This document provides an overview of the evolving role of network engineers and the stages of network monitoring enlightenment. It discusses how networks have transitioned from being manually monitored by humans to utilizing advanced analytics and machine learning. The stages progress from basic human alerting (Stage 0) to comprehensive logging (Stage 1), implementation of analytics and triggers (Stage 2), and machine learning applications (Stage 3). It notes that machine learning is starting to be applied to optimize datacenter efficiency by predicting metrics like Power Usage Effectiveness. The final stage is finding a new career as software and automation replace many network engineering jobs.
In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.
Clues for Solving Cloud-Based App Performance NETSCOUT
NETSCOUT for AWS enables more informed business decisions by removing the barriers associated with mining high-volume wire data in the AWS cloud. NETSCOUT accomplishes this by enabling real-time analyses of all data traversing the AWS infrastructure and on-premise data centers across large enterprises. Enterprise data hidden within dynamic cloud workloads transforms into timely and valuable insights.
NETSCOUT has released the latest Threat Intelligence Report which provides insight into orchestrated attacks and activities analyzed through the first half of the 2019 calendar year.
Cybercrime has entered the mainstream, and the operational model being used has become efficient and effective at invading corporate networks, accessing government agencies and spreading misinformation to the public. While sophisticated malware continues to advance, deceptive practices and social engineering continue to lead the intrusion race.
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
While service providers continue to validate various use cases associated with NFV, new advanced devices, increasing usage of high bandwidth applications,
and the Internet of Things (IoT) are all pushing them to commercialize these NFV initiatives to enable them to profitably scale their networks and deploy new revenue generating business models. We will explore:
• Why hybrid architectures are key to scale and evolve NFV environments
• The importance of the evolution of standards and ecosystems
• Key technologies that are crucial to realize the benefits of NFV
Presentation titled "NFV - moving from vision to reality" by Mallik Tatipamula, VP Service Provider Solutions, F5 Networks, at NFV World Congress in May 2015.
TechWiseTV Workshop: Cisco DNA Center AssuranceRobb Boyd
Watch the replay: http://cs.co/9007Dbh39
In this deep dive you’ll learn how this comprehensive solution provides actionable intelligence to help you get to the right IT decision faster. And speed you on your way to an intent-based network. Learn how to gain end-to-end network visibility in one easy-to-use dashboard, make more sense out of data by eliminating noise and false positives, reduce downtime and troubleshooting time with rapid root-cause analysis and actionable insights and move beyond reactive monitoring with proactive and predictive analytics.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9008DXCQi
TechWiseTV: http://cs.co/9009DzrjN
Load balancing isn’t dead—it has evolved into something much greater. While it remains a core functionality for delivering any application, traditional load-balancing has moved beyond the network to encompasses a range of security, performance and management services. As leaders in the application services industry, F5’s expertise in helping power fast, available, and secure applications forms the foundation for our entire catalog of solutions.
Any Device. Anytime. Anywhere. Not only are employees accessing enterprise applications on mobile devices, they’re increasingly using their own devices. Making applications always available anywhere on any device is critical to lowering costs and maximizing productivity. With F5, you can remove the roadblocks in your network to efficiently and securely deliver applications that are available to users when and where they need them.
Key Findings from the State of Application Delivery 2015F5 Networks
Key Findings from the State of Application Delivery 2015. The State of Applications Services presentation was highlighted in F5 Networks State of Application Delivery 2015 Webinar featuring Manny Rivelo, EVP Strategic Solutions, Cindy Borovick, Director Business Intelligence, and Lori MacVittie, Principal Technical Evangelist.
To watch the complete webinar or sign-up for future F5 webinars go to: www.F5.com/SOAD
In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.
Clues for Solving Cloud-Based App Performance NETSCOUT
NETSCOUT for AWS enables more informed business decisions by removing the barriers associated with mining high-volume wire data in the AWS cloud. NETSCOUT accomplishes this by enabling real-time analyses of all data traversing the AWS infrastructure and on-premise data centers across large enterprises. Enterprise data hidden within dynamic cloud workloads transforms into timely and valuable insights.
NETSCOUT has released the latest Threat Intelligence Report which provides insight into orchestrated attacks and activities analyzed through the first half of the 2019 calendar year.
