The BIG-IP® 4200v hardware platform addresses organizations’ requirements to deliver more complex application services, increase web content security, and lower the cost of managing applications.
F5 introduces high-performance platforms to help organizations optimize application delivery and reduce costs. F5’s new BIG-IP solutions enable customers to accelerate applications, ensure FIPS compliance, and increase the efficiency of dynamic data centers.
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...Robb Boyd
Watch the Replay: http://cs.co/9002DaeGy
(Live Webinar July 24, 2018 at 10:00 am Pacific Time / 1:00 pm Eastern Time)
Until recently, campus migrations have been from 1G to 10G to 40G. While 1G and 10G still represent a significant share of the enterprise market’s Ethernet ports, a transition to 25G, and to 100G for large and high-end enterprises, is expected to happen more quickly than the previous transition to 10G. Furthermore, support for 25G adapters that can also run at 10G with existing fiber cabling can help accelerate that migration, providing opportunities to migrate to a 100G switch infrastructure while supporting significant investment protection.
Cisco has been pioneering several initiatives to bring new Ethernet technologies to market. These include Cisco 25GBASE Small Form-Factor Pluggable SFP28, Cisco 100GBASE Quad Small Form-Factor Pluggable QSFP28, and more importantly, dual-rate optics along with the latest Cisco Catalyst 9500 Series high-performance switches to facilitate such network speeds and architecture transformations.
Join this workshop to learn more.
Topics to be discussed include:
Need for Higher Speeds in Campus
Cisco Catalyst 9500 Series High-Performance Switch Portfolio
Cisco Catalyst 9500 Series User-Centric Platform Design
Cisco UADP 3.0 Architecture
Cisco 100G/40G/25G Optics
Approximate duration: 60 minutes
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsRobb Boyd
Cisco Catalyst 9600 Series Switches are the next-generation purpose-built 40/100G modular core/aggregation platform, providing resiliency at scale with the industry’s most comprehensive security while allowing the business to grow at a low total operational cost.
The Cisco Catalyst 9606R is a 6-slot 8RU chassis ready to support a wired switching capacity of up to 25.6 Tbps, with up to 6.4 Tbps of bandwidth per slot. Some salient features of the Cisco Catalyst 9606R chassis are:
- Supports a nonblocking 40/100G Quad Small Form-Factor Pluggable (QSFP+, QSFP28) line card
- Supports a line-rate 1/10/25G SFP and Enhanced SFP (SFP, SFP+, SFP28) line card
- Optimized for the enterprise with efficient side-to-side airflow
- Front accessibility for all removable components, such as the supervisor, line cards, power supply, and fan tray
- Dual accessible fan tray for easy removal
- Embedded RFID tag for easy asset tracking
Resources:
TechWiseTV: http://cs.co/9009DzrjN
Next Generation Ethernet
Next Generation Ethernet is a platform that should deliver all of previous function requirements under on hood. I have grouped the Generations in this way because Cisco has different purpose-built product lines for each of 4 waves of technology. Counter to that Extreme offers a platform solution for a customer to build his network on. Extreme does not require different switches to address different convergence requirements, this would be cost prohibitive for most customers and complicated. Simply put to disrupt the Cisco market, Extreme must deliver more with less.
The IEEE is pushing Ethernet to unimaginable speeds, with the 40/100Gigabit Ethernet standard expected to be ratified in 2010 and Terabit Ethernet on the drawing board for 2015. Here's a timeline showing key milestones in the growth of Ethernet Sstandard's-compliant products are expected to ship in the second half of next year, not long after the expected June 2010 ratification of the 802.3ba standard.
Complexity - Complex systems are a special type of chaotic system. They display a very interesting type of emergent behavior called, logically enough, complex adaptive behavior. But we are getting ahead of ourselves. There’s a need to back up a bit and describe a fundamental behavior that occurs at the granular level and leads to complex adaptive behavior. It is self -organization. Complex Adaptive Behavior is the name given to this forming-falling apart-reforming-falling apart-… behavior. Specifically it is defined as many agents working in parallel to accomplish a goal. It is conflict ridden, very fluid, and very positive. The hallmark of emergent, complex adaptive behavior is it brings about a change from the starting point that is not just different in degree but in kind. In biology a good example of this is the emergence of consciousness. Another example is the Manhattan Project and the development of the atomic bomb. Below is a checklist that helps facilitate a qualitative assessment of the level of complexity. It is in everyday language to facilitate use by a broad range of stakeholders and team members. In other words, it stays away from jargon, which can be the kiss of death when requesting information from people.
