NetScaler SD-WAN provides software-defined wide area networking and cloud access capabilities that are secure, reliable and ensure high application quality. It offers various editions with standard features including bonding multiple WAN circuits into a single logical circuit, monitoring link conditions, and delivering applications over the best circuit. The product provides centralized configuration and management without requiring branch configurations.
SD-WAN is a newer technology that allows enterprises to access applications and data across various locations more effectively than traditional MPLS networks. It uses software to intelligently direct traffic over multiple internet connections based on priority, quality of service, and security requirements. There are several SD-WAN architectures including on-premises only, cloud-enabled, and cloud-enabled with a private backbone. Companies are switching to SD-WAN for benefits like improved security, centralized management, network visibility, scalability, and lower costs compared to MPLS.
SD WAN simplifies branch office connectivity and management while improving application performance and network visibility. It uses software to direct traffic over multiple connection types, including broadband internet and private links. This allows traffic to automatically switch to the best available connection. SD WAN provides benefits like lower costs, easier management, and application-aware routing compared to traditional router-based WANs. Various vendors offer SD WAN solutions targeting enterprises, communication service providers, or as cloud-based offerings.
Fernando Nunez's ANDICOM 2016 presentation discusses NFV and SDN and outlines use cases of vE-CPE and SD-WAN. He focuses on how combining these two use cases creates a comprehensive and powerful solution and describes the concept of Ensemble SmartWAN (SD-WAN 2.0).
The document discusses a case study of MWH Global implementing a software-defined WAN with Cisco and Glue Networks. MWH Global had challenges with provisioning remote sites, operational complexity, and high WAN costs. Using Cisco's software-defined WAN technology and Glue Network's orchestration platform, MWH Global saw benefits like 10-15 times more bandwidth, significant cost savings, and faster deployment of remote sites. The solution provided flexibility, resiliency and automation to simplify their network while reducing costs.
The document discusses IP/MPLS and SD-WAN technologies for connecting sites in a network. IP/MPLS uses MPLS services at layers 2 and 3 to securely connect sites with high performance and quality of service guarantees. SD-WAN brings together multiple connection types like MPLS, internet, and LTE into a single software-controlled network to reduce WAN costs while improving performance and security. For businesses, SD-WAN provides benefits of scalability, cost reduction, and ease of use, while MPLS is still needed for large enterprises with strict connectivity requirements. Both technologies will likely coexist with SD-WAN adoption increasing and MPLS use decreasing over time.
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
Small Brief on Next Generation SD-WAN
Dynamic business landscape and uncompromised demands of applications and users have driven dramatic transformation in IT Networking after many years of relative stability. Frequent changes in technologies are shifting networking from static Infrastructure to more agile, secured, future ready and hybrid-cloud infrastructure. This created un-precedented network management complexities that has become a growing concern for the enterprise.
Early Generation of SD-WAN providers were primarily focused on cost reduction via replacing MPLS with low-cost broadband.
Infinxt Next Generation SD-WAN handles data and network security with in-built NGFW, SLA based Application Performance Enhancement, Traffic Shaping, Multi/ Hybrid Cloud App aware routing, in addition to the traditional SD-WAN features
Infinxt Product Variants
1. Infinxt – Next Generation SD-WAN
Infinxt provides you with the best of the SD-WAN features that can address any of your WAN challenges. The device itself being a Zone based firewall, provides application visibility and control. The decoupled Data Plane and Control plane provides you with the needed flexibility and efficiency in addressing Day 0, Day 1 and Day 2 challenges.
The solution is industry and business agnostic whereby it would be able to meet any type of WAN requirements. The offering being indigenously made would be able to address unique requirements for niche industries too through customization
Features
2. Infinxt - Next Generation Firewall Powered by Palo Alto Networks
Legacy firewall security solutions react to new threats. Intelligent network security stays ahead of attackers and increases business agility. Infinxt SD-WAN comes with a pre-hosted Palo Alto Networks VM in the Infinxt iEdge devices. This offering is a boon for customers to convert their branches into next generation secured branches with the NGFW security capability of Palo Alto Networks.
3. Infinxt - Next Generation Secure SD-WAN Powered by Palo Alto Networks
The Secure Next Generation SD-WAN offering from Infinity Labs provides its customers with the best of both Network connectivity and Application security. It’s a unique combination where both the VMs are service chained to leverage their proficiency to provide a secured application experience to the users. Along with SD-WAN features it also gives NGFW features Powered by Palo Alto Networks.
Infinxt SD-WAN Console gives a Single UI for both SD-WAN and NGFW for ease of Network Operation and Management.
This feature gives the enterprises a unique proposition to have Palo Alto NGFW on tried and tested Infinxt Edge Device.
Palo Alto Networks Advantages
This document discusses Aruba's wireless networking solutions for modern enterprises. It highlights how Aruba ESP addresses increasing demands for high-performing Wi-Fi from trends like remote work, IoT, and digital transformation. Key aspects of Aruba ESP include unified operations with Aruba Central, seamless connectivity with application-aware networking, strong security through automation and segmentation, and AI-powered optimization. The document also outlines Aruba's portfolio of Wi-Fi 6/6E access points and edge devices, as well as deployment and management options through Aruba Central's cloud-native platform.
This document discusses the benefits of SD-WAN and how it addresses challenges businesses face with their networks. Some key points:
- SD-WAN allows businesses to use cheaper internet connections instead of expensive private circuits, reducing costs while maintaining security and performance. It provides dynamic routing of traffic over multiple links for high availability.
- SD-WAN simplifies management through centralized, cloud-based control. It improves application performance by selecting optimal paths and dynamically moving traffic if there are issues.
- SD-WAN enhances security with features like firewalls, intrusion detection, and encryption. Management has visibility into network and application usage for planning.
- Case studies show how SD-WAN helped
SD-WAN is a newer technology that allows enterprises to access applications and data across various locations more effectively than traditional MPLS networks. It uses software to intelligently direct traffic over multiple internet connections based on priority, quality of service, and security requirements. There are several SD-WAN architectures including on-premises only, cloud-enabled, and cloud-enabled with a private backbone. Companies are switching to SD-WAN for benefits like improved security, centralized management, network visibility, scalability, and lower costs compared to MPLS.