Cybercrime has entered the mainstream, and the operational model being used has become efficient and effective at invading corporate networks, accessing government agencies and spreading misinformation to the public. While sophisticated malware continues to advance, deceptive practices and social engineering continue to lead the intrusion race.
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
While service providers continue to validate various use cases associated with NFV, new advanced devices, increasing usage of high bandwidth applications,
and the Internet of Things (IoT) are all pushing them to commercialize these NFV initiatives to enable them to profitably scale their networks and deploy new revenue generating business models. We will explore:
• Why hybrid architectures are key to scale and evolve NFV environments
• The importance of the evolution of standards and ecosystems
• Key technologies that are crucial to realize the benefits of NFV
Presentation titled "NFV - moving from vision to reality" by Mallik Tatipamula, VP Service Provider Solutions, F5 Networks, at NFV World Congress in May 2015.
TechWiseTV Workshop: Cisco DNA Center AssuranceRobb Boyd
Watch the replay: http://cs.co/9007Dbh39
In this deep dive you’ll learn how this comprehensive solution provides actionable intelligence to help you get to the right IT decision faster. And speed you on your way to an intent-based network. Learn how to gain end-to-end network visibility in one easy-to-use dashboard, make more sense out of data by eliminating noise and false positives, reduce downtime and troubleshooting time with rapid root-cause analysis and actionable insights and move beyond reactive monitoring with proactive and predictive analytics.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9008DXCQi
TechWiseTV: http://cs.co/9009DzrjN
Load balancing isn’t dead—it has evolved into something much greater. While it remains a core functionality for delivering any application, traditional load-balancing has moved beyond the network to encompasses a range of security, performance and management services. As leaders in the application services industry, F5’s expertise in helping power fast, available, and secure applications forms the foundation for our entire catalog of solutions.
Any Device. Anytime. Anywhere. Not only are employees accessing enterprise applications on mobile devices, they’re increasingly using their own devices. Making applications always available anywhere on any device is critical to lowering costs and maximizing productivity. With F5, you can remove the roadblocks in your network to efficiently and securely deliver applications that are available to users when and where they need them.
Key Findings from the State of Application Delivery 2015F5 Networks
Key Findings from the State of Application Delivery 2015. The State of Applications Services presentation was highlighted in F5 Networks State of Application Delivery 2015 Webinar featuring Manny Rivelo, EVP Strategic Solutions, Cindy Borovick, Director Business Intelligence, and Lori MacVittie, Principal Technical Evangelist.
To watch the complete webinar or sign-up for future F5 webinars go to: www.F5.com/SOAD
SIEM, malware protection, deep data visibility — for freeElasticsearch
Are you a SIEM user who needs endpoint detection and correlation for complex multi-stage attacks across your environment? Elastic has launched a free and open endpoint security offering, directly integrated into the Elastic Stack. This offering is part of the free distribution tier and is available to every Elastic user. Learn how Elastic Security can help you protect your environment and why this advancement is so significant to security visibility.
Social Enterprise: Trust; Vision; RevolutionPeter Coffee
Becoming a social enterprise is not a technical evolution, but a business transformation. Technologies enable it, but only a cultural commitment will achieve it. Doing it is not optional, unless going out of business is also considered an OK option.
DevOps for Highly Regulated EnvironmentsDevOps.com
Financial institutions, medical groups, governmental organizations, automotive companies… these types of entities all have unique and sometimes difficult-to-meet regulations. You may be required to have fine-grained auditability of your SDLC or maintain specific third-party integrations. Security models may be heightened, or certain types of compliance processes maintained. So how are we supposed to “do the DevOps” when we have so many things to worry about? In this webinar, we’ll explore some ways that you can adopt DevOps best practices and even (gasp!) thrive when building your DevOps and DevSecOps pipelines in highly-regulated industries.
