SlideShare a Scribd company logo
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
The Evolving Role of the
Network Engineer
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
…Into the Rabbit Hole
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
All or some of the products detailed in this presentation may still be under development and certain
specifications, including but not limited to, release dates, prices, and product features, may change. The
products may not function as intended and a production version of the products may never be released.
Even if a production version is released, it may be materially different from the pre-release version
discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express or implied,
statutory or otherwise, including but not limited to, any implied warranties of merchantability, fitness for
a particular purpose, or non-infringement of third-party rights with respect to any products and services
referenced herein.
ADX, AnyIO, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX,
MyBrocade, OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network
and The On-Demand Data Center are trademarks of Brocade Communications Systems, Inc., in the
United States and/or in other countries. Other brands, products, or service names mentioned may be
trademarks of others.
Legalish Disclaimer
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 3
This presentation, with prepared remarks, includes forward-looking statements regarding Brocade’s financial results,
goals, plans, assumptions, strategy and business outlook, revenue, tax rate, cash, stock buybacks, OEM inventory, prospects,
as well as U.S. Federal spending and order flow, and IT spending, which are only predictions and involve risks and
uncertainties such that actual results may vary significantly. These and other risks are set forth in more detail in our Form
10-K for the fiscal year ended October 26, 2013 and our Form 10-Q for the fiscal quarter ended August 2, 2015. These
forward-looking statements reflect beliefs, assumptions, outlook, estimates, and predictions as of today, and Brocade
expressly assumes no obligation to update any such forward-looking statements whether as the result of new
developments or otherwise.
In addition, this presentation includes various third-party estimates regarding market share and other measures, which do
not necessarily reflect the views of Brocade. Further, Brocade does not guarantee the accuracy or reliability of any such
information or forecast.
Certain financial information is presented on a non-GAAP basis. Management believes that non-GAAP financial measures
used in this presentation allow stakeholders to gain a better understanding of Brocade’s comparative operating
performance both from period to period, and to its competitors’ operating results. Management also believes these non-
GAAP financial measures help indicate Brocade’s baseline performance before gains, losses or charges that are considered
by management to be outside of ongoing operating results. Accordingly, management uses these non-GAAP financial
measures for planning and forecasting of future periods and in making decisions regarding operations performance and
the allocation of resources. The most directly comparable GAAP information and a reconciliation between the non-GAAP
and GAAP figures are provided in
the accompanying press release, which has been furnished to the SEC on Form 8-K and posted on Brocade’s website, and is
included in the appendix in this presentation.
Legal Disclosure
Please see risk factors on Form 10-Q and Form 10-K filed with the SEC
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 4
BROCADE > Futurist & Principal Engineer | Office of the CTO
IETF > Co-Chair TRILL WG
> Routing Directorate Co-Coordinator
> Routing Area Encapsulation Design Team Member
> Architect/Design Group member for the NVo3 WG
ISO/IEC JTC 1 > JTC1BDSG - Study Group on Big Data (completed 1/2015)
INCITS > Ad Hoc on Big Data (completed 1/2015)
Jon Hudson
Recent Evidence of My Existence….
JON.HUDSON@[BROCADE]||[GMAIL].COM
SMS: 1.650.766.7662
@THE_SOLUTIONEER @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 5
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
JON.HUDSON@[BROCADE]||[GMAIL].COM
SMS: 1.650.766.7662
@THE_SOLUTIONEER 6
SERVER L2-7 NETWORK GEAR ROUTING & POLICY ORCHESTRATION
Software Defined DatacenterOn Demand DatacenterRight Click, Datacenter
DAYS DAYS DAYS DAYS
X86 VirtualizationX86 Virtualization
MINS
NfVNFV
MINS
PROGRAMMATICOpenFlow
MINS
API AUTOMATIONOpenstack
MINS
OPEN Daylight
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 7
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING, DON’T ASK WHY
STAGE 2 ANALYTICS & SOFTWARE REMEDIATION
STAGE 3 MACHINE LEARNING
STAGE 4 FIND NEW CAREER
STAGE 0
PATIENT 0 DIES…AND PROBABLY A FEW MORE…
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER FINDS
AN ISSUE
IT GUY
DEBUGS
LOG EVENT &
USER EVENT
CORROLATION
WAIT FOR
CONFIRMATION
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
HUMANS ARE BAD MONITORING TOOLS
STAGE 0
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
LOG EVERYTHING!
STAGE 1
PATIENT 0 STILL DIES…BUT HOPEFULLY NOT AS MANY
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
HOW DO YOU MONITOR THE KNOWN UNKNOWNS?
A SCSI BACKPLANE ISSUE ON EMC
SYMMETRIX STORAGE ARRAY
DISCOVERED SIX MONTHS PRIOR
TO ARRAY BASED ALERTING BY TRACKING
“BURSTABLE EFFICIENCY” OVER TWELVE
MONTHS
DB LOSS TRACKED OVER LONG PERIODS
TO INDICATE LIKELY TRANCEIVER
DEATH
2 YEARS OF DATA NEEDED
TO CATCH ALL HUMAN CYCLES
STAGE 1
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
STAGE 2—ANALYTICS
PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
IP Analytics Pack for vRealize Operations
Virtual network resilience through physical network visibility
VIRTUAL NETWORK RESILIENCE THROUGH PHYSICAL NETWORK VISIBILITY
Intelligent Network Operations
Delivers comprehensive VCS operational
data to support software-defined data
center analytics
Unified Virtual & Physical
Networking
Provides insights and visibility into
the physical network for better
application and VM performance
Simplified Policy Automation
Predefined alerts and recommended actions
simplify monitoring; health,
risk, and efficiency metrics add context
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 14
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGE 2
PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
RINSE &
REPEAT
SETUP BASIC KNOWN
TRIGGERS
*Want to know more about Machine Learning?
Please Check out David Meyer’s ML Presentation
http://www.1-4-5.net/~dmm/talks/2015/MWC/mwc2015.pptx
STAGE 3—MACHINE
LEARNING*
BRINGS YOU NEW QUESTIONS
Google PUE Optimization Application1
• Straightforward application of ANN/supervised learning
– Lots more happening at Google (and FB, Baidu, NFLX, MSFT,AMZN,…)
• http://research.google.com/pubs/ArtificialIntelligenceandMachineLearning.html
• Use case: Predicting Power Usage Effectiveness (PUE)
– Basically: They developed a neural network framework that learns from
operational data and models plant performance
– The model is able to predict PUE2 within a range of 0.004 +
0.005 , or 0.4% error for a PUE of 1.1
• “A simplified version of what the
models do: take a bunch of data, find
the hidden interactions, then provide recommendations that optimize for
energy efficiency.”
– http://googleblog.blogspot.com/2014/05/better-data-centers-through-machine.html
1HTTPS://DOCS.GOOGLE.COM/A/GOOGLE.COM/VIEWER?URL=WWW.GOOGLE.COM/ABOUT/DATACENTERS/EFFICIENCY/INTERNAL/ASSETS/MACHINE-LEARNING-APPLICATIONSFOR-DATACENTER-OPTIMIZATION-FINALV2.PDF
2 HTTP://EN.WIKIPEDIA.ORG/WIKI/POWER_USAGE_EFFECTIVENESS
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 17
Google Use Case: Features
Number of features relatively small (n = 19)
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 18
Google Use Case: Details
• Neural Network
– 5 hidden layers
– 50 nodes per hidden layer
– 0.001 as the regularization parameter (λ)
• Training Dataset
– 19 normalized input parameters (features) per normalized
output variable (the DC PUE)
• Data normalized into the range [-1,-1]
– 184,435 time samples at 5 minute resolution
• O(2) years of data
– 70% for training, 30% for cross validation
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 19
Google Use Case: Sensitivity Analysis
• After the model is trained, one can look at effect of individual
parameters by varying one while holding the others constant
The relationship between PUE and the number of chillers
running is nonlinear because chiller efficiency decreases
exponentially with reduced load.
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 20
Google: Outside Air Enthalpy Has Largest
Impact on PUE
Relationship between PUEand
outside air enthalpy, or total
energy content of the ambient air.
As the air enthalpy increases, the
number of cooling towers,
Supplemental chillers, and
associated loading rises as well,
producing a nonlinear effect on
the DC overhead. Note that
enthalpy is a more compre-
hensive measure of outdoor
weather conditions than the wet
bulb temperature alone since it
includes the moisture content and
specific heat of ambient air.
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 21
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER FINDS AN
ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
STAGE 0 HUMAN ALERT NETWORK
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
LOG EVERYTHING!
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING,
DON’T ASK WHY
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING,
DON’T ASK WHY
STAGE 2 ANALYTICS
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING,
DON’T ASK WHY
STAGE 2 ANALYTICS
STAGE 3 MACHINE LEARNING
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
RINSE &
REPEAT
SETUP BASIC KNOWN
TRIGGERS
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
EVIL SOFTWARE
COMING TO TAKE
YOUR JOBS
STAGE 4:
FIND NEW CAREER
Tale of the Tape
2000 vs. 2015
TALE%OF%THE%TAPE%
2015%
1 6 3 0 l bs ----- Weigh t ------- 5 9 l bs
4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v
3 2 1 0 0 ---- BTU ------ 2 6 9 7
Yes --- 1 0 G/4 0 G Lin e-Rat e --- Yes
Yes --- 1 0 0 G Lin e-Rat e --- Yes *
YES --- BGP/MPLS --- YES
No --- SW/H W Separ at io n --- Yes
Cus t o m -------- Type ---- Mer ch an t
IOS XR -------------- OS ------- Yo u Ch o o s e
> $ 1 M --- Co s t --- ~ $ 5 k
> $ 2 0 0 k --- 1 yr Suppo r t --- $ 2 k
Yes ----H o t Swap H W ---- No
Yes --- COD --- No
Yes --- H W Par t it io n s --- No
%
TALE%OF%THE%TAPE%
2000%
1 2 0 0 l bs ---- Weigh t ------- 5 9 l bs
4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v
3 2 1 0 0 --- BTU ----- 2 6 9 7
6 4 bit --------- Ar ch ---------- 3 2 bit
2 4 --------- CPUs ------------- 2
4 8 ---------- Th r eads ------------ 2
3 8 4 GB ---- Memo r y ------- 3 2 G
Cus t o m -------- Type ---- Mer ch ant
So l ar is --- OS --- Linux
~ $ 2 5 0 k ----- Co s t ------ ~ $ 2 .5 k
$ 6 0 k --- 1 yr Suppo r t --- $ 2 k
Yes ----H o t Swap H W ---- No
Yes --- COD --- No
Yes --- H W Par t it io ns --- No
%
%
%
2000 2015
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 27
THIS IS ALSO ABOUT
MULTITENANCY
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
Next Gen Data Centers
Direct networking and free range VMs
x20
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 29
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 30
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 31
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 32
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 33
Programmability
Python scripting
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
To use Python interpreter:
NOSCLI “python” from NOSCLI
shell.
Create Python script; copy script
to switch and execute
sw0# copy
scp://releaseuser:releaseuser@10.24.81.13//users/home32/badan
iya/proj/scorpius/scripts/create_po.py flash://create_po.py
sw0# python create_po.py
!Command: show running-config int vlan
!Time: Tue Jan 6 08:32:33 2015
interface Vlan 1
!
Script can be loaded on principal
switch and automate VCS Fabric
34
Programmability
VDX Puppet Integration
Node1
Node2 Netconf
Netconf
Puppet
Master
VCS1
Catalog
Catalog
catalog
VCS2
Catalog
Catalog
catalog
• nos_netdev_device: Device Configuration
• nos_netdev_interface: L2 Interface configuration
• nos_netdev_vlan: VLAN configuration
• nos_netdev_l2_interface: VLAN to interface assignments
NOS Provider List
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 35
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 36
Real-Time Routing with Reality
Don’t guess, know!
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
Analysis Engine
37
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
Thank you

