introduces concepts like micro-segmentation using Endpoint Groups (EPGs) in Cisco Application Centric Infrastructure (ACI) to isolate application traffic. It also discusses integrating ACI with Cisco TrustSec to apply common identity and security policies between the campus and data center domains. Finally, it demonstrates how the Cisco Firepower management center can be used to automate a security feedback loop, moving compromised endpoints to a quarantined EPG for remediation through REST API calls to ACI.
Cisco Connect Halifax 2018 Cisco dna - deeper diveCisco Canada
This document provides a summary of a session on Cisco's Digital Network Architecture. The session discusses how Cisco's latest advances in programmable ASIC hardware and software-defined technologies are driving innovations in their Catalyst 9000 switches and solutions like Encrypted Traffic Analytics and Software-Defined Access. It outlines how the session will provide insight into Cisco's ASIC design process and the capabilities of their latest switching silicon. The session aims to show Cisco's evolution from application-specific integrated circuits to advanced graphical user interfaces that enable customers to more quickly innovate and reduce costs with solutions enabled by their Digital Network Architecture.
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
The document discusses Cisco's next generation SD-WAN solution which includes four main planes - orchestration, control, data, and management. The control plane is managed by Cisco vSmart controllers which facilitate fabric discovery, distribute policies to vEdge routers, and implement control plane policies. The data plane consists of Cisco vEdge routers which provide secure connectivity and implement data and application-aware routing policies. The solution offers a single pane of glass management system through Cisco vManage and provides analytics through Cisco vAnalytics.
Today’s multicloud WAN environment is not only complicated–it can expose your business to an ever–expanding threat landscape. Learn how to provide consistent security across clouds, branches, and users. http://bit.ly/2DWBBX8
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Canada
The document discusses how cyber attacks have evolved over time and how Cisco security solutions can help address modern threats. It provides examples of ransomware attacks and how Cisco mapped the attacker infrastructure involved. It then summarizes Cisco's Umbrella and Cloudlock solutions, emphasizing how Umbrella provides secure internet access and threat prevention through fast DNS resolution and intelligence-driven models, while Cloudlock focuses on securing usage of cloud apps and accounts.
Think Global, Work Digital. Cisco Industry 4.0Matteo Masi
The document discusses digital transformation and Industry 4.0. It defines digital business transformation as transforming and recoding business processes and models, changing culture to prioritize efficiency and innovation, and creating user-focused experiences. Industry 4.0 is described as the digitization of the manufacturing sector driven by increases in data, computing power, connectivity, analytics capabilities, and improvements in transferring digital instructions to the physical world. Successful digital transformation requires reimagining business, processes, managing data, security, and connectivity to drive analytics and applications.
The document discusses Cisco's Open Network Environment (ONE) approach to making networks more flexible, programmable, and application-aware. It highlights key aspects of ONE including support for software-defined networking (SDN) and open standards like OpenFlow, as well as network virtualization using technologies like OpenStack and overlay networks. The document also outlines Cisco's vision of providing programmability and automation across different network segments including research, cloud computing, service providers, and enterprises.
The APIC Enterprise Module provides a single point of control to simplify the operation of your enterprise network. The heart of the controller is a rich policy engine that translates higher order business intent into network configuration. The controller exposes a rich REST based API to allow other applications to take advantage capabilities of the controller and unlock the power of the underlying network infrastructure. This session will present the basic constructs of the controller such as the policy engine, and the capabilities of the REST API. There will be examples of how these capabilities can be integrated into other applications to simplify operations, improve security and enhance user experience.
This session will cover new and upcoming innovations to our ISR4K routing platform, as well as introduce a new solution that simplifies operations and redefines architecture at the branch.
The APIC Enterprise Module provides a single point of control to simplify the operation of your enterprise network. The heart of the controller is a rich policy engine that translates higher order business intent into network configuration. The controller exposes a rich REST based API to allow other applications to take advantage capabilities of the controller and unlock the power of the underlying network infrastructure. This session will present the basic constructs of the controller such as the policy engine, and the capabilities of the REST API. There will be examples of how these capabilities can be integrated into other applications to simplify operations, improve security and enhance user experience. Taught by Adam Redford.
With the advent of SDN driven network programmability and abstraction, IT operations management is poised for a transformation to higher levels of agility and automation.
"A session in the DevNet Zone at Cisco Live, Berlin. Analytics of network telemetry data (such as flow records, IPSLA measurements, and time series of MIB data) helps address many important operational problems. Traditional Big Data approaches run into limitations even as they push scale boundaries for processing data further. One reason for this is the fact that in many cases, the bottleneck for analytics is not analytics processing itself but the generation and export of the data on which analytics depends. Data does not come for free. The amount of data that can be reasonably collected from the network runs into inherent limitations due to bandwidth and processing constraints in the network itself. In addition, management tasks related to determining and configuring which data to generate lead to significant deployment challenges.
This presentation provides an overview of DNA (Distributed Network Analytics), a novel technology to analyze network telemetry data in distributed fashion at the network edge, allowing users to detect changes, predict trends, recognize anomalies, and identify hotspots in their network. Analytics processing occurs at the source of the data using an embedded DNA Agent App that dynamically configures data sources as needed and analyzes the data using an embedded analytics engine. This provides DNA with superior scaling characteristics while avoiding the significant operational and bandwidth overhead that is associated with centralized analytics solutions. An ODL-based SDN controller application orchestrates network analytics tasks across the network, providing a network analytics service that allows users to interact with the network as a whole instead of individual devices one at a time. DNA is enabled by the IOx App Hosting Framework and integrated with light-weight embedded analytics engines, CSA (Connected Service Analytics) and DMO (Data in Motion). "
It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. The advent of big data and analytics helps to enable better real-time decision making, automation, and efficiencies necessary to deliver such digitalized applications. Cisco DNA automation and assurance are built on a software-defined networking (SDN) controller, rich contextual analytics, network virtualization and the cloud.