The Checklist
Not sure how the project will get done; Many stakeholders, teams and sub-teams;
Too Many vendors; New vendors;
New client; Team members are geographically dispersed;
End-users are geographically dispersed; Many organizations;
Many cultures (professional, organizational, sociological);
Many languages (professional, organizational, sociological);
High risk;
Lack of quality best characterized by lack of acceptance criteria;
Lack of clear requirements and too Many tasks;
Arbitrary budget or end date;
Inadequate resources;
Leading-edge technology;
New, unproven application of existing technology;
High degree of interconnectedness (professional, technological, political, sociological).
The BIG-IP® 4200v hardware platform addresses organizations’ requirements to deliver more complex application services, increase web content security, and lower the cost of managing applications.
F5 introduces high-performance platforms to help organizations optimize application delivery and reduce costs. F5’s new BIG-IP solutions enable customers to accelerate applications, ensure FIPS compliance, and increase the efficiency of dynamic data centers.
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...Robb Boyd
Watch the Replay: http://cs.co/9002DaeGy
(Live Webinar July 24, 2018 at 10:00 am Pacific Time / 1:00 pm Eastern Time)
Until recently, campus migrations have been from 1G to 10G to 40G. While 1G and 10G still represent a significant share of the enterprise market’s Ethernet ports, a transition to 25G, and to 100G for large and high-end enterprises, is expected to happen more quickly than the previous transition to 10G. Furthermore, support for 25G adapters that can also run at 10G with existing fiber cabling can help accelerate that migration, providing opportunities to migrate to a 100G switch infrastructure while supporting significant investment protection.
Cisco has been pioneering several initiatives to bring new Ethernet technologies to market. These include Cisco 25GBASE Small Form-Factor Pluggable SFP28, Cisco 100GBASE Quad Small Form-Factor Pluggable QSFP28, and more importantly, dual-rate optics along with the latest Cisco Catalyst 9500 Series high-performance switches to facilitate such network speeds and architecture transformations.
Join this workshop to learn more.
Topics to be discussed include:
Need for Higher Speeds in Campus
Cisco Catalyst 9500 Series High-Performance Switch Portfolio
Cisco Catalyst 9500 Series User-Centric Platform Design
Cisco UADP 3.0 Architecture
Cisco 100G/40G/25G Optics
Approximate duration: 60 minutes
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsRobb Boyd
Cisco Catalyst 9600 Series Switches are the next-generation purpose-built 40/100G modular core/aggregation platform, providing resiliency at scale with the industry’s most comprehensive security while allowing the business to grow at a low total operational cost.
The Cisco Catalyst 9606R is a 6-slot 8RU chassis ready to support a wired switching capacity of up to 25.6 Tbps, with up to 6.4 Tbps of bandwidth per slot. Some salient features of the Cisco Catalyst 9606R chassis are:
- Supports a nonblocking 40/100G Quad Small Form-Factor Pluggable (QSFP+, QSFP28) line card
- Supports a line-rate 1/10/25G SFP and Enhanced SFP (SFP, SFP+, SFP28) line card
- Optimized for the enterprise with efficient side-to-side airflow
- Front accessibility for all removable components, such as the supervisor, line cards, power supply, and fan tray
- Dual accessible fan tray for easy removal
- Embedded RFID tag for easy asset tracking
Resources:
TechWiseTV: http://cs.co/9009DzrjN
Next Generation Ethernet
Next Generation Ethernet is a platform that should deliver all of previous function requirements under on hood. I have grouped the Generations in this way because Cisco has different purpose-built product lines for each of 4 waves of technology. Counter to that Extreme offers a platform solution for a customer to build his network on. Extreme does not require different switches to address different convergence requirements, this would be cost prohibitive for most customers and complicated. Simply put to disrupt the Cisco market, Extreme must deliver more with less.
The IEEE is pushing Ethernet to unimaginable speeds, with the 40/100Gigabit Ethernet standard expected to be ratified in 2010 and Terabit Ethernet on the drawing board for 2015. Here's a timeline showing key milestones in the growth of Ethernet Sstandard's-compliant products are expected to ship in the second half of next year, not long after the expected June 2010 ratification of the 802.3ba standard.