More Related Content

What's hot

Evolution of the Physical Data Center - Mike Bushong
Evolution of the Physical Data Center - Mike BushongEvolution of the Physical Data Center - Mike Bushong
Evolution of the Physical Data Center - Mike Bushong
scoopnewsgroup
 
OpenStack Hybrid Cloud Management and Orchestration - James Bond
OpenStack Hybrid Cloud Management and Orchestration - James BondOpenStack Hybrid Cloud Management and Orchestration - James Bond
OpenStack Hybrid Cloud Management and Orchestration - James Bond
scoopnewsgroup
 
A Switch based complete solution
A Switch based complete solutionA Switch based complete solution
A Switch based complete solution
Prime Infoserv
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance
NETSCOUT
 
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
F5 Networks
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
Robb Boyd
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
Nur Shiqim Chok
 
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco Canada
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
F5 Networks
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
scoopnewsgroup
 
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BASASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
bourhan88100
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco Canada
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco Canada
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
NetworkCollaborators
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Canada
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
F5 Networks
 
Combining Man & Machine: A Glimpse into the Future - David Meyer
Combining Man & Machine:  A Glimpse into the Future - David MeyerCombining Man & Machine:  A Glimpse into the Future - David Meyer
Combining Man & Machine: A Glimpse into the Future - David Meyer
scoopnewsgroup
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
ThousandEyes
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco Canada
 

What's hot (20)

Evolution of the Physical Data Center - Mike Bushong
Evolution of the Physical Data Center - Mike BushongEvolution of the Physical Data Center - Mike Bushong
Evolution of the Physical Data Center - Mike Bushong
 
OpenStack Hybrid Cloud Management and Orchestration - James Bond
OpenStack Hybrid Cloud Management and Orchestration - James BondOpenStack Hybrid Cloud Management and Orchestration - James Bond
OpenStack Hybrid Cloud Management and Orchestration - James Bond
 
A Switch based complete solution
A Switch based complete solutionA Switch based complete solution
A Switch based complete solution
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance
 
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
 
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it management
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BASASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna center
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
Combining Man & Machine: A Glimpse into the Future - David Meyer
Combining Man & Machine:  A Glimpse into the Future - David MeyerCombining Man & Machine:  A Glimpse into the Future - David Meyer
Combining Man & Machine: A Glimpse into the Future - David Meyer
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 

Viewers also liked

Top 5 network engineer cover letter samples
Top 5 network engineer cover letter samplesTop 5 network engineer cover letter samples
Top 5 network engineer cover letter samplesdorifuza
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
TheZayne92
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administrator
Khang-Ling Loh
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
Sarmad Ali
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
CCNAResources
 

Viewers also liked (6)

Top 5 network engineer cover letter samples
Top 5 network engineer cover letter samplesTop 5 network engineer cover letter samples
Top 5 network engineer cover letter samples
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administrator
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
Router commands
Router commandsRouter commands
Router commands
 

Similar to The Evolving Role of the Network Engineer - Jon Hudson

Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"
Peter Coffee
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
 
Micrso Strategy Advanced Guide
Micrso Strategy Advanced GuideMicrso Strategy Advanced Guide
Micrso Strategy Advanced Guide
divjeev
 
IRJET-Securing Electronic Health Records using Blockchain
IRJET-Securing Electronic Health Records using BlockchainIRJET-Securing Electronic Health Records using Blockchain
IRJET-Securing Electronic Health Records using Blockchain
IRJET Journal
 
Capstone Final Project
Capstone Final ProjectCapstone Final Project
Capstone Final Projectchris odle
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for free
Elasticsearch
 
Social Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; Revolution
Peter Coffee
 
Platform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs controlPlatform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs control
Salesforce - Sweden, Denmark, Norway
 
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...ReidCarlberg
 
Welcome to the Government Success Platform
Welcome to the Government Success PlatformWelcome to the Government Success Platform
Welcome to the Government Success Platform
Salesforce Partners
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
DevOps.com
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
jasoninnes20
 
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonA Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
John Billings CISSP
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
CA Technologies
 
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Derek Baron
 
HCE204: The Wonderful World Of Containers
HCE204: The Wonderful World Of ContainersHCE204: The Wonderful World Of Containers
HCE204: The Wonderful World Of Containers
NEXTtour
 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise apps
Michel de Goede
 

Similar to The Evolving Role of the Network Engineer - Jon Hudson (20)

Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Micrso Strategy Advanced Guide
Micrso Strategy Advanced GuideMicrso Strategy Advanced Guide
Micrso Strategy Advanced Guide
 
IRJET-Securing Electronic Health Records using Blockchain
IRJET-Securing Electronic Health Records using BlockchainIRJET-Securing Electronic Health Records using Blockchain
IRJET-Securing Electronic Health Records using Blockchain
 
Capstone Final Project
Capstone Final ProjectCapstone Final Project
Capstone Final Project
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for free
 
Social Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; Revolution
 
RiskAssessmentReport
RiskAssessmentReportRiskAssessmentReport
RiskAssessmentReport
 
Platform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs controlPlatform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs control
 
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
 
Welcome to the Government Success Platform
Welcome to the Government Success PlatformWelcome to the Government Success Platform
Welcome to the Government Success Platform
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
 
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonA Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
 
HCE204: The Wonderful World Of Containers
HCE204: The Wonderful World Of ContainersHCE204: The Wonderful World Of Containers
HCE204: The Wonderful World Of Containers
 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise apps
 

More from scoopnewsgroup

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
scoopnewsgroup
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
scoopnewsgroup
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
scoopnewsgroup
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
scoopnewsgroup
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
scoopnewsgroup
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
scoopnewsgroup
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
scoopnewsgroup
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
scoopnewsgroup
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
scoopnewsgroup
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
scoopnewsgroup
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
scoopnewsgroup
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
scoopnewsgroup
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
scoopnewsgroup
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
scoopnewsgroup
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
scoopnewsgroup
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
scoopnewsgroup
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
scoopnewsgroup
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
scoopnewsgroup
 