SD WAN simplifies branch office connectivity and management while improving application performance and network visibility. It uses software to direct traffic over multiple connection types, including broadband internet and private links. This allows traffic to automatically switch to the best available connection. SD WAN provides benefits like lower costs, easier management, and application-aware routing compared to traditional router-based WANs. Various vendors offer SD WAN solutions targeting enterprises, communication service providers, or as cloud-based offerings.
Fernando Nunez's ANDICOM 2016 presentation discusses NFV and SDN and outlines use cases of vE-CPE and SD-WAN. He focuses on how combining these two use cases creates a comprehensive and powerful solution and describes the concept of Ensemble SmartWAN (SD-WAN 2.0).
The document discusses a case study of MWH Global implementing a software-defined WAN with Cisco and Glue Networks. MWH Global had challenges with provisioning remote sites, operational complexity, and high WAN costs. Using Cisco's software-defined WAN technology and Glue Network's orchestration platform, MWH Global saw benefits like 10-15 times more bandwidth, significant cost savings, and faster deployment of remote sites. The solution provided flexibility, resiliency and automation to simplify their network while reducing costs.
The document discusses IP/MPLS and SD-WAN technologies for connecting sites in a network. IP/MPLS uses MPLS services at layers 2 and 3 to securely connect sites with high performance and quality of service guarantees. SD-WAN brings together multiple connection types like MPLS, internet, and LTE into a single software-controlled network to reduce WAN costs while improving performance and security. For businesses, SD-WAN provides benefits of scalability, cost reduction, and ease of use, while MPLS is still needed for large enterprises with strict connectivity requirements. Both technologies will likely coexist with SD-WAN adoption increasing and MPLS use decreasing over time.
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
Small Brief on Next Generation SD-WAN
Dynamic business landscape and uncompromised demands of applications and users have driven dramatic transformation in IT Networking after many years of relative stability. Frequent changes in technologies are shifting networking from static Infrastructure to more agile, secured, future ready and hybrid-cloud infrastructure. This created un-precedented network management complexities that has become a growing concern for the enterprise.
Early Generation of SD-WAN providers were primarily focused on cost reduction via replacing MPLS with low-cost broadband.
Infinxt Next Generation SD-WAN handles data and network security with in-built NGFW, SLA based Application Performance Enhancement, Traffic Shaping, Multi/ Hybrid Cloud App aware routing, in addition to the traditional SD-WAN features
Infinxt Product Variants
1. Infinxt – Next Generation SD-WAN
Infinxt provides you with the best of the SD-WAN features that can address any of your WAN challenges. The device itself being a Zone based firewall, provides application visibility and control. The decoupled Data Plane and Control plane provides you with the needed flexibility and efficiency in addressing Day 0, Day 1 and Day 2 challenges.
The solution is industry and business agnostic whereby it would be able to meet any type of WAN requirements. The offering being indigenously made would be able to address unique requirements for niche industries too through customization
Features
2. Infinxt - Next Generation Firewall Powered by Palo Alto Networks
Legacy firewall security solutions react to new threats. Intelligent network security stays ahead of attackers and increases business agility. Infinxt SD-WAN comes with a pre-hosted Palo Alto Networks VM in the Infinxt iEdge devices. This offering is a boon for customers to convert their branches into next generation secured branches with the NGFW security capability of Palo Alto Networks.
3. Infinxt - Next Generation Secure SD-WAN Powered by Palo Alto Networks
The Secure Next Generation SD-WAN offering from Infinity Labs provides its customers with the best of both Network connectivity and Application security. It’s a unique combination where both the VMs are service chained to leverage their proficiency to provide a secured application experience to the users. Along with SD-WAN features it also gives NGFW features Powered by Palo Alto Networks.
Infinxt SD-WAN Console gives a Single UI for both SD-WAN and NGFW for ease of Network Operation and Management.
This feature gives the enterprises a unique proposition to have Palo Alto NGFW on tried and tested Infinxt Edge Device.
Palo Alto Networks Advantages
This document discusses Aruba's wireless networking solutions for modern enterprises. It highlights how Aruba ESP addresses increasing demands for high-performing Wi-Fi from trends like remote work, IoT, and digital transformation. Key aspects of Aruba ESP include unified operations with Aruba Central, seamless connectivity with application-aware networking, strong security through automation and segmentation, and AI-powered optimization. The document also outlines Aruba's portfolio of Wi-Fi 6/6E access points and edge devices, as well as deployment and management options through Aruba Central's cloud-native platform.
This document discusses the benefits of SD-WAN and how it addresses challenges businesses face with their networks. Some key points:
- SD-WAN allows businesses to use cheaper internet connections instead of expensive private circuits, reducing costs while maintaining security and performance. It provides dynamic routing of traffic over multiple links for high availability.
- SD-WAN simplifies management through centralized, cloud-based control. It improves application performance by selecting optimal paths and dynamically moving traffic if there are issues.
- SD-WAN enhances security with features like firewalls, intrusion detection, and encryption. Management has visibility into network and application usage for planning.
- Case studies show how SD-WAN helped
Introduction to Software Defined WANs, by Alastair Johnson.
A presentation given at APRICOT 2016’s Software Defined Networking session on 24 February 2016.
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
Multiprotocol Label Switching (MPLS) has long been the standard for wide area network before SD-WAN came along. While most professionals consider SD-WAN to be the latest and more effective in enterprise networking problems, the benefits of MPLS technology cannot be ignored. Choosing between these two will depend on your company’s priorities. This guide will explore the two technologies to help you choose the best for your business.
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
Cisco's SD-WAN solution aims to address challenges facing the modern WAN and branch networks by providing:
(1) Secure, flexible connectivity to applications and services across hybrid networks including broadband internet, cellular and MPLS.
(2) Application-aware policies and intelligent routing to optimize the user experience for priority applications.
(3) Agile operations through centralized, template-based management and zero-touch provisioning of edge routers.
The document discusses Fortinet's Secure SD-WAN solution, including how it integrates next generation firewall capabilities into the SD-WAN architecture. It provides an overview of Fortinet's SD-WAN features such as application awareness, automated failover, simplified management, and high performance. The document also highlights how Fortinet's SD-WAN solution was recommended by NSS Labs for its security effectiveness, quality of experience, and total cost of ownership.
Build the SD-WAN business case for your whole company and identify the hidden benefits for everyone involved. Persona content and technical diagrams presented.