Complexity - Complex systems are a special type of chaotic system. They display a very interesting type of emergent behavior called, logically enough, complex adaptive behavior. But we are getting ahead of ourselves. There’s a need to back up a bit and describe a fundamental behavior that occurs at the granular level and leads to complex adaptive behavior. It is self -organization. Complex Adaptive Behavior is the name given to this forming-falling apart-reforming-falling apart-… behavior. Specifically it is defined as many agents working in parallel to accomplish a goal. It is conflict ridden, very fluid, and very positive. The hallmark of emergent, complex adaptive behavior is it brings about a change from the starting point that is not just different in degree but in kind. In biology a good example of this is the emergence of consciousness. Another example is the Manhattan Project and the development of the atomic bomb. Below is a checklist that helps facilitate a qualitative assessment of the level of complexity. It is in everyday language to facilitate use by a broad range of stakeholders and team members. In other words, it stays away from jargon, which can be the kiss of death when requesting information from people.
The Checklist
Not sure how the project will get done; Many stakeholders, teams and sub-teams;
Too Many vendors; New vendors;
New client; Team members are geographically dispersed;
End-users are geographically dispersed; Many organizations;
Many cultures (professional, organizational, sociological);
Many languages (professional, organizational, sociological);
High risk;
Lack of quality best characterized by lack of acceptance criteria;
Lack of clear requirements and too Many tasks;
Arbitrary budget or end date;
Inadequate resources;
Leading-edge technology;
New, unproven application of existing technology;
High degree of interconnectedness (professional, technological, political, sociological).
Where Does Networking Fit In? To gain the full benefits of cloud computing and virtualization and achieve a business agile IT infrastructure, organizations need a reliable, high-performance data center networking infrastructure with built-in investment protection. Several technology inflection points are coming together that are fundamentally changing the way networks are architected, deployed and operated both in the public cloud as well as the private cloud. From performance, to scale, to virtualization support and automation to simplified orchestration, the requirements are rapidly changing and driving new approaches to building data center networks.
With Extreme Networks, IT can manage more with less. Automated intelligence and analytics for compliance, forensics, and traffic patterns translates into reduced help desk calls. Businesses can predict costs and return on investment, and increase employee productivity by securely onboarding BYOD, increasing both customer and employee satisfaction. A constant risk to the network, and ultimately the hospital, are unapproved applications and rogue devices that may appear on the network and either permit unauthorized access or interfere with other devices. A means to monitor all devices and applications that operate across the network is vital. Just as important are the audit and reporting capabilities necessary to report on who, what, where, when, and how patient data is accessed.
What is SDN? What software-defined networking really means has evolved dramatically and now includes automation and virtualization. Hardware is still a critical component in data center networking equipment, but the influence of switch software shouldn’t be overlooked. When everyone began to get excited about SDN a few years ago, we thought of it as only one thing: the separation of network control from network data packet handling. Traditional networks had already started down this path, with the addition of controller cards to manage line cards in scalable chassis-based switches, and with various data center fabric technologies. SDN took the idea to its logical end, removing the need for the controller and the packet handlers to be on the same backplane or even from the same vendor.
Cost. Reducing costs in the data center and contributing to corporate profitability is an increasingly important trend in today’s economic climate. For example, energy costs for the data center are increasing at 12% a year. Moreover, increased application requirements such as 100% availability necessitate additional hardware and services to manage storage and performance thus raising total cost of ownership.
Next Generation Storage Networking for Next Generation Data CentersTheFibreChannel
Learning Objectives
What is the future of Fibre Channel and Ethernet Storage?
What I/O bandwidth capabilities are available with the new crop of servers?
Share some performance data from the Demartek lab
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
TechWiseTV's Cisco Container Platform live workshop took place on July 18th.
For the first time in the industry, a single family of fixed, stackable, and modular switches are running on the same IOS-XE operating system along with a common ASIC.
Cisco’s Catalyst 9200 rounds out the lower end of its incredible Catalyst 9000 family of switches. The 9200 is designed for small, medium, and branch deployments, providing greater modularity, redundancy, and stackability than the Catalyst 2960 it replaces.
Register now.