More from scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

The Evolving Role of the Network Engineer - Jon Hudson

  • 1. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES The Evolving Role of the Network Engineer
  • 2. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES …Into the Rabbit Hole @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
  • 3. All or some of the products detailed in this presentation may still be under development and certain specifications, including but not limited to, release dates, prices, and product features, may change. The products may not function as intended and a production version of the products may never be released. Even if a production version is released, it may be materially different from the pre-release version discussed in this presentation. Nothing in this presentation shall be deemed to create a warranty of any kind, either express or implied, statutory or otherwise, including but not limited to, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement of third-party rights with respect to any products and services referenced herein. ADX, AnyIO, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX, MyBrocade, OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network and The On-Demand Data Center are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be trademarks of others. Legalish Disclaimer @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 3
  • 4. This presentation, with prepared remarks, includes forward-looking statements regarding Brocade’s financial results, goals, plans, assumptions, strategy and business outlook, revenue, tax rate, cash, stock buybacks, OEM inventory, prospects, as well as U.S. Federal spending and order flow, and IT spending, which are only predictions and involve risks and uncertainties such that actual results may vary significantly. These and other risks are set forth in more detail in our Form 10-K for the fiscal year ended October 26, 2013 and our Form 10-Q for the fiscal quarter ended August 2, 2015. These forward-looking statements reflect beliefs, assumptions, outlook, estimates, and predictions as of today, and Brocade expressly assumes no obligation to update any such forward-looking statements whether as the result of new developments or otherwise. In addition, this presentation includes various third-party estimates regarding market share and other measures, which do not necessarily reflect the views of Brocade. Further, Brocade does not guarantee the accuracy or reliability of any such information or forecast. Certain financial information is presented on a non-GAAP basis. Management believes that non-GAAP financial measures used in this presentation allow stakeholders to gain a better understanding of Brocade’s comparative operating performance both from period to period, and to its competitors’ operating results. Management also believes these non- GAAP financial measures help indicate Brocade’s baseline performance before gains, losses or charges that are considered by management to be outside of ongoing operating results. Accordingly, management uses these non-GAAP financial measures for planning and forecasting of future periods and in making decisions regarding operations performance and the allocation of resources. The most directly comparable GAAP information and a reconciliation between the non-GAAP and GAAP figures are provided in the accompanying press release, which has been furnished to the SEC on Form 8-K and posted on Brocade’s website, and is included in the appendix in this presentation. Legal Disclosure Please see risk factors on Form 10-Q and Form 10-K filed with the SEC @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 4
  • 5. BROCADE > Futurist & Principal Engineer | Office of the CTO IETF > Co-Chair TRILL WG > Routing Directorate Co-Coordinator > Routing Area Encapsulation Design Team Member > Architect/Design Group member for the NVo3 WG ISO/IEC JTC 1 > JTC1BDSG - Study Group on Big Data (completed 1/2015) INCITS > Ad Hoc on Big Data (completed 1/2015) Jon Hudson Recent Evidence of My Existence…. JON.HUDSON@[BROCADE]||[GMAIL].COM SMS: 1.650.766.7662 @THE_SOLUTIONEER @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 5
  • 6. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES JON.HUDSON@[BROCADE]||[GMAIL].COM SMS: 1.650.766.7662 @THE_SOLUTIONEER 6
  • 7. SERVER L2-7 NETWORK GEAR ROUTING & POLICY ORCHESTRATION Software Defined DatacenterOn Demand DatacenterRight Click, Datacenter DAYS DAYS DAYS DAYS X86 VirtualizationX86 Virtualization MINS NfVNFV MINS PROGRAMMATICOpenFlow MINS API AUTOMATIONOpenstack MINS OPEN Daylight @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 7