SDN Basics – What You Need to Know about Software-Defined NetworkingSDxCentral
SDNUniversity™ is our exclusive educational series on software-defined networking (SDN) and network functions virtualization (NFV) designed to help you develop practical, real-world knowledge and skills. Take advantage of this opportunity to learn SDN basics through a free, interactive online training session featuring experts from SDNCentral and Computerlinks.
Amin Vahdat
Principal Engineer
Google
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
The document describes Fortinet's FortiGate entry-level network security appliances. It provides specifications for various FortiGate and FortiWiFi models ranging from the 30E to 81E series. The appliances provide firewall, VPN, intrusion prevention, web filtering and unified threat management for small businesses and remote offices. They integrate into the Fortinet Security Fabric to provide centralized management and visibility across multiple security layers and devices.
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
This document provides an overview of software defined networking (SDN). It discusses how SDN enables data center teams to use software to efficiently control network resources, compared to traditional network switches. The document outlines several SDN topics and related technologies, including SDN standards, network function virtualization, use cases, sample projects, surveys, case studies, online courses, and software tools. It also includes sections on SDN architecture and how SDN is important for virtual environments and VM mobility.
This session will discuss WAN, branch and remote networking, including zero touch deployment, network security, simple and fast convergence for large scale IPSec deployments, seamless integration with cloud-based services, ADVPN, and others.
VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual
Local Area Networks (VLAN) on the whole local area network.[1] To do this, VTP carries VLAN
information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1Q, IEEE
802.10 and LANE trunks. VTP is available on most of the Cisco Catalyst Family products.
Putting Firepower Into The Next Generation FirewallCisco Canada
This document discusses Cisco's next generation firewall (NGFW) platforms and capabilities. It provides an overview of the Firepower Threat Defense (FTD) software and its deployment on various Cisco appliances. Key capabilities of FTD include intrusion prevention, application visibility and control, advanced malware protection, URL filtering, and SSL decryption. The document also reviews the feature sets and performance of Cisco's NGFW appliance families, including the ASA 5500-X, Firepower 2100, Firepower 4100, and Firepower 9300 series.
NetScaler SD-WAN combina la selección de rutas de paquete en tiempo real, optimización WAN, firewall, enrutamiento y análisis de aplicaciones en una sola solución completa. Tanto si accede a aplicaciones SaaS como a escritorios virtualizados o centros de datos tradicionales.
An introduction to Meraki as a company and a technology. Meraki have just been awarded visionary status is Gartners 2011 magic quadrant for Wireless LAN and have recently announced the MX range of Cloud-Managed Routers, Meraki, Making Branch Networking Easy.
Software Defined Networking/ Networking/ Traditional Networking/ SDN BenefitsMehak Azeem
These slides were presented to the IEEE NSS College of Engineering, Palakkad in collaboration with IEEE ComSoc and IEEE WIE.
For any further information, please connect;
[mehakazeem@ieee.org]
This document discusses different types of firewalls:
- Traditional firewalls filter packets based on source/destination IP/port and protocol but cannot classify applications or inspect encrypted traffic.
- Unified threat management (UTM) firewalls can classify traffic by application rather than just port, and provide intrusion detection/prevention, web filtering, and malware protection.
- Next generation firewalls (NGFW) build on UTM with additional capabilities like inspecting encrypted traffic and advanced threat protection.
Checkpoint Firewall Training designed comprehensive technical course with IT professionals. Get Best Checkpoint Firewall Online course at Global Trainings.
For more details contact us @: +91 40 6050 1418
CHECKPOINT FIREWALL ONLINE TRAINING COURSE CONTENT
INTRODUCTION ABOUT THE CHECKPOINT FIREWALL TRAINING
Introduction to the Checkpoint firewall
Modular nature of the Checkpoint firewall
Functionalities of the Management
The FW-1 & GUI modules
CHECKPOINT INSTALLATION TYPES
The Hardware platform
Checkpoint Rule base concepts – Checkpoint Firewall Training
The IP spoofing
INSTALLATION OF THE CHECKPOINT ON SPLAT
Initial configuration of the Splat
Web access to the Checkpoint-Checkpoint Firewall Training
Download & Installation of smart console
ACCESSING THE CHECKPOINT THROUGH SMARTDASHBOARD
Checkpoint objects description
Anti-spoofing configuration-Checkpoint Firewall Training
NAT Configuration
FILTER CONFIGURATION
The URL Filtering
The Antivirus inspection
Content Analysis
CHECKPOINT FIREWALL TRAINING USER AUTHENTICATION
The User Authentication
The Session Authentication
The Client Authentication
IPSEC VPN
Ayman Sheta Microsoft certified Trainer
www.asheta.com
This PP will show the step by step installation of Windows Server 2016 TP4 in a virtual machine which I have created for an online presentation .
Дмитрий Дурасов-«Технологии контейнеризации в Windows Server 2016»Tanya Denisyuk
This document discusses containerization in Windows Server 2016, including nested virtualization and Windows containers. It provides an overview of how Windows containers work under the hood and introduces the speaker, Dzmitry Durasau, along with several links for additional resources on containers in Windows Server 2016.
Introduction to Software Defined WANs, by Alastair Johnson.
A presentation given at APRICOT 2016’s Software Defined Networking session on 24 February 2016.
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
Multiprotocol Label Switching (MPLS) has long been the standard for wide area network before SD-WAN came along. While most professionals consider SD-WAN to be the latest and more effective in enterprise networking problems, the benefits of MPLS technology cannot be ignored. Choosing between these two will depend on your company’s priorities. This guide will explore the two technologies to help you choose the best for your business.
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
Cisco's SD-WAN solution aims to address challenges facing the modern WAN and branch networks by providing:
(1) Secure, flexible connectivity to applications and services across hybrid networks including broadband internet, cellular and MPLS.
(2) Application-aware policies and intelligent routing to optimize the user experience for priority applications.
(3) Agile operations through centralized, template-based management and zero-touch provisioning of edge routers.
The document discusses Fortinet's Secure SD-WAN solution, including how it integrates next generation firewall capabilities into the SD-WAN architecture. It provides an overview of Fortinet's SD-WAN features such as application awareness, automated failover, simplified management, and high performance. The document also highlights how Fortinet's SD-WAN solution was recommended by NSS Labs for its security effectiveness, quality of experience, and total cost of ownership.