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxjasoninnes20
BUSINESS CASE CAPSTONE 2
BUSINESS CASE CAPSTONE 3
Business Case Capstone
Connie Farris
Raphael Brown
Jim Chambers
Shaun Cummings
Deandre Kralevic
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE 1
Business Case Capstone
Table of Contents
(Week 1) Section 1: Overview of the project (from IT487)3
Overview3
I75 Corridor4
Section 2: Requirements (from IT487)5
Section 3: Design (from IT487)7
Section 4: System development methodology9
Section 5: Work breakdown structure11
Section 6: Communication Plan13
(WEEK 2) Section 7: Quality Assurance Plan TBD15
(WEEK 3) Section 8: Documentation Plan TBD16
(Week 4) Section 9: Quality Assurance and results of test-case execution TBD17
Section 10: Project Closure18
References:19
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is IT Support Company with over 250,000 employees with companies in over 50 states with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic truck line runs along the I75 corridor, from Miami Lakes FL to the northern part of Michigan. This I75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has request the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution be the project can be closed. I75 Corridor
http://gregkantner.com/blog/wp-content/uploads/2012/05/interstate-75-map.gif
Section 2: Requirements (from IT487)
The project requirements here are derived from the software requirements for the Galactic customer services. The project was to create new ticketing software that the customer wanted upgraded and to completely replace the previous product. The requirements are the following:
• Ticket system
• Ticke ...
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonJohn Billings CISSP
An overview of how a Risk Based Approach (RBA) can be adopted using Splunk Enterprise Security (ES) frameworks. The discussion will include an explanation of how RBA works, what outcomes have been seen by ES customers, and a live demo of a RBA modified ES environment with a BOTS data-set. The talk will also touch upon how Splunk Phantom can be used with RBA.
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
Please join us as we discuss the need for advanced authentication for Mainframe, as well as any concerns and expectations surrounding its use.
For more information, please visit http://cainc.to/Nv2VOe
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Derek Baron
SUN is the cloud native platform for The Weather Company, in production since 2013. On an average day SUN handles 24 TB of data, and 15B API transactions, regularly scaling up to 26B transactions.
We believe the need to processes massive data like this is not exclusive to weather data. Because of IoT, mobile, social and other recent trends, there will be tremendous new requirements to get value from all this data for all industries in business and government.
We are establishing commercial partnerships with select foundational clients needing a data agnostic, 100% cloud based platform for Data Ingestion, Transformation, Persistence, Analytics, and Distribution.
It’s not news to anyone in IT that container technology has become one of the fastest growing areas of innovation, facilitating ease of packaging and consistent deployment environments for applications. If you’re in IT, you are also likely familiar with Kubernetes—the leading container orchestration platform.
This advanced technology session will cover the integration of Nutanix Enterprise Cloud OS platform with Kubernetes. Binny Gill, Nutanix Chief Architect, and Allan Naim, Google Product Manager, will guide you through how Kubernetes is enabled by Google in GKE and by Nutanix on-premises, to provide a simple, consistent, and hybrid platform for all your containerized apps.
The influence of consumerization on enterprise appsMichel de Goede
In a world where consumerization surpasses 'traditional IT' in the workplace, what are the risks and how to unlock synergies from the combination? Presentation delivered at Enterprise Apps World, Berlin on 29 September 2015
Similar to The Evolving Role of the Network Engineer - Jon Hudson (20)
Lisa Davis, VP & GM, Digital Transformation & Scale Solutions, Enterprise & Government, Data Center Group, Intel Corp.
Red Hat Government Symposium 2019
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
The Evolving Role of the Network Engineer - Jon Hudson
1. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
The Evolving Role of the
Network Engineer
2. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
…Into the Rabbit Hole
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
3. All or some of the products detailed in this presentation may still be under development and certain
specifications, including but not limited to, release dates, prices, and product features, may change. The
products may not function as intended and a production version of the products may never be released.
Even if a production version is released, it may be materially different from the pre-release version
discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express or implied,
statutory or otherwise, including but not limited to, any implied warranties of merchantability, fitness for
a particular purpose, or non-infringement of third-party rights with respect to any products and services
referenced herein.
ADX, AnyIO, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX,
MyBrocade, OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network
and The On-Demand Data Center are trademarks of Brocade Communications Systems, Inc., in the
United States and/or in other countries. Other brands, products, or service names mentioned may be
trademarks of others.
Legalish Disclaimer
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 3
4. This presentation, with prepared remarks, includes forward-looking statements regarding Brocade’s financial results,
goals, plans, assumptions, strategy and business outlook, revenue, tax rate, cash, stock buybacks, OEM inventory, prospects,
as well as U.S. Federal spending and order flow, and IT spending, which are only predictions and involve risks and
uncertainties such that actual results may vary significantly. These and other risks are set forth in more detail in our Form
10-K for the fiscal year ended October 26, 2013 and our Form 10-Q for the fiscal quarter ended August 2, 2015. These
forward-looking statements reflect beliefs, assumptions, outlook, estimates, and predictions as of today, and Brocade
expressly assumes no obligation to update any such forward-looking statements whether as the result of new
developments or otherwise.