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Canada
The document discusses Cisco's Digital Network Architecture (DNA) and the Cisco DNA Center. It introduces DNA as an open, programmable network architecture powered by automation, analytics, and intent-based policies. It describes how DNA Center allows network administrators to automate network operations, gain deep insights through assurance and analytics features, and translate business objectives into network policies through an intent-based model. Key capabilities of DNA Center discussed include automated network provisioning and deployment, software management, and gathering metrics to identify issues and make data-driven decisions.
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaCisco Canada
Cisco's SD-WAN solution aims to address challenges facing the modern WAN and branch networks, including:
- Increasing use of cloud services and bandwidth demands from more users, devices, and applications.
- Need for flexible connectivity and transport independence beyond traditional MPLS-based WANs.
- Requirements for application-aware policies for quality of experience, segmentation, and security across hybrid WAN transports.
Cisco acquired Viptela to build upon their leading SD-WAN platforms and help customers innovate faster through a cloud-managed and feature-rich SD-WAN solution.
Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends the security perimeter to the Internet - rendering network-centric security methods obsolete.
UCS Update: Efficiently Managing your server environment for traditional ente...Cisco Canada
Cisco UCS has helped customers get more out of their IT by providing a simplified physical environment with more efficient management. However, UCS continues to innovate and deliver additional value. This session will focus on updates and new offerings that have enhanced the Cisco UCS portfolio in the previous year. These include M-Series composable infrastructure, Dense Storage servers, next generation Fabric Interconnects, updated servers, additional storage offerings, and more. This will also cover refreshes and best practices to the UCS Management portfolio. Finally, there will be the opportunity for a questions throughout and after the presentation.
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...Cisco Canada
This document discusses digital buildings and the concept of a "4th utility" network. It begins with an overview of business drivers for digital buildings such as cost savings, sustainability goals, tenant experience, and security. It then defines what a digital building is and discusses network convergence and the role of a common IP network, or "4th utility", in connecting building systems. The document outlines digital building network architectures including topologies and considerations for critical infrastructure. It also covers cybersecurity challenges and how network segmentation can help isolate systems while still allowing connectivity. Finally, it discusses models for converging building and IT systems networks.
1. The document describes an agile network solution that features plug-and-play deployment, centralized configuration, free user mobility, service orchestration, unified security, and intelligent fault location.
2. The solution allows for automated management channel creation between devices, centralized management of configurations, flexible policy-based access control, and concentration of security resources for improved protection.
3. Key benefits include easy deployment of new devices, consistent policies for wired and wireless users, mobile access based on user attributes, and network-wide security monitoring, evaluation and response.
This document discusses simplifying security in the data center. It introduces concepts like micro-segmentation using Endpoint Groups (EPGs) in Cisco Application Centric Infrastructure (ACI) to isolate application traffic. It also discusses integrating ACI with Cisco TrustSec to apply common identity and security policies between the campus and data center domains. Finally, it demonstrates how the Cisco Firepower management center can be used to automate a security feedback loop, moving compromised endpoints to a quarantined EPG for remediation through REST API calls to ACI.
Cisco Connect Halifax 2018 Cisco dna - deeper diveCisco Canada
This document provides a summary of a session on Cisco's Digital Network Architecture. The session discusses how Cisco's latest advances in programmable ASIC hardware and software-defined technologies are driving innovations in their Catalyst 9000 switches and solutions like Encrypted Traffic Analytics and Software-Defined Access. It outlines how the session will provide insight into Cisco's ASIC design process and the capabilities of their latest switching silicon. The session aims to show Cisco's evolution from application-specific integrated circuits to advanced graphical user interfaces that enable customers to more quickly innovate and reduce costs with solutions enabled by their Digital Network Architecture.
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
The document discusses Cisco's next generation SD-WAN solution which includes four main planes - orchestration, control, data, and management. The control plane is managed by Cisco vSmart controllers which facilitate fabric discovery, distribute policies to vEdge routers, and implement control plane policies. The data plane consists of Cisco vEdge routers which provide secure connectivity and implement data and application-aware routing policies. The solution offers a single pane of glass management system through Cisco vManage and provides analytics through Cisco vAnalytics.
Today’s multicloud WAN environment is not only complicated–it can expose your business to an ever–expanding threat landscape. Learn how to provide consistent security across clouds, branches, and users. http://bit.ly/2DWBBX8
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Canada
The document discusses how cyber attacks have evolved over time and how Cisco security solutions can help address modern threats. It provides examples of ransomware attacks and how Cisco mapped the attacker infrastructure involved. It then summarizes Cisco's Umbrella and Cloudlock solutions, emphasizing how Umbrella provides secure internet access and threat prevention through fast DNS resolution and intelligence-driven models, while Cloudlock focuses on securing usage of cloud apps and accounts.
Think Global, Work Digital. Cisco Industry 4.0Matteo Masi
The document discusses digital transformation and Industry 4.0. It defines digital business transformation as transforming and recoding business processes and models, changing culture to prioritize efficiency and innovation, and creating user-focused experiences. Industry 4.0 is described as the digitization of the manufacturing sector driven by increases in data, computing power, connectivity, analytics capabilities, and improvements in transferring digital instructions to the physical world. Successful digital transformation requires reimagining business, processes, managing data, security, and connectivity to drive analytics and applications.