Build the SD-WAN business case for your whole company and identify the hidden benefits for everyone involved. Persona content and technical diagrams presented.
SDN Basics – What You Need to Know about Software-Defined NetworkingSDxCentral
SDNUniversity™ is our exclusive educational series on software-defined networking (SDN) and network functions virtualization (NFV) designed to help you develop practical, real-world knowledge and skills. Take advantage of this opportunity to learn SDN basics through a free, interactive online training session featuring experts from SDNCentral and Computerlinks.
Amin Vahdat
Principal Engineer
Google
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
The document describes Fortinet's FortiGate entry-level network security appliances. It provides specifications for various FortiGate and FortiWiFi models ranging from the 30E to 81E series. The appliances provide firewall, VPN, intrusion prevention, web filtering and unified threat management for small businesses and remote offices. They integrate into the Fortinet Security Fabric to provide centralized management and visibility across multiple security layers and devices.
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
This document provides an overview of software defined networking (SDN). It discusses how SDN enables data center teams to use software to efficiently control network resources, compared to traditional network switches. The document outlines several SDN topics and related technologies, including SDN standards, network function virtualization, use cases, sample projects, surveys, case studies, online courses, and software tools. It also includes sections on SDN architecture and how SDN is important for virtual environments and VM mobility.
This session will discuss WAN, branch and remote networking, including zero touch deployment, network security, simple and fast convergence for large scale IPSec deployments, seamless integration with cloud-based services, ADVPN, and others.
VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual
Local Area Networks (VLAN) on the whole local area network.[1] To do this, VTP carries VLAN
information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1Q, IEEE
802.10 and LANE trunks. VTP is available on most of the Cisco Catalyst Family products.
Putting Firepower Into The Next Generation FirewallCisco Canada
This document discusses Cisco's next generation firewall (NGFW) platforms and capabilities. It provides an overview of the Firepower Threat Defense (FTD) software and its deployment on various Cisco appliances. Key capabilities of FTD include intrusion prevention, application visibility and control, advanced malware protection, URL filtering, and SSL decryption. The document also reviews the feature sets and performance of Cisco's NGFW appliance families, including the ASA 5500-X, Firepower 2100, Firepower 4100, and Firepower 9300 series.
NetScaler SD-WAN combina la selección de rutas de paquete en tiempo real, optimización WAN, firewall, enrutamiento y análisis de aplicaciones en una sola solución completa. Tanto si accede a aplicaciones SaaS como a escritorios virtualizados o centros de datos tradicionales.
An introduction to Meraki as a company and a technology. Meraki have just been awarded visionary status is Gartners 2011 magic quadrant for Wireless LAN and have recently announced the MX range of Cloud-Managed Routers, Meraki, Making Branch Networking Easy.
Software Defined Networking/ Networking/ Traditional Networking/ SDN BenefitsMehak Azeem
These slides were presented to the IEEE NSS College of Engineering, Palakkad in collaboration with IEEE ComSoc and IEEE WIE.
For any further information, please connect;
[mehakazeem@ieee.org]
This document discusses different types of firewalls:
- Traditional firewalls filter packets based on source/destination IP/port and protocol but cannot classify applications or inspect encrypted traffic.
- Unified threat management (UTM) firewalls can classify traffic by application rather than just port, and provide intrusion detection/prevention, web filtering, and malware protection.
- Next generation firewalls (NGFW) build on UTM with additional capabilities like inspecting encrypted traffic and advanced threat protection.
Checkpoint Firewall Training designed comprehensive technical course with IT professionals. Get Best Checkpoint Firewall Online course at Global Trainings.
For more details contact us @: +91 40 6050 1418
CHECKPOINT FIREWALL ONLINE TRAINING COURSE CONTENT
INTRODUCTION ABOUT THE CHECKPOINT FIREWALL TRAINING
Introduction to the Checkpoint firewall
Modular nature of the Checkpoint firewall
Functionalities of the Management
The FW-1 & GUI modules
CHECKPOINT INSTALLATION TYPES
The Hardware platform
Checkpoint Rule base concepts – Checkpoint Firewall Training
The IP spoofing
INSTALLATION OF THE CHECKPOINT ON SPLAT
Initial configuration of the Splat
Web access to the Checkpoint-Checkpoint Firewall Training
Download & Installation of smart console
ACCESSING THE CHECKPOINT THROUGH SMARTDASHBOARD
Checkpoint objects description
Anti-spoofing configuration-Checkpoint Firewall Training
NAT Configuration
FILTER CONFIGURATION
The URL Filtering
The Antivirus inspection
Content Analysis
CHECKPOINT FIREWALL TRAINING USER AUTHENTICATION
The User Authentication
The Session Authentication
The Client Authentication
IPSEC VPN
Ayman Sheta Microsoft certified Trainer
www.asheta.com
This PP will show the step by step installation of Windows Server 2016 TP4 in a virtual machine which I have created for an online presentation .
Дмитрий Дурасов-«Технологии контейнеризации в Windows Server 2016»Tanya Denisyuk
This document discusses containerization in Windows Server 2016, including nested virtualization and Windows containers. It provides an overview of how Windows containers work under the hood and introduces the speaker, Dzmitry Durasau, along with several links for additional resources on containers in Windows Server 2016.
SD-WAN has been hyped as the next-generation technology for Enterprise WAN. Enterprises has started to adopt SD-WAN as their next-generation branch connectivity solution. This session will cover how Nuage Networks Virtualized Network Services (VNS), SD-WAN Solution, is being used by Enterprise and some recent deployment example.
Whats new in Microsoft Windows Server 2016 Clustering and StorageJohn Moran
In this webinar we will learn what the High Availability & Storage team in Microsoft has cooked up for us in Windows Server 2016, which is being launched at Microsoft Ignite at the end of September.
There’s lots of new stuff in this release, including better high availability for Hyper-V, greater control over resource utilization, improved fault tolerance of transient events, newer design options for stretch or multi-site clusters, a whole new way of doing software defined storage with SATA and NVMe drives, built-in block-level storage replication, and hyper-convergence without having to break the bank.