In addition, this presentation includes various third-party estimates regarding market share and other measures, which do
not necessarily reflect the views of Brocade. Further, Brocade does not guarantee the accuracy or reliability of any such
information or forecast.
Certain financial information is presented on a non-GAAP basis. Management believes that non-GAAP financial measures
used in this presentation allow stakeholders to gain a better understanding of Brocade’s comparative operating
performance both from period to period, and to its competitors’ operating results. Management also believes these non-
GAAP financial measures help indicate Brocade’s baseline performance before gains, losses or charges that are considered
by management to be outside of ongoing operating results. Accordingly, management uses these non-GAAP financial
measures for planning and forecasting of future periods and in making decisions regarding operations performance and
the allocation of resources. The most directly comparable GAAP information and a reconciliation between the non-GAAP
and GAAP figures are provided in
the accompanying press release, which has been furnished to the SEC on Form 8-K and posted on Brocade’s website, and is
included in the appendix in this presentation.
Legal Disclosure
Please see risk factors on Form 10-Q and Form 10-K filed with the SEC
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 4
5. BROCADE > Futurist & Principal Engineer | Office of the CTO
IETF > Co-Chair TRILL WG
> Routing Directorate Co-Coordinator
> Routing Area Encapsulation Design Team Member
> Architect/Design Group member for the NVo3 WG
ISO/IEC JTC 1 > JTC1BDSG - Study Group on Big Data (completed 1/2015)
INCITS > Ad Hoc on Big Data (completed 1/2015)
Jon Hudson
Recent Evidence of My Existence….
JON.HUDSON@[BROCADE]||[GMAIL].COM
SMS: 1.650.766.7662
@THE_SOLUTIONEER @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 5
6. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
JON.HUDSON@[BROCADE]||[GMAIL].COM
SMS: 1.650.766.7662
@THE_SOLUTIONEER 6
7. SERVER L2-7 NETWORK GEAR ROUTING & POLICY ORCHESTRATION
Software Defined DatacenterOn Demand DatacenterRight Click, Datacenter
DAYS DAYS DAYS DAYS
X86 VirtualizationX86 Virtualization
MINS
NfVNFV
MINS
PROGRAMMATICOpenFlow
MINS
API AUTOMATIONOpenstack
MINS
OPEN Daylight
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 7
8. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING, DON’T ASK WHY
STAGE 2 ANALYTICS & SOFTWARE REMEDIATION
STAGE 3 MACHINE LEARNING
STAGE 4 FIND NEW CAREER
9. STAGE 0
PATIENT 0 DIES…AND PROBABLY A FEW MORE…
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER FINDS
AN ISSUE
IT GUY
DEBUGS
LOG EVENT &
USER EVENT
CORROLATION
WAIT FOR
CONFIRMATION
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
10. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
HUMANS ARE BAD MONITORING TOOLS
STAGE 0
11. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
LOG EVERYTHING!
STAGE 1
PATIENT 0 STILL DIES…BUT HOPEFULLY NOT AS MANY
12. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
HOW DO YOU MONITOR THE KNOWN UNKNOWNS?
A SCSI BACKPLANE ISSUE ON EMC
SYMMETRIX STORAGE ARRAY
DISCOVERED SIX MONTHS PRIOR
TO ARRAY BASED ALERTING BY TRACKING
“BURSTABLE EFFICIENCY” OVER TWELVE
MONTHS
DB LOSS TRACKED OVER LONG PERIODS
TO INDICATE LIKELY TRANCEIVER
DEATH
2 YEARS OF DATA NEEDED
TO CATCH ALL HUMAN CYCLES
STAGE 1
13. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
STAGE 2—ANALYTICS
PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
14. IP Analytics Pack for vRealize Operations
Virtual network resilience through physical network visibility
VIRTUAL NETWORK RESILIENCE THROUGH PHYSICAL NETWORK VISIBILITY
Intelligent Network Operations
Delivers comprehensive VCS operational
data to support software-defined data
center analytics
Unified Virtual & Physical
Networking
Provides insights and visibility into
the physical network for better
application and VM performance
Simplified Policy Automation
Predefined alerts and recommended actions
simplify monitoring; health,
risk, and efficiency metrics add context
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 14
15. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGE 2
PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
16. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
RINSE &
REPEAT
SETUP BASIC KNOWN
TRIGGERS
*Want to know more about Machine Learning?