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Bruno Teixeira
With the changing paradigm of network programmability using Software Defined Network (SDN), we are seeing new ways for monitoring, scaling and configuring network devices. With new network programability capabilities utilizing NETCONF, OpenFlow, BGP-LS, and PCEP it is vital for network architects and operations engineers to understand how these SDN related technologies can be leveraged to streamline the way we view, design, and operate our networks today. This session introduces these concepts and focuses on the use cases, implementation, and troubleshooting of these technologies on the ASR9000 platform.
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesRobb Boyd
Watch the REPLAY right now: http://bit.ly/2YoLbt3
Enterprise networks are now dealing with massive volumes of data, with a critical need to collect and analyze this data to respond faster and deliver insightful context. Traditional approaches, in which data is processed in remote servers, will no longer work. Data can burden the network unless some context is known. Edge computing can greatly reduce the data sent to the cloud or a remote server. Collecting and analyzing the data at the edge and making decisions locally rather than in centralized servers significantly reduces the latency and bandwidth of the network.
Powered by an x86 CPU, the application hosting solution on the Cisco Catalyst 9000 switching family provides the intelligence required at the edge. Native Docker engine support on the switches will enable users to build and bring their own applications without additional packaging. Cisco DNA Center will provide consistent workflows to manage the entire application lifecycle across multiple Cisco Catalyst 9000 switches through the App Hosting dashboard.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9001EIbih
TechWiseTV: http://cs.co/9009DzrjN
SAN Extension Design and Solutions
Help your organization ensure data is backed up and available, both locally and remotely. Expert guidance on the pros and cons of various SAN design options, and which to choose
Learn from Cisco experts in this technical session as we cover the following:
•How to achieve the desired recovery time objective and recovery point objective for the business
•Pros and cons of various SAN extension solution designs, and which one to choose
•Cisco solutions and products for SAN extension using native Fibre Channel (FC), Fibre Channel over Ethernet (FCoE), and Fibre Channel over Internet Protocol (FCIP) protocols
•Best practices collected from a decade’s worth of experience with some of the largest deployments in the world
•Configuration guidelines/best practices to increase the return on your investment
•Guidelines for increasing performance and security while lowering solution costs
Cisco Enhances Data Protection, Increases Bandwidth and Simplifies End to End Storage Management
Protect
• Enhance disaster recovery and Business Continuance
• Integrated FCIP on Director Class
Scale
• Nexus 9K for Storage Networking
• 100G /50G/25G IP Storage connectivity
Simplify Operations
• DCNM Connect
• Storage End-to-end Provisioning
Many analysts predict that 10 Gigabit Ethernet (10GbE) is ready to take off in HPC environments. 10GbE can meet low-latency and high bandwidth I/O requirements using familiar Ethernet networking leveraging Ethernet training, and management and debugging tools, which are ubiquitous in networking. Using efficient and cost-effective 10GbE to interconnect the blade servers, HPC clusters can take advantage of dense blade-server compute nodes to lower power consumption and reduce floor space.
The VIPRION® 2400 is a midrange chassis-based hardware platform. Adding to the successful F5® VIPRION product line, the new Application Delivery Controller (ADC) provides significant price/performance advantages for enterprises. In addition, F5's Virtual Clustered Multiprocessing (vCMP™) technology combines virtualization and multi-tenancy capabilities to help customers consolidate and efficiently manage application delivery services. Building on F5’s previously announced Clustered Multiprocessing (CMP™) technology, vCMP enables multiple instances of BIG-IP® software to run on one device.
Where Does Networking Fit In? To gain the full benefits of cloud computing and virtualization and achieve a business agile IT infrastructure, organizations need a reliable, high-performance data center networking infrastructure with built-in investment protection. Several technology inflection points are coming together that are fundamentally changing the way networks are architected, deployed and operated both in the public cloud as well as the private cloud. From performance, to scale, to virtualization support and automation to simplified orchestration, the requirements are rapidly changing and driving new approaches to building data center networks.
With Extreme Networks, IT can manage more with less. Automated intelligence and analytics for compliance, forensics, and traffic patterns translates into reduced help desk calls. Businesses can predict costs and return on investment, and increase employee productivity by securely onboarding BYOD, increasing both customer and employee satisfaction. A constant risk to the network, and ultimately the hospital, are unapproved applications and rogue devices that may appear on the network and either permit unauthorized access or interfere with other devices. A means to monitor all devices and applications that operate across the network is vital. Just as important are the audit and reporting capabilities necessary to report on who, what, where, when, and how patient data is accessed.