This document provides an overview of Zigbee, a wireless protocol that allows low-cost devices to transmit small amounts of data. It discusses the history and development of Zigbee, why it was needed as an alternative to WiFi and Bluetooth, its static architecture and device types. The document then explains how Zigbee networks and mesh networking work and describes applications of Zigbee for home automation, remote control and telecom services. It highlights advantages such as long battery life, low complexity and cost, and flexibility through mesh networking.
This document provides an overview of Microsoft Active Directory, including definitions of key terms like domain, domain controller, organizational units, and group policy objects. It also discusses why PPM standalone may not work in an Active Directory environment due to Microsoft defaults preventing unknown programs from running and potential group policy restrictions. The document emphasizes getting accurate details about any issues and working with domain administrators, and reassures that the Level 2 support team can help if needed.
Active Directory is a directory service created by Microsoft that allows the management of users, groups, computers and other network resources. It uses a centralized database that contains information about these objects and authenticates users on the network. Administrators can use Active Directory to control permissions, security settings and other policies for all connected computers from a central location. It provides benefits like single sign-on, centralized management and automation of tasks. Active Directory requires a Windows server and networking infrastructure and planning is important for successful implementation and management of the directory service.
Deploying Windows Containers on Windows Server 2016Ben Hall
This document discusses deploying Docker containers on Windows Server 2016. It provides an introduction to Docker and containers, explains how containers work on Windows, and demonstrates how to deploy common applications like IIS and ASP.NET within Windows containers. It also covers building Windows-based Docker images, running containers in production, and the future of containers on Windows platforms.
The document summarizes the key aspects of ZigBee, a wireless networking standard targeted for low-power devices. It describes ZigBee's technical goals of low data rates, long battery life, and secure networking. It also outlines ZigBee's device types, network formation process, and traffic modes including beacon-enabled and non-beacon modes.
Active Directory is a database that stores information about a network's users, computers, groups, and other network resources. It allows for centralized management of these resources.
A domain controller is a server that responds to authentication requests on the Windows domain. It authenticates users' credentials when they log into the domain network.
Lightweight Directory Access Protocol (LDAP) is an open standard protocol that Active Directory supports to make user and resource information widely accessible for management and querying across the network.
This presentation looks at "web2" in the context of human experience, suggesting that the social web as extension of "real life" means that it transcends the marketing-biased, "numbered web" hype that has typically surrounded it.
The slides focus particularly on the use of "social web" tools in the enterprise.
I will present these slides at Online Information 4th December 2008. See http://www.online-information.co.uk/online08/seminar_description_ims.html?presentation_id=442 for more information
Satya Nadella is the Chief Executive Officer of Microsoft and has been a charter member since achieving his Microsoft Certified Solutions Associate certification in Windows Server 2016 on January 17, 2017, as evidenced by his certification number F967-8524.
The document discusses Zigbee, a wireless networking standard based on IEEE 802.15.4. Some key points include:
- Zigbee allows for low-power wireless networks at data rates up to 250 kbps using the 2.4 GHz frequency band.
- It supports mesh networking topologies and can have thousands of nodes with extremely low duty cycles and long battery life.
- Zigbee networks operate using CSMA-CA channel access and can operate in beacon-enabled or non-beacon modes.
This document provides an overview of software-defined wide area networking (SD-WAN). It discusses what SD-WAN is, the benefits it provides over traditional WANs, and the key components of an SD-WAN architecture, including the edge, controller, orchestrator, gateway, and web portal. Specific SD-WAN capabilities covered include dynamic path selection, simplified management, security features, WAN optimization techniques like deduplication and compression, and quality of service. The document also discusses SD-WAN considerations like global coverage, proof of concept support from vendors, and cloud connectivity including for SaaS applications.
How SD-WAN Providers Enhance Network PerformanceDigital Carbon
SD-WAN is changing the game when it comes to network performance, providing new solutions that minimize latency, increase speed and guarantee network availability.
An introduction to the key concepts of SDN and NFV with visuals of:
- How SDN is transforming the Data Center
- How NFV is transforming the Service Provider domain and the End-customer domain
- Objectives
- Origin
- Ambassadors
- Applicability
- Analogies
- Benefits
- Industry Standards
- Drivers
- Obstacles
- Growth
- Resources and Events
SDN and NFV both aim to virtualize and commoditize network hardware to reduce costs and increase flexibility. SDN separates the control plane from the data plane to allow centralized control of network behavior via software. NFV virtualizes network functions like firewalls and load balancers that were traditionally hardware appliances. Both seek to standardize networking functions through open source projects and standards bodies like ONF for SDN and ETSI for NFV. Major implementations include OpenStack for virtual infrastructure, OpenDaylight as an SDN controller, and OpenFlow as the SDN protocol. While complementary, SDN and NFV face challenges around vendor support and complexity that could slow wide adoption.
SDN and NFV both aim to virtualize and commoditize network hardware to reduce costs and increase flexibility. SDN separates the control plane from the data plane to allow centralized programming of network behavior, while NFV virtualizes network functions that were traditionally hardware-based appliances. The two technologies complement each other and are being developed through open standards and open source projects to drive industry adoption. Major challenges include developing common frameworks and ensuring interoperability between solutions.
VMworld 2013: SDDC is Here and Now: A Success Story VMworld
The document discusses how an SDDC case study assessed a company's technical architecture, processes, and people to reduce infrastructure costs by 50% within 3 years through migrating to a software-defined data center. It presents 3 technology stack options for implementing an SDDC and compares their considerations. The SDDC is projected to deliver dramatic and sustainable 75% cost reductions through server, storage, networking, and labor savings.
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld
This document provides an overview and agenda for a presentation on integrating VMware NSX and vCloud Automation Center. It discusses how the integration enables dynamic configuration and deployment of NSX logical networking and security services through vCloud Automation Center. Key features covered include network profiles for different application topologies, microsegmentation using security groups, applying firewall and security policies, and load balancing. The integration leverages the new NSX vCenter Orchestrator plugin to abstract workflows and make them more extensible.
The document provides an overview and agenda for a technical deep dive into Cisco SD-WAN. It discusses extending Cisco SD-WAN to Cisco routers, using Cloud onRamp to improve access to SaaS and IaaS applications, and providing layered security between sites and to the cloud. It also covers operations and troubleshooting capabilities in Cisco SD-WAN such as infrastructure monitoring, application visibility, performance statistics, and troubleshooting tools.