Please Check out David Meyer’s ML Presentation
http://www.1-4-5.net/~dmm/talks/2015/MWC/mwc2015.pptx
STAGE 3—MACHINE
LEARNING*
BRINGS YOU NEW QUESTIONS
17. Google PUE Optimization Application1
• Straightforward application of ANN/supervised learning
– Lots more happening at Google (and FB, Baidu, NFLX, MSFT,AMZN,…)
• http://research.google.com/pubs/ArtificialIntelligenceandMachineLearning.html
• Use case: Predicting Power Usage Effectiveness (PUE)
– Basically: They developed a neural network framework that learns from
operational data and models plant performance
– The model is able to predict PUE2 within a range of 0.004 +
0.005 , or 0.4% error for a PUE of 1.1
• “A simplified version of what the
models do: take a bunch of data, find
the hidden interactions, then provide recommendations that optimize for
energy efficiency.”
– http://googleblog.blogspot.com/2014/05/better-data-centers-through-machine.html
1HTTPS://DOCS.GOOGLE.COM/A/GOOGLE.COM/VIEWER?URL=WWW.GOOGLE.COM/ABOUT/DATACENTERS/EFFICIENCY/INTERNAL/ASSETS/MACHINE-LEARNING-APPLICATIONSFOR-DATACENTER-OPTIMIZATION-FINALV2.PDF
2 HTTP://EN.WIKIPEDIA.ORG/WIKI/POWER_USAGE_EFFECTIVENESS
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 17
18. Google Use Case: Features
Number of features relatively small (n = 19)
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 18
19. Google Use Case: Details
• Neural Network
– 5 hidden layers
– 50 nodes per hidden layer
– 0.001 as the regularization parameter (λ)
• Training Dataset
– 19 normalized input parameters (features) per normalized
output variable (the DC PUE)
• Data normalized into the range [-1,-1]
– 184,435 time samples at 5 minute resolution
• O(2) years of data
– 70% for training, 30% for cross validation
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 19
20. Google Use Case: Sensitivity Analysis
• After the model is trained, one can look at effect of individual
parameters by varying one while holding the others constant
The relationship between PUE and the number of chillers
running is nonlinear because chiller efficiency decreases
exponentially with reduced load.
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 20
21. Google: Outside Air Enthalpy Has Largest
Impact on PUE
Relationship between PUEand
outside air enthalpy, or total
energy content of the ambient air.
As the air enthalpy increases, the
number of cooling towers,
Supplemental chillers, and
associated loading rises as well,
producing a nonlinear effect on
the DC overhead. Note that
enthalpy is a more compre-
hensive measure of outdoor
weather conditions than the wet
bulb temperature alone since it
includes the moisture content and
specific heat of ambient air.
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 21
22. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER FINDS AN
ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
STAGE 0 HUMAN ALERT NETWORK
23. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
LOG EVERYTHING!