What is SDN? What software-defined networking really means has evolved dramatically and now includes automation and virtualization. Hardware is still a critical component in data center networking equipment, but the influence of switch software shouldn’t be overlooked. When everyone began to get excited about SDN a few years ago, we thought of it as only one thing: the separation of network control from network data packet handling. Traditional networks had already started down this path, with the addition of controller cards to manage line cards in scalable chassis-based switches, and with various data center fabric technologies. SDN took the idea to its logical end, removing the need for the controller and the packet handlers to be on the same backplane or even from the same vendor.
Cost. Reducing costs in the data center and contributing to corporate profitability is an increasingly important trend in today’s economic climate. For example, energy costs for the data center are increasing at 12% a year. Moreover, increased application requirements such as 100% availability necessitate additional hardware and services to manage storage and performance thus raising total cost of ownership.
Next Generation Storage Networking for Next Generation Data CentersTheFibreChannel
Learning Objectives
What is the future of Fibre Channel and Ethernet Storage?
What I/O bandwidth capabilities are available with the new crop of servers?
Share some performance data from the Demartek lab
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
TechWiseTV's Cisco Container Platform live workshop took place on July 18th.
For the first time in the industry, a single family of fixed, stackable, and modular switches are running on the same IOS-XE operating system along with a common ASIC.
Cisco’s Catalyst 9200 rounds out the lower end of its incredible Catalyst 9000 family of switches. The 9200 is designed for small, medium, and branch deployments, providing greater modularity, redundancy, and stackability than the Catalyst 2960 it replaces.
Register now.
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Bruno Teixeira
With the changing paradigm of network programmability using Software Defined Network (SDN), we are seeing new ways for monitoring, scaling and configuring network devices. With new network programability capabilities utilizing NETCONF, OpenFlow, BGP-LS, and PCEP it is vital for network architects and operations engineers to understand how these SDN related technologies can be leveraged to streamline the way we view, design, and operate our networks today. This session introduces these concepts and focuses on the use cases, implementation, and troubleshooting of these technologies on the ASR9000 platform.
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesRobb Boyd
Watch the REPLAY right now: http://bit.ly/2YoLbt3
Enterprise networks are now dealing with massive volumes of data, with a critical need to collect and analyze this data to respond faster and deliver insightful context. Traditional approaches, in which data is processed in remote servers, will no longer work. Data can burden the network unless some context is known. Edge computing can greatly reduce the data sent to the cloud or a remote server. Collecting and analyzing the data at the edge and making decisions locally rather than in centralized servers significantly reduces the latency and bandwidth of the network.
Powered by an x86 CPU, the application hosting solution on the Cisco Catalyst 9000 switching family provides the intelligence required at the edge. Native Docker engine support on the switches will enable users to build and bring their own applications without additional packaging. Cisco DNA Center will provide consistent workflows to manage the entire application lifecycle across multiple Cisco Catalyst 9000 switches through the App Hosting dashboard.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9001EIbih
TechWiseTV: http://cs.co/9009DzrjN
SAN Extension Design and Solutions
Help your organization ensure data is backed up and available, both locally and remotely. Expert guidance on the pros and cons of various SAN design options, and which to choose
Learn from Cisco experts in this technical session as we cover the following:
•How to achieve the desired recovery time objective and recovery point objective for the business
•Pros and cons of various SAN extension solution designs, and which one to choose
•Cisco solutions and products for SAN extension using native Fibre Channel (FC), Fibre Channel over Ethernet (FCoE), and Fibre Channel over Internet Protocol (FCIP) protocols
•Best practices collected from a decade’s worth of experience with some of the largest deployments in the world
•Configuration guidelines/best practices to increase the return on your investment
•Guidelines for increasing performance and security while lowering solution costs
Cisco Enhances Data Protection, Increases Bandwidth and Simplifies End to End Storage Management
Protect
• Enhance disaster recovery and Business Continuance
• Integrated FCIP on Director Class
Scale
• Nexus 9K for Storage Networking
• 100G /50G/25G IP Storage connectivity
Simplify Operations
• DCNM Connect
• Storage End-to-end Provisioning
Many analysts predict that 10 Gigabit Ethernet (10GbE) is ready to take off in HPC environments. 10GbE can meet low-latency and high bandwidth I/O requirements using familiar Ethernet networking leveraging Ethernet training, and management and debugging tools, which are ubiquitous in networking. Using efficient and cost-effective 10GbE to interconnect the blade servers, HPC clusters can take advantage of dense blade-server compute nodes to lower power consumption and reduce floor space.