The document discusses Cisco's Open Network Environment (ONE) approach to making networks more flexible, programmable, and application-aware. It highlights key aspects of ONE including support for software-defined networking (SDN) and open standards like OpenFlow, as well as network virtualization using technologies like OpenStack and overlay networks. The document also outlines Cisco's vision of providing programmability and automation across different network segments including research, cloud computing, service providers, and enterprises.
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres Martin Lipka
Cisco ACI provides a new layer of network abstraction that simplifies network architecture and operations. It exposes a flexible world of network objects that can be managed through the Cisco APIC controller using the open APIs. The ACI fabric automates complex tasks to provide switching, routing, firewalling and other functionality in a simple and unified way.
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
Replay the live event: http://cs.co/90008z2Ar
Learn how your existing Cisco network can help you to know exactly who is doing what on the network with end-to-end visibility, differentiate anomalies from normal behavior with contextual threat intelligence and stop threats and mitigate risk with one-click containment of users and devices.
It’s time for the network to protect itself. Please make time for this important workshop.
Resources:
Watch the Cisco Stealthwatch and ISE full episode: http://cs.co/90008z24M
Network as a Sensor-Enforcer on CCO:
http://www.cisco.com/c/en/us/solutions/enterprise-networks/enterprise-network-security/net-sensor.html
Cisco ISE Community
http://cs.co/ise-community
Presentation at ECIPE Seminar "How to Accelerate the Expansion of the Digital Economy?" on 15th July. Quick overview of new trends in manufacturing and regulatory implications.
The Cisco IWAN Application simplifies WAN deployments by providing highly intuitive, policy-based automation. It enables you to realize the benefits of SD-WAN: lower costs, simplified IT, increased security, and optimized application performance.
View the Webcast: http://cs.co/9007BKlEc
Joe Onisick, Principal Engineer, Cisco discusses building the right network and understanding different overlay approaches at Cisco Connect Toronto 2015.
Cisco, Sourcefire and Lancope - Better TogetherLancope, Inc.
Technology overview for Sourcefire FireSIGHT and Lancope StealthWatch including:
• Core features and functionality
• Market positioning and differentiators
• Technology integration for effective incident response
The document discusses preparing networks for the second wave of 802.11ac wireless technology. Key points include: 1) 802.11ac Wave 2 provides better performance, coverage, and support for more wireless devices and Internet of Things devices; 2) Networks need faster switching and mobility capabilities to support increasing wireless traffic and bandwidth-intensive applications; 3) Cisco's new 802.11ac Wave 2 access points, controllers, and switches help networks support the next generation of wireless and mobility demands.
Case Study (Presentation): How Cisco Spark is used at ZOOM InternationalZOOM International
This case study is available in written text (PDF) and slide format. It explains how ZOOM uses Cisco™ Spark, ZOOM WFO, Salesforce.com™, Cisco Tropo, Cisco Voice Platforms, and Cisco Webex to help achieve the #1 rank in customer satisfaction for the WFO industry.
The studies include details on the background, problem, solution, and results of ZOOM's customer-focused culture, people, process, and technology.
A sdn based application aware and network provisioningStanley Wang
The document discusses application aware SDN network provisioning. It begins with an overview of YARN architecture in Hadoop, including its benefits over earlier Hadoop architectures like improved scalability and utilization. It then discusses how SDN can be integrated with big data and cloud computing workloads by optimizing network topology and routing based on traffic patterns. Two approaches are proposed - reactive, where the SDN controller learns patterns from job logs/endpoints and modifies paths, and proactive where applications directly inform the network of intent. Finally, it proposes a service profile based SDN platform that uses network profiles and APIs to declaratively define logical topologies and provide network services and abstractions to applications.
We will explore why the current industry approach to security is failing us. We will then discuss how building security as an architecture can raise the security level for any organization. An architectural approach is required to take security to the next level and defend against modern threats. We will discuss how you can use Cisco solutions to build a true security architecture.
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...NetworkCollaborators
The document discusses Cisco's Software Defined Access (SDA) and intent-based networking solutions. It highlights how SDA and the Cisco DNA Center simplify network design, provisioning, policy implementation and assurance through automation and analytics. Traditional networks are complex to manage and secure, while SDA provides a more flexible, software-driven approach through centralized management and segmentation based on user identity rather than network topology.
The document discusses Cisco's Software Defined Access (SDA) and the Catalyst 9000 series of switches. SDA provides automation, policy management, and assurance capabilities for campus networks through Cisco's DNA Center. It simplifies network segmentation, provisioning, and troubleshooting compared to traditional network architectures. The Catalyst 9000 series are new switches designed for SDA, including the stackable Catalyst 9300 for access, modular Catalyst 9400, and fixed Catalyst 9500 for aggregation/core. They offer high performance, programmability, and security features to support digital business needs.
The document discusses Cisco's Software Defined Access (SDA) and Intent-based Networking solutions. SDA provides an automated and simplified approach to network design, provisioning, and management compared to traditional networks. Key benefits of SDA include centralized policy provisioning, identity-based segmentation, and real-time network analytics and troubleshooting through the Cisco DNA Center.
The document discusses Cisco's Software Defined Access (SDA) and Intent-based Networking solutions. SDA provides an automated and software-driven approach to network design, provisioning, and management. It simplifies tasks such as network segmentation and policy implementation through centralized policy definitions. Key benefits over traditional networks include reduced complexity, improved scalability, centralized management, and network insights/analytics through tools like Cisco DNA Center.