  • 8. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGE 0 HUMAN ALERT NETWORK STAGE 1 LOG EVERYTHING, DON’T ASK WHY STAGE 2 ANALYTICS & SOFTWARE REMEDIATION STAGE 3 MACHINE LEARNING STAGE 4 FIND NEW CAREER
  • 9. STAGE 0 PATIENT 0 DIES…AND PROBABLY A FEW MORE… BUILD A DATACENTER DEPLOY AN APPLICATION USER FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
  • 10. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES HUMANS ARE BAD MONITORING TOOLS STAGE 0
  • 11. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION SETUP BASIC KNOWN TRIGGERS LOG EVERYTHING! STAGE 1 PATIENT 0 STILL DIES…BUT HOPEFULLY NOT AS MANY
  • 12. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES HOW DO YOU MONITOR THE KNOWN UNKNOWNS? A SCSI BACKPLANE ISSUE ON EMC SYMMETRIX STORAGE ARRAY DISCOVERED SIX MONTHS PRIOR TO ARRAY BASED ALERTING BY TRACKING “BURSTABLE EFFICIENCY” OVER TWELVE MONTHS DB LOSS TRACKED OVER LONG PERIODS TO INDICATE LIKELY TRANCEIVER DEATH 2 YEARS OF DATA NEEDED TO CATCH ALL HUMAN CYCLES STAGE 1
  • 13. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION SETUP BASIC KNOWN TRIGGERS STAGE 2—ANALYTICS PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
  • 14. IP Analytics Pack for vRealize Operations Virtual network resilience through physical network visibility VIRTUAL NETWORK RESILIENCE THROUGH PHYSICAL NETWORK VISIBILITY Intelligent Network Operations Delivers comprehensive VCS operational data to support software-defined data center analytics Unified Virtual & Physical Networking Provides insights and visibility into the physical network for better application and VM performance Simplified Policy Automation Predefined alerts and recommended actions simplify monitoring; health, risk, and efficiency metrics add context @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 14
  • 15. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGE 2 PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
  • 16. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION RINSE & REPEAT SETUP BASIC KNOWN TRIGGERS *Want to know more about Machine Learning? Please Check out David Meyer’s ML Presentation http://www.1-4-5.net/~dmm/talks/2015/MWC/mwc2015.pptx STAGE 3—MACHINE LEARNING* BRINGS YOU NEW QUESTIONS
  • 17. Google PUE Optimization Application1 • Straightforward application of ANN/supervised learning – Lots more happening at Google (and FB, Baidu, NFLX, MSFT,AMZN,…) • http://research.google.com/pubs/ArtificialIntelligenceandMachineLearning.html • Use case: Predicting Power Usage Effectiveness (PUE) – Basically: They developed a neural network framework that learns from operational data and models plant performance – The model is able to predict PUE2 within a range of 0.004 + 0.005 , or 0.4% error for a PUE of 1.1 • “A simplified version of what the models do: take a bunch of data, find the hidden interactions, then provide recommendations that optimize for energy efficiency.” – http://googleblog.blogspot.com/2014/05/better-data-centers-through-machine.html 1HTTPS://DOCS.GOOGLE.COM/A/GOOGLE.COM/VIEWER?URL=WWW.GOOGLE.COM/ABOUT/DATACENTERS/EFFICIENCY/INTERNAL/ASSETS/MACHINE-LEARNING-APPLICATIONSFOR-DATACENTER-OPTIMIZATION-FINALV2.PDF 2 HTTP://EN.WIKIPEDIA.ORG/WIKI/POWER_USAGE_EFFECTIVENESS @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 17
  • 18. Google Use Case: Features Number of features relatively small (n = 19) @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 18
  • 19. Google Use Case: Details • Neural Network – 5 hidden layers – 50 nodes per hidden layer – 0.001 as the regularization parameter (λ) • Training Dataset – 19 normalized input parameters (features) per normalized output variable (the DC PUE) • Data normalized into the range [-1,-1] – 184,435 time samples at 5 minute resolution • O(2) years of data – 70% for training, 30% for cross validation @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 19
  • 20. Google Use Case: Sensitivity Analysis • After the model is trained, one can look at effect of individual parameters by varying one while holding the others constant The relationship between PUE and the number of chillers running is nonlinear because chiller efficiency decreases exponentially with reduced load. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 20