The VIPRION® 2400 is a midrange chassis-based hardware platform. Adding to the successful F5® VIPRION product line, the new Application Delivery Controller (ADC) provides significant price/performance advantages for enterprises. In addition, F5's Virtual Clustered Multiprocessing (vCMP™) technology combines virtualization and multi-tenancy capabilities to help customers consolidate and efficiently manage application delivery services. Building on F5’s previously announced Clustered Multiprocessing (CMP™) technology, vCMP enables multiple instances of BIG-IP® software to run on one device.
Многие компании сегодня вынуждены искать замену решению Microsoft Forefront Threat Management Gateway, разработка которого была прекращена. Превосходной альтернативой является решение F5 Secure Web Gateway Services, обеспечивающее контроль и безопасную работу в Интернете.
В связи с завершением разработки Microsoft Forefront Threat Management Gateway (TMG) множество организаций, использующих или планировавших использовать TMG столкнулись с дилеммой: как и, более важно, что администраторы будут использовать для защиты своих приложений Microsoft, имеющих доступ в Интернет типа Exchange, SharePoint и Lync?
F5 Networks предлагает ответ на эти вопросы. Подробности описываются в данной презентации.
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...Michael Noel
One of the biggest advantage of using SharePoint as a Document Management and collaboration environment is that a robust security and permissions structure is built-in to the application itself. Authenticating and authorizing users is a fairly straightforward task, and administration of security permissions is simplified. Too often, however, security for SharePoint stops there, and organizations don’t pay enough attention to all of the other considerations that are part of a SharePoint Security stack, and more often than not don’t properly build them into a deployment. This includes such diverse categories including Edge, Transport, Infrastructure, Data, and Rights Management Security, all areas that are often neglected but are nonetheless extremely important. This session discusses the entire stack of Security within SharePoint, from best practices around managing permissions and ACLs to comply with Role Based Access Control, to techniques to secure inbound access to externally-facing SharePoint sites. The session is designed to be comprehensive, and includes all major security topics in SharePoint and a discussion of various real-world designs that are built to be secure. • Understand how to use native technologies to secure all layers of a SharePoint environment, including Data, Transport, Infrastructure, Edge, and Rights Management. • Examine tools and technologies that can help secure SharePoint, including AD Rights Management Services, Forefront Unified Access Gateway, SQL Transparent Data Encryption, and more. • Understand a Role-Based Access Control (RBAC) permissions model and how it can be used to gain better control over authorization and access control to SharePoint files and data
Cisco Trustsec & Security Group TaggingCisco Canada
This presentation covers the protocols and functions that create a trusted network. We will discuss the best practices when deploying this tagging ability using campus switches including migration techniques from non-SGT capable to devices to a fully SGT capable network deployment. For more information please visit our website here: http://www.cisco.com/web/CA/index.html
F5 Offers Advanced Web Security With BIG-IP v10.1DSorensenCPR
With the new v10.1 release of BIG-IP, F5 tackles existing and emerging web security threats, while optimizing web applications to enhance end-user experience. The new release enhances an IT staff’s operational efficiency, reduces security risks and associated litigation costs, while streamlining application delivery.
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...APNIC
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling transport protocols from what's below, by Catherine Pearce.
A presentation given at APRICOT 2016’s APOPS Plenary 1 session on 22 February 2016.
How to deliver industry standard browser security to the native Domino HTTP stack, using company-wide wildcard certificates deployed across all platforms.
The F5 DDoS Protection Reference Architecture (Technical White Paper)F5 Networks
F5 Networks offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
The F5 DDoS Protection Reference Architecture (Technical White Paper)
Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).
Fordele ved POWER7 og AIX, IBM Power EventIBM Danmark
Du får masser af fordele ved at opdatere til POWER7 og AIX. Oplev mulighederne for at udnytte konsolidering og de nye funktioner i POWER7 og AIX.