This document discusses the evolution of software defined networking (SDN) and application-centric infrastructure. It describes how SDN has progressed from early implementations using OpenFlow (SDN 1.0) to separating the control and data planes (SDN 2.0) to the current approach of an application-centric infrastructure with a centralized controller and policy-based automation (SDN 3.0). It emphasizes how the new approach simplifies infrastructure management, enables intelligent services, and provides dynamic security through a centralized control plane.
Cisco APIC-EM – реализация концепции SDN в корпоративных сетяхCisco Russia
The document discusses Cisco APIC-EM and its implementation of the Software Defined Networking (SDN) concept in corporate networks. It covers the presentation plan, definitions of SDN, industry trends driving SDN adoption, SDN architectures, and tasks that SDN can address such as automation of network management, combining network management domains, and network virtualization.
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Canada
The document discusses Cisco Digital Network Architecture (DNA) and its network intuitive capabilities. DNA Center provides automation, analytics, and assurance to translate business intent into network policies and reduce manual operations. It features workflows for network design and deployment, access control policy authoring, and software image management. DNA collects metrics from the network to provide insights through anomaly detection, trend analysis, and machine learning. This allows for guided troubleshooting and self-remediation of issues.
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Cisco Russia
The document discusses new Cisco technologies for automating and analyzing corporate networks, including Cisco DNA Center. DNA Center provides a single interface for automating and analyzing the entire lifecycle of network design, provisioning, policy management, and assurance. It integrates with Cisco Identity Services Engine (ISE) to automate access policies and control. DNA Center also leverages streaming telemetry, network data, and machine learning to provide real-time visibility, root cause analysis, and client health monitoring across the network.
Cisco Connect 2018 Thailand - Software defined access a transformational appr...NetworkCollaborators
The document discusses Cisco's approach to software-defined access networking and the challenges of traditional network designs. It introduces Cisco's intent-based networking model which uses automation, analytics, and policy-based segmentation to simplify network management and operations. Key components of Cisco's SDA solution include the Cisco DNA Center for network design, provisioning, policy management, and assurance across switching, routing, and wireless platforms.
The document discusses Cisco Software Defined Access (SDA) and how it provides an automated and assured approach to network design, provisioning, and management compared to traditional network approaches. Some key benefits of SDA highlighted include simplifying network segmentation, automating policy provisioning across the network, providing real-time visibility and analytics into network and client health and performance, and supporting a wider range of Cisco platforms.
Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...NetworkCollaborators
The document discusses Cisco's Software Defined Access (SDA) solution and how it aims to simplify and automate network design, provisioning, and management. SDA uses Cisco's DNA Center to provide centralized policy automation and assurance across the network infrastructure. It allows for identity-based segmentation and control without needing to change VLAN configurations manually. The document highlights some of the key benefits SDA provides over traditional network approaches like reduced complexity, improved scalability, and integrated security.
This document discusses Cisco's Software Defined Access (SDA) and how it provides a transformational approach to network design and provisioning compared to traditional networks. SDA utilizes Cisco's Catalyst 9000 series switches, DNA Center for automation and assurance, and identity services to provide an automated, software-defined network fabric with identity-based policy and segmentation. Key benefits of SDA include simplified management, faster issue resolution, and the ability to keep up with increasing network demands compared to traditional complex networks managed primarily through CLI.
Extending Cisco Technologies Thru Solar Winds Network Managementjkstephens
Presentation on NetFlow, IP SLA, Cisco EnergyWise, and the Nexus 1000v and how to leverage these technologies using SolarWinds network management applications.
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
Patomphon Vimolket introduces Cisco's vision for enabling next-generation data center transformations through software-defined technologies. The document discusses challenges like evolving threats, manual operations, and digital disruption. It presents Cisco's data center reference architecture and portfolio including Cisco CloudCenter, Nexus, UCS, HyperFlex, ACI, Intersight, and security solutions like Tetration and AppDynamics. These provide application visibility, infrastructure optimization, and security to help businesses adapt to challenges like multicloud, microservices, and more dynamic environments.
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)SDNRG ITB
The document discusses Cisco's innovations in software-defined networking (SDN) and network functions virtualization (NFV). It provides an overview of Cisco's strategy, which involves various models of programmability including classic SDN with OpenFlow, network virtualization with overlays, and hybrid approaches. The document also discusses Cisco's NFV reference architecture and innovations like the Virtualized Mobility Supervisor (vMS) and virtualized branch solutions.
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
Microservices and containers networking: Contiv, an industry leading open sou...Codemotion
This document summarizes a presentation about Contiv, an open source container networking solution. It introduces Contiv as a way to define and enforce network policies across infrastructure to integrate application intent with operational intent. Key features of Contiv highlighted include providing container networking for schedulers like Kubernetes and Docker, distributed policy enforcement, integration with physical infrastructure, and supporting rich network policies, tenants, and microservices. The presentation concludes with a demo of Contiv's network isolation and policy capabilities.
This session provides an overview of HPE's Software Defined Networking (SDN) feature set and will review the benefits of following SDN apps for network operations and IT security teams: HPE Network Protector, HP Network Optimizer, and HP Visualizer.
The document discusses embracing software-defined networking (SDN) in next-generation networks. It describes traditional distributed control plane architectures and centralized SDN control plane architectures. It also discusses hybrid control plane models that utilize aspects of both distributed and centralized control. The document provides examples of how SDN can be applied in different network domains including the data center, enterprise network, service provider wide-area network (WAN), and network functions virtualization (NFV).