The document discusses Citrix NetScaler SD-WAN and its features. It provides information on how NetScaler SD-WAN can reduce network costs, improve branch resilience and centralize control. It highlights key differentiators of NetScaler SD-WAN such as intelligent path selection, end-to-end quality of service, management and visibility capabilities. The document also mentions upcoming Citrix Synergy and Cloud DNA events focused on NetScaler SD-WAN updates.
Customer interest is increasing well beyond just what our standalone products offer. In fact, customer don’t care about the products, they care about the solution. IaaS with SDN as a solution is extremely popular. Therefore, this is focused on joint solution of vRA, vRO, NSX-v and 3rd party options.
Cisco at v mworld 2015 cs integrated infrastructure_vmworld_cisco_v1ldangelo0772
This document discusses Cisco UCS Integrated Infrastructure and its benefits. It notes that the integrated infrastructure market is growing 47% annually and will be a $6 billion market in 2014. Cisco UCS is the foundation for many integrated infrastructure solutions and Cisco is a leader in the market with approximately 50% share. Cisco UCS provides benefits like reduced complexity, automation, flexibility and improved performance over traditional infrastructure solutions.
Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Ne...nvirters
OpenStack is HOT! No doubt about it. A recent survey by The New Stack and The Linux Foundation shows OpenStack as the most popular open source project ahead of other hot projects like Docker and KVM. OpenStack is now taking its rightful place as the open source cloud solution for enterprises and service providers.
To date OpenStack networking has not yet achieved the performance, scalability and reliability that many large enterprises demand. CPLANE NETWORKS solves that problem by delivering secure multi-tenant virtual networking that overcomes the limitations of the standard Neutron networking service. By making all networking services local to the compute node and achieving near line-rate throughput, CPLANE NETWORKS Dynamic Virtual Networks (DVN) delivers mega-scale networking for the most demanding application environments.
In this session John Casey will cover the basics of DVN and explain how CPLANE NETWORKS achieves "at scale" network performance within and across data centers.
About John Casey
John Casey has over 20 years of deep technology leadership. His proven success with a variety of technical leadership roles in Telecom, Enterprise and Government and in software design and development provide the foundation for the system architecture and engineering team.
Previously John led worldwide deployment teams for both IBM’s Software Group and Narus, Inc. His work in large scale, high performance system design at Transarc Labs and Walker Interactive Systems brings leadership to the CPLANE NETWORKS product suite.
This document provides a summary of announcements and updates from VMworld 2014, the largest virtualization and cloud global conference. It discusses VMware's vision for the Software Defined Data Center (SDDC) and highlights key technology announcements for various VMware products, including vRealize, NSX, OpenStack, and vCloud Automation Center. Hands-on labs and sessions are also referenced.
IT organizations have long been challenged by the cost and complexity of managing the enterprise wide area network (WAN), and the demands keep growing. Software-defined WAN (SD-WAN) technology has emerged to reduce that cost and complexity, all while improving performance. With so many SD-WAN architectures to consider, how do you determine which is right for your organization?
Review this presentation and you will:
- Assess your organization's WAN growth requirements
- Understand the impact of various SD-WAN architecture on your WAN deployment
- Compare SD-WAN vendors to determine the best fit for your enterprise
- Learn how rethinking the WAN can deliver agility, simplicity, improved quality of experience, and better cloud performance
- Discover the different architectures on the market, along with their benefits and drawbacks
The document provides an overview of ATS (Advanced Technology Solutions), a division of KGPCo that offers various managed network and cloud services. ATS differentiators include customized business solutions leveraging telecom and software expertise, proof of concept as a service (PoCaaS), a partner network, and 24/7 managed services. ATS supports professional and managed service models across domains like SD-WAN evaluation, VNF validation, and public cloud migration. Key services discussed include PoCaaS, public cloud, software development lifecycle, and data analytics services.
Software-Defined WAN is transforming Hybrid WAN networks into simplified, bandwidth efficient, and enterprise-class quality-of-experience deployments. These along with other unique attributes of SD-WAN combine to create a lower total cost of ownership (TCO) than Hybrid WAN alone. Join this webinar to learn the details of how SD-WAN is transforming Hybrid WAN into a solution that delivers a real ROI for your business.
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...ThousandEyes
This document discusses SD-WAN adoption and challenges, and how ThousandEyes internet and cloud intelligence can help address those challenges. It begins with an introduction to ThousandEyes and an overview of the SD-WAN market context and drivers of adoption. It then covers some of the key challenges of SD-WAN adoption around connectivity, management, and ISP selection. The presentation demonstrates how ThousandEyes can provide visibility into the internet underlay and help with fault isolation. It concludes with best practices for SD-WAN visibility using ThousandEyes' solutions.
Virtualization Forum 2015, Praha, 7.10.2015
sál Citrix
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf.
This document discusses InfiniGuard's data protection solution and its advantages over other backup appliances. It highlights InfiniGuard's ability to provide fast restore times even for large datasets through its use of InfiniBox storage technology. The document also covers how InfiniGuard addresses modern threats like ransomware through immutable snapshots, logical air-gapping of backups, and a isolated forensic network to enable fast recovery from cyber attacks.
Využijte svou Oracle databázi na maximum!
Ondřej Buršík
Senior Presales, Oracle
Arrow / Oracle
The document discusses maximizing the use of Oracle databases. It covers topics such as resilience, performance and agility, security and risk management, and cost optimization. It promotes Oracle Database editions and features, as well as Oracle Engineered Systems like Exadata, which are designed to provide high performance, availability, security and manageability for databases.
Prezentace z webináře dne 10.3.2022
Prezentovali:
Jaroslav Malina - Senior Channel Sales Manager, Oracle
Josef Krejčí - Technology Sales Consultant, Oracle
Josef Šlahůnek - Cloud Systems sales Consultant, Oracle
Prezentace z webináře ze dne 9.2.2022
Prezentovali:
Jaroslav Malina - Senior Channel Sales Manager, Oracle
Josef Krejčí - Technology Sales Consultant, Oracle
Josef Šlahůnek - Cloud Systems Sales Consultant, Oracle
The document discusses Oracle Database Appliance (ODA) high availability and disaster recovery solutions. It compares Oracle Real Application Clusters (RAC), RAC One Node, and Standard Edition High Availability (SEHA). RAC provides automatic restart and failover capabilities for load balancing across nodes. RAC One Node and SEHA provide restart and failover, but no load balancing. SEHA is suitable for Standard Edition databases if up to 16 sessions are adequate and a few minutes of reconnection time is acceptable without data loss during failover.