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING,
DON’T ASK WHY
24. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING,
DON’T ASK WHY
STAGE 2 ANALYTICS
25. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING,
DON’T ASK WHY
STAGE 2 ANALYTICS
STAGE 3 MACHINE LEARNING
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
RINSE &
REPEAT
SETUP BASIC KNOWN
TRIGGERS
26. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
EVIL SOFTWARE
COMING TO TAKE
YOUR JOBS
STAGE 4:
FIND NEW CAREER
27. Tale of the Tape
2000 vs. 2015
TALE%OF%THE%TAPE%
2015%
1 6 3 0 l bs ----- Weigh t ------- 5 9 l bs
4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v
3 2 1 0 0 ---- BTU ------ 2 6 9 7
Yes --- 1 0 G/4 0 G Lin e-Rat e --- Yes
Yes --- 1 0 0 G Lin e-Rat e --- Yes *
YES --- BGP/MPLS --- YES
No --- SW/H W Separ at io n --- Yes
Cus t o m -------- Type ---- Mer ch an t
IOS XR -------------- OS ------- Yo u Ch o o s e
> $ 1 M --- Co s t --- ~ $ 5 k
> $ 2 0 0 k --- 1 yr Suppo r t --- $ 2 k
Yes ----H o t Swap H W ---- No
Yes --- COD --- No
Yes --- H W Par t it io n s --- No
%
TALE%OF%THE%TAPE%
2000%
1 2 0 0 l bs ---- Weigh t ------- 5 9 l bs
4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v
3 2 1 0 0 --- BTU ----- 2 6 9 7
6 4 bit --------- Ar ch ---------- 3 2 bit
2 4 --------- CPUs ------------- 2
4 8 ---------- Th r eads ------------ 2
3 8 4 GB ---- Memo r y ------- 3 2 G
Cus t o m -------- Type ---- Mer ch ant
So l ar is --- OS --- Linux
~ $ 2 5 0 k ----- Co s t ------ ~ $ 2 .5 k
$ 6 0 k --- 1 yr Suppo r t --- $ 2 k
Yes ----H o t Swap H W ---- No
Yes --- COD --- No
Yes --- H W Par t it io ns --- No
%
%
%
2000 2015
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 27
28. THIS IS ALSO ABOUT
MULTITENANCY
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
29. Next Gen Data Centers
Direct networking and free range VMs
x20
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 29
34. Programmability
Python scripting
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
To use Python interpreter:
NOSCLI “python” from NOSCLI
shell.
Create Python script; copy script
to switch and execute
sw0# copy
scp://releaseuser:releaseuser@10.24.81.13//users/home32/badan
iya/proj/scorpius/scripts/create_po.py flash://create_po.py
sw0# python create_po.py
!Command: show running-config int vlan
!Time: Tue Jan 6 08:32:33 2015
interface Vlan 1
!
Script can be loaded on principal
switch and automate VCS Fabric
34
35. Programmability
VDX Puppet Integration
Node1
Node2 Netconf
Netconf
Puppet
Master
VCS1
Catalog
Catalog
catalog
VCS2
Catalog
Catalog
catalog
• nos_netdev_device: Device Configuration
• nos_netdev_interface: L2 Interface configuration
• nos_netdev_vlan: VLAN configuration
• nos_netdev_l2_interface: VLAN to interface assignments
NOS Provider List
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 35
I once finished a remote office VOIP project early and under budget with a team I was on. We were very proud of ourselves.
6 months later we got a very angry call from the local manager. His cell phone costs had gone up 300%
The employees were so dedicated to the company that they didn’t want to complain. So when the VOIP phones would have issues, they would just go outside and use their cell phone.
We had relied on humans to tell us of issues, and they failed us for all the right reasons.
We failed because simple put, “you don’t own what you don’t measure”
NO ONE cared that we finished early, or under budget. A win turned into a fail due lack of automated monitoring.
After instrumenting the hell out of a FC network for Finisar I was able to use 2 years of detailed logs to look for trends. Doing this I was able to pull off the two items above.
2 years is needed because it’s easy to get caught by a once/year human social event like Christmas. Sometimes ½ your Users logging off suddenly at 3pm is just Christmas dinner on the east coast.
At the highest level, Brocade is the best underlay for the VMware overlay network and our content packs for vRealize deliver the visibility piece across all that for better application and VM performance. This is because the administrators are armed with context about any issues that they can take to the network team, cutting down time to resolution. [The network team can use vRealize too – to identify which switches and ports to reconfigure.]
There are some additional out-of-the-box tools for administrators in vRealize Ops. The health, risk and efficiency metrics help – and there are also alerts with recommended actions too.
Comcast presented at NANOG 55 that they could find DNS issues faster using Twitter than with any internal tool they use.
They “baselined” something like “ Comcast sucks” and look for pockets of “bursty comcast” hate being spread over twitter.
CDC does the same thing for outbreaks.
The DARPA Red Balloon project tracked a simple balloon through a city just using what random people tweeted about it to discover its’ route.
Analytics is when you have questions you need answers to.
Machine Learning is for when you need to improve but don’t know what question to ask next.
This talk is about what you can do with analytics and machine learning, not on what they are. If you want to learn more about machine learning I suggest starting with http://www.1-4-5.net/~dmm/talks/2015/MWC/mwc2015.pptx (Also above on Slide)
Which way is up? East/West/North/South all become relative.