  • 21. Google: Outside Air Enthalpy Has Largest Impact on PUE Relationship between PUEand outside air enthalpy, or total energy content of the ambient air. As the air enthalpy increases, the number of cooling towers, Supplemental chillers, and associated loading rises as well, producing a nonlinear effect on the DC overhead. Note that enthalpy is a more compre- hensive measure of outdoor weather conditions than the wet bulb temperature alone since it includes the moisture content and specific heat of ambient air. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 21
  • 22. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGES OF ENLIGHTENMENT BUILD A DATACENTER DEPLOY AN APPLICATION USER FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION STAGE 0 HUMAN ALERT NETWORK
  • 23. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGES OF ENLIGHTENMENT BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION SETUP BASIC KNOWN TRIGGERS LOG EVERYTHING! STAGE 0 HUMAN ALERT NETWORK STAGE 1 LOG EVERYTHING, DON’T ASK WHY
  • 24. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGES OF ENLIGHTENMENT BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION SETUP BASIC KNOWN TRIGGERS STAGE 0 HUMAN ALERT NETWORK STAGE 1 LOG EVERYTHING, DON’T ASK WHY STAGE 2 ANALYTICS
  • 25. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGE 0 HUMAN ALERT NETWORK STAGE 1 LOG EVERYTHING, DON’T ASK WHY STAGE 2 ANALYTICS STAGE 3 MACHINE LEARNING STAGES OF ENLIGHTENMENT BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION RINSE & REPEAT SETUP BASIC KNOWN TRIGGERS
  • 26. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES EVIL SOFTWARE COMING TO TAKE YOUR JOBS STAGE 4: FIND NEW CAREER
  • 27. Tale of the Tape 2000 vs. 2015 TALE%OF%THE%TAPE% 2015% 1 6 3 0 l bs ----- Weigh t ------- 5 9 l bs 4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v 3 2 1 0 0 ---- BTU ------ 2 6 9 7 Yes --- 1 0 G/4 0 G Lin e-Rat e --- Yes Yes --- 1 0 0 G Lin e-Rat e --- Yes * YES --- BGP/MPLS --- YES No --- SW/H W Separ at io n --- Yes Cus t o m -------- Type ---- Mer ch an t IOS XR -------------- OS ------- Yo u Ch o o s e > $ 1 M --- Co s t --- ~ $ 5 k > $ 2 0 0 k --- 1 yr Suppo r t --- $ 2 k Yes ----H o t Swap H W ---- No Yes --- COD --- No Yes --- H W Par t it io n s --- No % TALE%OF%THE%TAPE% 2000% 1 2 0 0 l bs ---- Weigh t ------- 5 9 l bs 4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v 3 2 1 0 0 --- BTU ----- 2 6 9 7 6 4 bit --------- Ar ch ---------- 3 2 bit 2 4 --------- CPUs ------------- 2 4 8 ---------- Th r eads ------------ 2 3 8 4 GB ---- Memo r y ------- 3 2 G Cus t o m -------- Type ---- Mer ch ant So l ar is --- OS --- Linux ~ $ 2 5 0 k ----- Co s t ------ ~ $ 2 .5 k $ 6 0 k --- 1 yr Suppo r t --- $ 2 k Yes ----H o t Swap H W ---- No Yes --- COD --- No Yes --- H W Par t it io ns --- No % % % 2000 2015 @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 27
  • 28. THIS IS ALSO ABOUT MULTITENANCY @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
  • 29. Next Gen Data Centers Direct networking and free range VMs x20 @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 29
  • 30. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 30
  • 31. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 31
  • 32. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 32
  • 33. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 33
  • 34. Programmability Python scripting @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES To use Python interpreter: NOSCLI “python” from NOSCLI shell. Create Python script; copy script to switch and execute sw0# copy scp://releaseuser:releaseuser@10.24.81.13//users/home32/badan iya/proj/scorpius/scripts/create_po.py flash://create_po.py sw0# python create_po.py !Command: show running-config int vlan !Time: Tue Jan 6 08:32:33 2015 interface Vlan 1 ! Script can be loaded on principal switch and automate VCS Fabric 34
  • 35. Programmability VDX Puppet Integration Node1 Node2 Netconf Netconf Puppet Master VCS1 Catalog Catalog catalog VCS2 Catalog Catalog catalog • nos_netdev_device: Device Configuration • nos_netdev_interface: L2 Interface configuration • nos_netdev_vlan: VLAN configuration • nos_netdev_l2_interface: VLAN to interface assignments NOS Provider List @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 35
  • 36. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 36
  • 37. Real-Time Routing with Reality Don’t guess, know! @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES Analysis Engine 37
  • 38. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
  • 39. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES Thank you