This document discusses InfiniGuard, a data protection solution from Infinidat. It highlights challenges with current backup solutions including slow restore times. InfiniGuard addresses this by leveraging InfiniBox storage technology to achieve restore objectives. It provides fast, scalable backup and restore performance. InfiniGuard also discusses threats from server-side encryption attacks and how its immutable snapshots and isolated backup environment help provide cyber resilience against such threats.
This document discusses Infinidat's scale-out storage solutions. It highlights Infinidat's unique software-driven architecture with over 100 patents. Infinidat systems can scale to over 7 exabytes deployed globally across various industries. Analyst reviews show Infinidat receiving higher ratings than Dell EMC, HPE, NetApp, and others. The InfiniBox systems offer multi-petabyte scale in a single rack with high performance, reliability, and efficiency.
This document discusses Oracle Database 19c and the concept of a converged database. It begins with an overview of new features in Oracle Database 19c, including direct upgrade paths, new in-memory capabilities, and improvements to multitenant architecture. It then discusses the concept of a converged database that can support multiple data types and workloads within a single database compared to using separate single-purpose databases. The document argues that a converged database approach avoids issues with data consistency, security, availability and manageability between separate databases. It notes Oracle Database's support for transactions, analytics, machine learning, IoT and other workloads within a single database. The document concludes with an overview of Oracle Database Performance Health Checks.
The document discusses Infinidat's scale-out storage solutions. It highlights Infinidat's unique software-driven architecture with over 100 patents. Infinidat solutions can scale to multi-petabyte capacity in a single rack and provide high performance, reliability, and cost-effectiveness compared to other storage vendors. The document also covers Infinidat's flexible business models, replication capabilities, and easy management tools.
The document discusses Oracle's Database Options Initiative and how it can help organizations address challenges in a post-pandemic world. It outlines bundles focused on security & risk resilience, operational resiliency, cost optimization, and performance & agility. Each bundle contains various Oracle database products and capabilities designed to provide benefits like reduced costs, increased availability, faster performance, and enhanced security. The document also provides information on specific products and how they address needs such as disaster recovery, data protection, database management, and query optimization.
Oracle's Data Protection Solutions Will Help You Protect Your Business Interests
The document discusses Oracle's data protection solutions, specifically the Oracle Recovery Appliance. The Recovery Appliance provides continuous data protection for Oracle databases with recovery points of less than one second. It offers faster restore performance compared to generic data protection appliances. The Recovery Appliance fully integrates with Oracle databases and offers features like real-time data validation and monitoring of data loss exposure.
The document discusses strategies for protecting data, including:
1. Implementing a well-defined data protection architecture using Oracle Database security controls and services like Data Safe to assess risks, discover sensitive data, and audit activities.
2. Using high availability technologies like Oracle Real Application Clusters and disaster recovery options like Data Guard and GoldenGate to ensure redundancy and meet recovery objectives.
3. Addressing challenges with traditional backup and restore approaches and the need for a new solution given critical failures and costs of $2.5M per year to correct.
OCI Storage Services provides different types of storage for various use cases:
- Local NVMe SSD storage provides high-performance temporary storage that is not persistent.
- Block Volume storage provides durable block-level storage for applications requiring SAN-like features through iSCSI. Volumes can be resized, backed up, and cloned.
- File Storage Service provides shared file systems accessible over NFSv3 that are durable and suitable for applications like EBS and HPC workloads.
This document discusses Oracle Cloud Infrastructure compute options including bare metal instances, virtual machine instances, and dedicated hosts. It provides details on instance types, images, volumes, instance configurations and pools, autoscaling, metadata, and lifecycle. Key points covered include the differences between bare metal, VM, and dedicated host instances, bringing your own images, customizing boot volumes, using instance configurations and pools for management and autoscaling, and accessing instance metadata.
Exadata z pohledu zákazníka a novinky generace X8M - 1. částMarketingArrowECS_CZ
Oracle's Exadata X8M is a new database platform that provides the best performance for running Oracle Database. It uses a scale-out architecture with optimized compute, storage, and networking resources. New features include shared persistent memory that provides latency of 19 microseconds and speeds up log writes by 8x. Exadata X8M also delivers 3x more throughput, 2x more IOPS, and 5x lower latency than competing all-flash arrays. It offers the highest database performance scaling linearly with additional racks.
Oracle Cloud Infrastructure (OCI) provides Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) through a global network of 29 regions. OCI offers high-performance computing resources, storage, networking, security, and edge services to support traditional and cloud-native workloads. Pricing for OCI is consistently lower than other major cloud providers for equivalent services, with flexible payment models and usage-based pricing.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
9. 9
• Dynamic Paths
– Connect Hub or Branch sites directly based on
• LAN to WAN or WAN to LAN kbps
• LAN to WAN or WAN to LAN kpbs
– Route Tables on the participating systems are updated
– There is a limit in each appliance for the number of
dynamic paths.
• When the limit is reached static paths will be used
– Provisioning manages allocation of capacity
– Rule and Class traffic management policies are honored
SD-WAN Meshing With Dynamic Paths
MCN
Branch
Branch
Branch
Branch
Branch
14. 14
NetScaler SD-WAN: Create a tunnel
MPLS EF Queue
MPLS Default Queue
Internet
NetScaler SD-WAN NetScaler SD-WAN
Logical tunnel created by encapsulating in UDP
LOGICAL TUNNEL CREATED
FROM DIVERSE LINKS
Connections can be built to the data center,
a private cloud, or another branch allowing
for a full mesh if desired!
15. 15
NetScaler SD-WAN: Measure every path
MPLS EF Queue
MPLS Default Queue
Internet
NetScaler SD-WAN NetScaler SD-WAN
Logical tunnel created by encapsulating in UDP
latency loss jitter cong.
latency loss jitter cong.
latency loss jitter cong.
latency loss jitter cong.
latency loss jitter cong.
latency loss jitter cong.
• The quality of every potential path is assessed with every packet, in each direction
Latency, loss, jitter, congestion and
availability are monitored for each path and
in each direction. And real traffic is used for
the measurement, not probe data.