Similar to SDN in the Enterprise: APIC Enterprise Module (20)
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
The document discusses network slicing, which is the next step in virtualization for 4G/5G mobile networks. Network slicing allows the core network to be partitioned into multiple logical networks or "slices", each with its own network functions to support the requirements of different services. This approach enables network resources and functions to be allocated to specific services or customer segments in a flexible manner. It reduces complexity compared to existing networks that must support many different services and customers on a single common infrastructure. The key benefits of network slicing include improved network agility and the ability to support diverse service requirements.
The document summarizes a Cisco presentation on next-generation datacenter security. It discusses how the majority of security teams' time is spent securing servers and data in the datacenter. It then covers challenges such as budget constraints, product overload, and complexity of threats. The presentation introduces Cisco's architectural approach to datacenter security focusing on threat prevention, visibility, segmentation, threat intelligence, automation, and analytics. It provides examples of Cisco solutions that integrate to deliver firewall, access control, analytics, and other capabilities.
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
The document discusses Cisco's multi-cloud strategy and products. It introduces Cisco Container Platform (CCP) as a solution that automates deploying, running, and operating containers on physical or virtual machines. CCP is based on Kubernetes and provides integrated networking, management, security and analytics capabilities while allowing containers to run in hybrid cloud environments across VM, bare metal, Cisco HyperFlex, ACI and public clouds.
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
The document discusses Cisco's solutions for securing mobility, including Meraki SM, Cisco AMP for Endpoint, Cisco Umbrella, Cisco Cloudlock, Cisco Cloud Email Security, Cisco Threat Response, Identity Service Engine, and Cisco DUO Security. Representatives from Cisco provide overviews of each solution for securing users, data, and applications across SaaS, PaaS, and IaaS environments.
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
Cisco Connect Montreal provided information on Cisco's Webex Hybrid Services which allow for integration between on-premises and cloud collaboration solutions. The key services discussed included Hybrid Directory Service for user synchronization, Hybrid Calendar Service for calendaring integration, Hybrid Call Service for calling capabilities, Hybrid Message Service for messaging interoperability, and the new Cisco Webex Edge service for enhanced audio, video mesh, and media experiences.
Integration cisco et microsoft connect montreal 2018Cisco Canada
The document discusses Cisco and Microsoft integrations for collaboration. It describes major areas of integration including calling, messaging, meetings, email/calendar, content management, and instant messaging. It provides details on Cisco and Microsoft integrations for meetings, with examples of joining internal and external participants. The document also discusses Cisco Spark and Webex capabilities for open collaboration across organizations and platforms.
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
This document summarizes a presentation on model-driven programmability for Cisco IOS XR. The presentation covers data models, management protocols like NETCONF and gRPC, the YANG Development Kit (YDK) SDK, and telemetry. It defines key concepts like model-driven manageability, native and open data models, protocol operations, and the benefits of the YDK for simplifying application development through model-driven abstractions. Example code demonstrates basic YDK usage and a potential peering configuration use case is outlined. Resources for further information are also provided.
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
The document discusses Cisco SD-WAN and its advantages over traditional and legacy WAN architectures. It highlights how Cisco SD-WAN uses a centralized control plane and software-defined intelligence to provide automated, predictive, and intent-based networking. This allows for flexible, scalable, and secure connectivity across hybrid WAN transports in a way that is simpler to manage and operate than hardware-centric WAN solutions.
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
The document discusses Cisco's DNA Center and its capabilities for automating network management. It covers:
- Why intent-based networking is needed to reduce costs and errors from manual network changes
- How DNA Center supports intent-based networking by allowing administrators to define policies and have them automatically implemented across the network
- Key automation use cases DNA Center addresses like onboarding new devices, managing software upgrades, creating configuration templates, and deploying wireless networks
- Demonstrations of DNA Center's capabilities for plug-and-play deployment, software management, template configuration, and wireless provisioning
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
Robert Barton from Cisco presented on Cisco Kinetic, an IoT analytics platform. Cisco Kinetic consists of three modules: the Gateway Management Module for onboarding and managing IoT gateways at scale, the Edge and Fog Processing Module for analyzing IoT data in real-time at the edge, and the Data Control Module for securely routing IoT data between edge, fog, and cloud according to data policies. Cisco Kinetic aims to enable end-to-end IoT analytics across the entire network from device to cloud.
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
Hank Preston, a Cisco engineer, gave a presentation on DevNet and how it is helping developers. He discussed how DevNet has grown significantly, now with over 100,000 members and 500,000 learning labs completed. DevNet provides resources like APIs, sandboxes, and training to help developers build applications and automate networks. Preston emphasized that networks are becoming more programmable and automated through DevNet tools and platforms.
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
The document discusses Cisco's DNA Assurance solution. It provides an agenda that covers business requirements, context, learning, user requirements, technology requirements, and the various components of DNA Assurance including client assurance, network assurance, application assurance, and machine learning. It discusses challenges around network operations including time spent troubleshooting and replicating issues. It also covers how DNA Assurance uses concepts like context, learning, and design thinking to provide insights and automate remediation.
Cisco Connect Toronto 2018 network-slicingCisco Canada
The document discusses network slicing, which is the partitioning of network resources and functions to run selected applications, services, or connections in isolation from each other for specific business purposes. This allows mobile operators to offer virtual private networks on a common infrastructure through network slicing on an end-to-end basis across access, transport, and core networks. Slicing enables new revenue opportunities through network slices optimized for different vertical industries while simplifying service delivery and management.