Jan Kristian Nielsen, Client Architect, IBM
(http://www.itri.org.tw/chi/tech-transfer/04.asp?RootNodeId=040&NodeId=041&id=4640)
LTE and Wi-Fi Interworking : 針對LTE & Wi-Fi共存之網路環境開發異質存取網路整合技術,可管理大量的SmallCells 及 Wi-Fi APs。 主要特徵如下:
-Management group of small cells and Wi-Fi Aps
-LTE and Wi-Fi bandwidth aggregation
-Traffic Offload
The fourth-generation Cisco ASR 9000 Aggregation Services Routers series is our best yet. Not only does it sport high-density, 100-GE-port line cards; it also offers a flexible, pay-as-you-grow consumption model. Service providers can now use only the bandwidth they need and increase it at any time to meet traffic demands.
Learn the business and technical considerations of our latest ASR 9000, including:
• The pay-as-you-grow consumption model commercial terms
• Software license portability and permitting capacity
• Real-life customer case studies
Resources:
Watch the related TechWiseTV episode: http://cs.co/9008Dfyik
TechWiseTV: http://cs.co/9009DzrjN
V24 Product Brief - Aggregation & Filtering TapsChris Fenton
Distributed Taps are intelligent, hardware-based network traffic capture devices designed to passively tap inline networks or connect to SPAN ports for capturing and forwarding traffic to monitoring or security tools.
Using Docker container technology with F5 Networks products and servicesF5 Networks
The evolving needs of IT and the advent of agile development and deployment strategies has led to the emergence of “containerization,” an alternative to full machine virtualization in which an application is encapsulated in a container with its own operating environment. Containerization is an attractive solution that enables developers to iterate faster. It also offers additional benefits that address the overhead associated with virtual machines, allowing for higher utilization of resources in the software-defined data center (SDDC).
Although containerization isn’t a new concept, Docker, developed by Docker, Inc., has been widely cited as the implementation of choice due to its broad industry support, standardization, and comprehensive breadth of capability. In the company’s words, Docker is “an open platform for building, shipping, and running distributed applications. It gives programmers, development teams and operations engineers the common toolbox they need to take advantage of the distributed and networked nature of modern applications.” As such, Docker simplifies application lifecycle management from development to deployment and enables application portability. This simplification is critical for enterprises, considering that there are multiple hosting options for an application, either in the public cloud or private cloud infrastructure.
This paper outlines F5’s direction on using containers within F5 technology and for supporting Docker for application delivery and security. Before we discuss this strategy, it is important to recognize data center pain points and why these technologies are critical for the next generation enterprise application delivery.
The purpose of this survey is to gain a better understanding of familiarity and future adoption strategies for HTTP 2.0, including perceived benefits and barriers to adoption.
Conducted on behalf of F5 Networks by IDG Research Services in September 2014.
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
While service providers continue to validate various use cases associated with NFV, new advanced devices, increasing usage of high bandwidth applications,
and the Internet of Things (IoT) are all pushing them to commercialize these NFV initiatives to enable them to profitably scale their networks and deploy new revenue generating business models. We will explore:
• Why hybrid architectures are key to scale and evolve NFV environments
• The importance of the evolution of standards and ecosystems
• Key technologies that are crucial to realize the benefits of NFV
Presentation titled "NFV - moving from vision to reality" by Mallik Tatipamula, VP Service Provider Solutions, F5 Networks, at NFV World Congress in May 2015.
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
The F5 Networks Silverline Web Application Firewall service offering provides quick web application firewall (WAF) implementation and unified, scalable policy enforcement capabilities. The service also includes 24x7 support from highly specialized F5 security experts with the company’s Security Operations Center (SOC) resources.
As the latest addition to F5’s Silverline cloud-based application services platform, the new WAF offering is built on the award-winning capabilities of the company’s BIG-IP Application Security Manager product. F5 seamlessly provides leading WAF services in both on-premises and subscription-based cloud offerings. The company’s versatile, easy to deploy WAF solutions let organizations confidently incorporate cloud resources while protecting apps and data from increasingly sophisticated security attacks, risks, and vulnerabilities.