Editor's Notes

  1. I once finished a remote office VOIP project early and under budget with a team I was on. We were very proud of ourselves. 6 months later we got a very angry call from the local manager. His cell phone costs had gone up 300% The employees were so dedicated to the company that they didn’t want to complain. So when the VOIP phones would have issues, they would just go outside and use their cell phone. We had relied on humans to tell us of issues, and they failed us for all the right reasons. We failed because simple put, “you don’t own what you don’t measure” NO ONE cared that we finished early, or under budget. A win turned into a fail due lack of automated monitoring.
  2. After instrumenting the hell out of a FC network for Finisar I was able to use 2 years of detailed logs to look for trends. Doing this I was able to pull off the two items above. 2 years is needed because it’s easy to get caught by a once/year human social event like Christmas. Sometimes ½ your Users logging off suddenly at 3pm is just Christmas dinner on the east coast.
  3. At the highest level, Brocade is the best underlay for the VMware overlay network and our content packs for vRealize deliver the visibility piece across all that for better application and VM performance. This is because the administrators are armed with context about any issues that they can take to the network team, cutting down time to resolution. [The network team can use vRealize too – to identify which switches and ports to reconfigure.] There are some additional out-of-the-box tools for administrators in vRealize Ops. The health, risk and efficiency metrics help – and there are also alerts with recommended actions too.
  4. Comcast presented at NANOG 55 that they could find DNS issues faster using Twitter than with any internal tool they use. They “baselined” something like “ Comcast sucks” and look for pockets of “bursty comcast” hate being spread over twitter. CDC does the same thing for outbreaks. The DARPA Red Balloon project tracked a simple balloon through a city just using what random people tweeted about it to discover its’ route.
  5. Analytics is when you have questions you need answers to. Machine Learning is for when you need to improve but don’t know what question to ask next. This talk is about what you can do with analytics and machine learning, not on what they are. If you want to learn more about machine learning I suggest starting with http://www.1-4-5.net/~dmm/talks/2015/MWC/mwc2015.pptx (Also above on Slide)
  6. Which way is up? East/West/North/South all become relative.
  7. Applications & Datacenter as a Service
  8. Lots of new data sources
  9. Network Architects of the Future