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
The document discusses Cisco Meraki's intelligent network and SD-WAN capabilities. It highlights that Meraki has over 14,000 customers using its SD-WAN, it has a renewal rate over 95%, and its newest product is WAN assurance. The presentation provides an overview of Meraki's cloud-managed solutions for wireless, switching, security, and other IT functions. It demonstrates Meraki's network monitoring and troubleshooting tools through examples and a demo of its capabilities.
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
The document discusses automating security tasks through various solutions from Cisco. It introduces the Cisco Advanced Malware Protection (AMP) solution, which uses machine learning to detect known and unknown malware across endpoints, networks, and email. It also introduces Cisco Cognitive Threat Analytics, which analyzes web traffic using machine learning to detect anomalous and malicious activity inside organizations. The document provides examples of how these solutions can automate tasks like hunting for threats, detecting anomalies, and attributing suspicious activity to specific entities. It includes demos of the AMP and Cognitive Intelligence user interfaces.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
SDN in the Enterprise: APIC Enterprise Module
1. SDN in the Enterprise: APIC Enterprise Module
T-ENM-01-I
Lila Rousseaux, Consulting Systems Engineer, Enterprise Networks, Cisco Systems Canada
Tim Szigeti, Technical Marketing Engineer, Enterprise Architecture Team, Cisco Systems
3. Thank you for attending Cisco Connect Toronto 2015, here are a few
housekeeping notes to ensure we all enjoy the session today.
§ Please ensure your cellphones / Laptops are set on silent to ensure
no one is disturbed during the session
§ Ask questions !!
House Keeping Notes
4. § What problem are we trying to solve?
§ APIC-EM Architecture
§ APIC-EM Apps a.k.a how can the controller help simplify my
environment?
§ What about Prime?
§ Wrap-Up
AGENDA
6. “A platform for
developing new control planes”
“An open solution for VM mobility in
the Data-Center”
“An open solution for customized flow
forwarding control in the Data-Center”
“A means to do traffic engineering without
MPLS”
“A way to scale my firewalls
and loadbalancers”
“A solution to build a very large scale layer-2
network”
“A way to build my own security/encryption solution,
avoiding RSA”
“A way to reduce the
CAPEX of my network
and leverage commodity
switches”
“A way to define virtual networks with specific
topologies for my multi-tenant Data-Center”
“A means to scale my fixed/mobile gateways and
optimize their placement”
“A solution to build virtual topologies with
optimum multicast forwarding behavior”
“A way to optimize link utilization in my network, through
new multi-path algorithms”
“A way to avoid lock-in to a
single networking vendor”
“A way to distribute policy/intent, e.g. for DDoS
prevention, in the network”
“A way to configure my entire network as
a whole rather than individual devices”
“A solution to get a global view of the
network – topology and state”
“With SDN I can develop solutions to my problems far faster –
“at software speeds”. I don’t have to work with my network
vendor or go through length standardization”
SDN – Still Don’t kNow – Stanford Defined Networking
Many things to Many people
8. Distributed Networking has worked
?
Distributed Networking adds complexity to manage/comprehend
!
!
!
However
9. But uses controller
to mask complexity
NETWORK
Admin still makes network behavior decisions
10. Abstracting Conventional Policy Complexity
Conventional Model
The What
“Security Policy for
Branch A”
The How
“Change ACLs in
the Following
Elements”
The What
“Security Policy for
Branch A”
The How
“Change ACLs in
the Following
Elements”
ACI Constructs
Admin
Driven
Admin Driven
Northbound APIs
APIC EM
Policy Based Model
11. What is Policy?
WHAT HOW
Policy à way to simplify how we do things via abstraction
12. Changing Nature of IT Ops with SDN led
Management
Management
(NMS)
NE NE NE NE
Customer developed
provisioning tools, manual CLI
changes, and run book
automation for IT Operations
support
Controller
(APIC-EM)
Management
(Provisioning and Assurance)
Automation
(Workflow / Orchestration)
NE NE NE NE
Customer input on business /
service intent
Traditional Management SDN Led Management
13. Changing Nature of IT Ops with SDN
led Management
Traditional Management
Feature
Configuration
SDN Led Management
Policy
Automation
14. Policy Maturity to Cover Enterprise System of Change
Use Cases will Evolve Over Time
policy
traditional
configuration
traditional
policy policy
Controller-based
Automation
Today
traditional
Policy based
Configuration à
• Dynamic
• Able to be
automated
• Managed by
the controller
Policy grows,
static shrinks
Time
16. Cisco APIC Enterprise Module Architecture
Abstracts Network Devices to Mask Complexity
Treat Network as a System
Exposes Network Intelligence
For Business Innovation
Cisco APIC Enterprise Module
Cisco and Third Party Applications
Network Devices
Catalyst, ASR, ISR
Network Info
Database
Policy
Infrastructure
Automation
REST API
Southbound Interface: CLI
Security QoS IWAN Network PnP
Masking Network Complexity, Exposing Network Intelligence
.
17. Cisco APIC Enterprise Module Architecture
Cisco APIC Enterprise Module
Cisco and Third Party Applications
Network Devices
Catalyst, ASR, ISR
Network Info
Database
Policy
Infrastructure
Automation
REST API
Southbound Interface: CLI
Security QoS IWAN Network PnP
Masking Network Complexity, Exposing Network Intelligence
.
1. Cisco Visualization Application a.k.a UI
2. Cisco Applications for specific solutions
IWAN, Network PnP, Collaboration,
Security, etc
3. DevNet
4. Customer developed
18. SDN Innovation: Network Information Base
Provides One Source of Truth
Cisco APIC Enterprise Module
Cisco and Third Party Applications
Network Devices
Catalyst, ASR, ISR
Network Info
Database
Policy
Infrastructure
Automation
REST API
Southbound Interface: CLI
Security QoS IWAN Network PnP
Masking Network Complexity, Exposing Network Intelligence
.