!
16. 16
NetScaler SD-WAN: Direct traffic to the best path
MPLS EF Queue
MPLS Default Queue
Internet
NetScaler SD-WAN NetScaler SD-WAN
Logical tunnel created by encapsulating in UDP
• The quality of every potential path is assessed with every packet, in each direction
• Each data stream is directed to best path(s) with priority given to critical applications
BANDWIDTH
CONTROL
Each MPLS queue is treated as a separate
path, maximizing the value of MPLS and
ensuring the best path is always used.!
17. 17
NetScaler SD-WAN: Detect and fail over without impact
MPLS EF Queue
MPLS Default Queue
Internet
NetScaler SD-WAN NetScaler SD-WAN
Logical tunnel created by encapsulating in UDP
• The quality of every potential path is assessed with every packet, in each direction
• Each data stream is directed to best path with priority given to critical applications
• Data immediately fails over if an error is detected on any link
DETECT PROBLEMS QUICKLY
We can detect degraded links, or brownouts,
and quickly adapt traffic to compensate. By
not waiting for an actual outage, loss and
latency spikes won’t cause performance
problems.
!
18. 18
NetScaler SD-WAN: Detect and fail over without impact
MPLS EF Queue
MPLS Default Queue
Internet
NetScaler SD-WAN NetScaler SD-WAN
Logical tunnel created by encapsulating in UDPFailover occurs within a 2-3 packets of loss,
and those lost packets can be retransmitted
and reordered so the application is never
affected.
!AND REACT WITH LOSSLESS FAILOVER
• The quality of every potential path is assessed with every packet, in each direction
• Each data stream is directed to best path with priority given to critical applications
• Data immediately fails over if an error is detected on any link
19. 19
NetScaler SD-WAN: Optionally duplicate real-time traffic
MPLS EF Queue
MPLS Default Queue
Internet
NetScaler SD-WAN NetScaler SD-WAN
Logical tunnel created by encapsulating in UDPWith packet duplication, VoIP and HDX Thin
Wire will always take fastest path and never
lose a packet, results in an optimum user
experience
!
• The quality of every potential path is assessed with every packet, in each direction
• Each data stream is directed to best path with priority given to critical applications
• Data immediately fails over if an error is detected on any link
• Packet duplication ensures no loss of critical data for ultimate in consistent user experience
PACKET DUPLICATION
20. 20
NetScaler SD-WAN: Use multiple links for one session
MPLS EF Queue
MPLS Default Queue
Internet
NetScaler SD-WAN NetScaler SD-WAN
Logical tunnel created by encapsulating in UDPBonding links can result in a file
transfers that take half the time,
mitigating the impact of latency!
• The quality of every potential path is assessed with every packet, in each direction
• Each data stream is directed to best path with priority given to critical applications
• Data immediately fails over if an error is detected on any link
• Packet duplication ensures no loss of critical data for ultimate in consistent user experience
• Large flows can use multiple links simultaneously
BOND MULTIPLE LINKS
21. 21
NetScaler SD-WAN: Breakout Internet at the Branch
MPLS EF Queue
MPLS Default Queue
Internet
NetScaler SD-WAN NetScaler SD-WAN
Avoid backhauling Internet-bound traffic to
the data center to save bandwidth and
improve application performance!
• Allows Internet-destined traffic to go to the Internet directly or via a Secure Web Gateway (SWG)
• Interconnect with SWG services (Zscaler, ForcePoint, and McAfee) for security and policy enforcement
• Control the maximum amount of bandwidth for Internet traffic
Secure Web Gateway
(Zscaler, Forcepoint)
23. 23
Stand By WAN Links
Internet
MPLS
LTE-1NetScaler SD-WAN NetScaler SD-WAN
Satellite-1
LINK TYPE ACTIVE STANDBY
Example Internet, MPLS LTE-1, Satellite-1
• Choose Standby WAN Links based on Business rules
• Determine when Standby WAN links become Active
• Based on state of Active links – Use Standby links only when all active links are down
• Based on certain capacity thresholds - Make Standby Active, when traffic crosses a certain threshold %age
• Prioritize across Standby links for utilization – Use LTE from Carrier1 before using Satellite link
26. 26
End-to-End QoS Ensures Delivery and Efficiency
• QoS configuration configured globally from a single source, highly customizable
• Proactively prevent loss with duplication, react to network conditions with
retransmission and/or redirection
• Last-mile awareness prevents oversubscription and wasted utilization
WAN
10Mbps
Received
5Mbps
5Mbps
2.5Mbps
2.5Mbps
5Mbps
Received
28. 28
Integrated Stateful Firewall
• Comprehensive Firewall security: IP to Application layer
– Secure hosts, ports and infrastructure
– Support for Dynamic and Static NAT
– Enable firewall rules even for encrypted traffic with
Application intelligence
• Define zones to enforce different policies for
different users
• Single Point of Management across Network
– Provision, troubleshoot and analyze Routing and Security
through SD-WAN center
• NSS Labs certification coming in 3Q…
ALLOW
REJECT
COUNT &
LOG
DROP
33. 33
OVERLAY or WAN EDGE MODE
Routing Domains
• Expanded to 255 route domains
• A domain is a top level network entity that provides
network layer isolation
• Across domains, application policies, rules, routes and
routing tables are completely independent
USE CASES
• Application separation
• Enterprise acquisitions
• Managed Service Providers
BENEFITS
• Support for traffic isolation across
the Virtual WAN deployment
• Simplified management–Build per
domain policies without concern
for interference
Domain 1
Domain 255
MPLS
Internet
40. 40
Data Center
or CloudRemote
NetScaler MAS
L4 Per-Hop
SD-WAN - SESD-WAN - SE
NetScaler Gateway
Or SD-WAN WO/EE
ICA Info
L4 Per-Hop
• Supported across NetScaler portfolio
and integrated with Desktop
Director
• Existing integration with other
analytics & visibility tools e.g. Splunk
• Detailed visibility on users,
apps/desktops and devices
• Start with a user and click through to
identify hop-by-hop latency
• Quickly narrow down source of
problems
• Real-time analysis as well as historical
data for troubleshooting
Extended Visibility with HDX Insight
NetScaler
Gateway
NetScaler SD-WANNetScaler SD-WAN