19. Cisco APIC Enterprise Module Architecture
Cisco APIC Enterprise Module
Cisco and Third Party Applications
Network Devices
Catalyst, ASR, ISR
Network Info
Database
Policy
Infrastructure
Automation
REST API
Southbound Interface: CLI
Security QoS IWAN Network PnP
Masking Network Complexity, Exposing Network Intelligence
.
1. Network programmer service: used for
programming the network
2. Services within the controller leverage
network programmer to talk to the network
3. Depending on the type of platform and
functionality the network programmer
chooses the southbound protocol
4. Services within the controller unaware of
these protocols
5. If new protocols are required, we only
need to add the plug-in for that protocol in
the network programmer
26. Use Case: Path Visualization
• No efficient method to troubleshoot IP voice and video sessions traversing the network
on demand
• Lack of network visibility creates large OPEX to diagnose and find problem sources
• Path computation service provides a fast and accurate method for rapidly identifying/
isolating paths causing problems
• Low risk use case for SDN
32. Boxes greyed out once
traffic is blocked for easy
visualization
Policy Analysis
33. CAMPUS
Security Policy App (within User Interface)
Per User Per Application Access Policy Enforcement
SiSiSiSi
APIC-EM
Controller
Block
Bit-Torrent
BRANCH
Authentication
ISE
Block
Bit-Torrent
AD/Radius
Server§ Admin configures business policy to block
application traffic on a per user/
user_group basis.
§ Controller uses identity information to
install user specific access policy at the
edge.
User moves to a branch site. Policy moves with it
36. Branch
SourceFire
Defence Center
SDN Controller
ISR
Sensor
X
Sensor
1. BYOD Malware/Javascript
Attack
2. SF Sensor detects threat
3. SF DC notifies Controller
4. Remediation API event
5. Policy installed on Access
switch port by Controller.
6. Block or quarantine end-point
WAN
ISR
Internet
HQ
Malware Attack
Defense Center
Alert!!!!
Controller
Notification
Remediation Policy
Enforcement
Host Quarantined
How to use Policy Programming for Network
Threat Defense - Policy Programming outside the UI
37. How to use Policy Programming for Network
Threat Defense - Policy Programming outside the UI
Branch
SourceFire
Defence Center
SDN Controller
ISR
Sensor
X
Sensor
WAN
ISR
Internet
HQ
Controller
Notification
Host Quarantined
Defense Center
/api/v0/policy POST!
{"actions": ["DENY"],
"policyOwner":"admin”,
"policyName": "deny_all”,
"networkUser":
{"userIdentifiers”:
["10.10.20.7"]}}!
42. APIC-EM with CUCM Integration—Step 1a
EM
The administrator enters strategic business Intent to APIC-EM
APIC-EM deploys:
a) static (ingress) ACL-based classification & DSCP-marking policies
(on access edge interfaces only)
with null ACL entries for VOICE and VIDEO
ip access-list extended VOICE
ip access-list extended VIDEO
ip access-list extended BULK-DATA
permit tcp any any eq ftp
permit tcp any any eq ftp-data
…
class-map match-all VOICE
match access-group name VOICE
class-map match-all VIDEO
match access-group name VIDEO
class-map match-all BULK-DATA
match access-group name BULK-DATA
…
policy-map APIC-EM-INGRESS-MARKING
class VOICE
set dscp ef
class VIDEO
set dscp af41
class BULK-DATA
set dscp af11 …
43. APIC-EM with CUCM Integration—Part 1b
EM
Once the administrator has entered strategic business Intent to APIC-EM
APIC-EM deploys:
a) static (ingress) ACL-based classification & DSCP marking policies
b) static (ingress and egress) DSCP-based queuing policies on all switches
class-map match-all VOICE-PQ1
match dscp ef
class-map match-all VIDEO-PQ2
match dscp af41
class-map match-any BULK-DATA-QUEUE
match dscp af11 af12 af13
…
policy-map APIC-EM-2P6Q3T
class VOICE-PQ1
priority level 1
class VIDEO-PQ2
priority level 2
class BULK-DATA-QUEUE
bandwidth remaining percent 5
queue-buffers ratio 10
queue-limit dscp values af13 percent 80
queue-limit dscp values af12 percent 90
queue-limit dscp values af11 percent 100 …
44. APIC-EM with CUCM Integration—Part 2
EM
CUCM signals APIC-EM of a proceeding call
APIC-EM deploys a dynamic ACL update for voice and/or video
to all ports on the switch (or switch module)
ip access-list extended VOICE
match udp host 10.1.1.1 eq 18578 host 10.2.2.2 eq 17333
ip access-list extended VIDEO
match udp host 10.1.1.1 eq 31199 host 10.2.2.2 eq 24141
ip access-list extended VOICE
match udp host 10.2.2.2 eq 17333 host 10.1.1.1 eq 18578
ip access-list extended VIDEO
match udp host 10.2.2.2 eq 24141 host 10.1.1.1 eq 31199
45. APIC-EM with CUCM Integration—Part 3
EM
CUCM signals APIC-EM of a terminating call
APIC-EM removes the dynamic ACL update for voice and/or video
ip access-list extended VOICE
no match udp host 10.1.1.1 eq 18578 host 10.2.2.2 eq 17333
ip access-list extended VIDEO
no match udp host 10.1.1.1 eq 31199 host 10.2.2.2 eq 24141
ip access-list extended VOICE
no match udp host 10.2.2.2 eq 17333 host 10.1.1.1 eq 18578
ip access-list extended VIDEO
no match udp host 10.2.2.2 eq 24141 host 10.1.1.1 eq 31199
47. Intelligent WAN
WAN Transport
Branch
MPLS
$$$
Low Cost Circuit,
Internet, 4G
$
Private
Cloud Virtual
Private
Cloud
Direct
Internet
Access
Internet
backhaul
Cisco
Cloud
Web Security
Public
Cloud
ü Secure WAN transport across MPLS
and/or Internet for private cloud / DC
access
Increase WAN Capacity Improve App Performance Scale Security at the Branch
ü Leverage Low Cost path for public cloud
and Internet access
Cisco
APIC -
Enterprise
Module
56. APIC-EM IWAN App
Application Policy
• Applications detected in the network when enabling AVC
• Classify applications in different categories
• Organize application in categories to create business
policies based on these categories
59. APIC-EM IWAN App
Application Policy
• Business logic à we tell the controller what
applications are relevant for the business
• The controller is going to perform background tasks
based on this business logic
60. APIC-EM IWAN App
Application Policy
• Define primary path for group of applications
• The controller will create a PfR policy based on
those paths.
63. Network Plug-n-Play – for Zero Touch Deployment
Unskilled
Installer
GUI Based
Consistent for devices &
PIN(Campus/Branch)
Secure
Zero-touch
RMA
Greenfield
& Brownfield
Central Staging Facility
Site-1
• Install OS
• Install base
config
Network
Admin
Installer
Site-3
Today’s Process
Site-2 Site(s)
Network PnP
Pre Provision
Projects/Sites
Network Admin
1
Install & Power-on
devices
2
Installer
Monitor device
installation
3
Network Admin
Reseller/
Partner
Ships
equipment Cisco
APIC -
Enterprise
Module
64. PnP Server
Use Case: Device Deployment in Campus
DHCP Server
Pre Provision Projects/
Sites
• Policies
• Match Rules
• Configs/Image
• IP Addressing
Network Admin
Day 0
Cisco
APIC -
Enterprise
Module
Pre-provision DHCP
Server
• IP address
• option 43
65. PnP Server
Use Case: Device Deployment in Campus
DHCP Server
Switch running
PnP Agent
Device
receives
PnP
server
specific
metadata
info
configured
in
DHCP
op7on
43
Device
validates
server’s
loca7on
and
establishes
a
communica7on
with
the
server
Installer
Remote Installer
• Mount and cable
devices
• Power-on
Day 1
Network Admin remotely
monitors status of install
while in progress.
Day 1
Cisco
APIC -
Enterprise
Module
66. APIC-EM ZTD App – Configure Site, Device, Config
• Campus
Workflow
• Serial #
and PID-
based
device
matching
• Operational
config and
IOS image
for each
device
Network Admin
Day 0
67. The End stage
Network Admin remotely
monitors status of install while
in progress.
Day 1
68. APIC-EM Apps a.k.a how can the controller help
simplify my environment?
• Path Visualization
• Path Visualization + Integration with Cisco Prime
Collaboration Manager
• ACL Trace
• ACL Analysis
• Security Policy Programming (Per User/Group)
• Policy Programming for Network Threat Defense
• Easy QoS via User Interface
• Dynamic Policy for video soft clients
• IWAN App
• Network Plug and Play Server
Applications
Released in
phases
Just a few
examples,
there’s much
more
70. Changing Nature of IT Ops with SDN
led Management
Traditional Management
Feature
Configuration
SDN Led Management
Policy
Automation
71. System of record vs. system of change
Prime Infrastructure APIC - EM
System of Record System of Change
• Policy definition
• Historical reporting on
events & performance
• Configuration archive
• Troubleshooting workflows
• Capacity Trending
• Predictive Analytics
• Policy enforcement
• Discovery (for change)
• Topology (for change)
• PnP
• Network state monitoring
• Device abstraction
• Network Control
72. Cisco Prime and APIC-EM
Control
Layer
Device
Layer
Operational Automation
Policy and Service Definition
Automated Assurance Provisioning
Visualization, Trending and
Analytics
Network Intelligence
Device Layer Abstraction
Network Control
Policy Enforcement & Network
Change
Management
&
Orchestration
Layer
Cisco Devices
Enterprise Networks, Data Center
Cisco APIC
Common ACI Architecture
APIC for datacenter APIC Enterprise Module
CLI, OpenFlow, OnePK API
REST API (ONE DevKit)
Catalog /
Provisioning
Fault /
Events
User / Data
Management
Performanc
e Monitoring
Reporting /
Analytics
Cisco IAC
UCSD
APIC-EM
App (IWAN)
PRIME INFRASTRUCTURE
& NAM
74. Summary
§ Changing Nature of IT Ops with SDN led Management
§ APIC-EM and Apps are a System of Change that will drive real time changes in the
network
§ Prime Infrastructure role will evolve into end-to-end assurance as System of Record,
while also catering to feature configuration for custom environments
§ The network administrator can now focus on Policy and Business Intent
(WHAT)
§ Controllers job to translate into network semantics/implementation (HOW)
§ API to expose the networks capabilities
§ APIC EM abstracts the underlying complexity of the network infrastructure
75. Give us your feedback and you could win a Plantronics
headset. Complete the session survey on your Cisco
Connect Toronto Mobile app at the end of your session
for a chance to win
Winners will be announced and posted at the
Information desk and on Twitter at the end of the day
(You must be present to win!)
Complete your session evaluation – May 14th