The security of data in transit has traditionally been the purview of nation states. Now the global adoption of the world wide web is bringing cryptography to the common man. But the forces of malicious actors and eavesdroppers are moving nearly all significant speech and commerce into a single cryptographic protocol: SSL.
SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between an eavesdropper and a target, or a thief and a merchant. The stakes around SSL have been upleveled to the limit. Whether or not it’s convenient to admit, it’s time for organizations to uplevel their overall security posture to protect this last line of defense.
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionF5 Networks
Preview the third "State of Application Delivery in 2015" webinar entitled, "Intrinsic Security - The Key to Effective Hybrid DDoS Protection."
Learn about today’s changing threat landscape and the value of a hybrid DDoS protection architecture built on the principles of intrinsic security.
Watch the Intrinsic Security webinar (and previous webinars) on-demand at f5.com/SOAD.
And follow @F5Security on Twitter for more information and updates from F5 Networks.
Ensure Application Availability Between Hybrid Data CentersF5 Networks
Preview the Ensure Application Availability Between Hybrid Data Centers webinar. Learn real-world strategies for building a hybrid infrastructure to support your on- and off-premises applications.
This is the second of four webinars in the F5 Networks State of Application Delivery 2015 series. The webinars are based on the survey results that make of the "State of Application Delivery in 2015" report, which highlights strategic initiatives are driving application deployments including the most important trend for the next two to five years.
Download the report and watch all the webinars here: f5.com/SOAD
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
The world of smart devices talking to each other—and to us—is well
underway and here to stay. To connect to the Internet of Things
opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data.
“Madness” is a Denial of Service (DDoS) bot targeting Windows machines. While it constantly evolves its capabilities, it certainly represents the progress attackers made in Layer 7 DDoS expertise. The bot author proudly states that “Madness” is the superior successor and an actual hybrid of the notorious DDoS malware families “BlackEnergy,” “gbot,” “DirtJumper,” “Darkness Optima,” “iBot,” and “w3Bot.”
While there were several publications covering the infection aspects of this bot, little was said about its Denial of Service functionality. This report will cover it in detail and compare its different DDoS techniques.
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...F5 Networks
F5 Networks is a provider of application delivery products and services with a broad solution portfolio including network data and signaling traffic management, security, cloud and application delivery controller, and serves the telecoms, financial services, government and IT/enterprise industries.
This profile focuses on F5’s Traffix Signaling Delivery Controller (SDC) and BIG-IP Policy Enforcement Manager (PEM) products that together help communications service providers (CSPs) address the challenges of data and mobile signaling traffic growth in their networks, and monetise the increasing demand for data services.
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
Service providers know they need to protect the network, maintain stability, and manage millions of real-time sessions without costs spiraling out of control. In this paper, Patrick Donegan, Senior Analyst at Heavy Reading, outlines the new challenges introduced by LTE and the security architecture in the service provider network. He stresses the importance of implementing a dynamic, multi-layered security approach that makes use of virtualization, service chaining, and real-time subscriber awareness.
Security is a top priority for service providers, who must deliver superior network quality and customer experiences without adding complexity or cost. F5 Networks offers a suite of dynamic, multi-layered solutions that simplify delivery architectures, boost service availability, and enhance application awareness and control
F5 Certified! Program Overview and UpdateF5 Networks
What does it mean to be F5 Certified? F5 Networks Certified exams test the skills and knowledge necessary to be successful when working with today’s application delivery challenges. F5 Professional Certification represents a new breed of technologist capable of manipulating the entire application stack from traditional network knowledge all the way to advanced application layer understanding, with a unique capability to integrate the two. An F5 Networks certification gives technologists a high-quality, credible certification that is a differentiator for candidates and a strategic, competitive advantage for organizations employing them.
Learn more at www.F5.com/education/certification
Key Findings from the State of Application Delivery 2015F5 Networks
Key Findings from the State of Application Delivery 2015. The State of Applications Services presentation was highlighted in F5 Networks State of Application Delivery 2015 Webinar featuring Manny Rivelo, EVP Strategic Solutions, Cindy Borovick, Director Business Intelligence, and Lori MacVittie, Principal Technical Evangelist.
To watch the complete webinar or sign-up for future F5 webinars go to: www.F5.com/SOAD
Load balancing isn’t dead—it has evolved into something much greater. While it remains a core functionality for delivering any application, traditional load-balancing has moved beyond the network to encompasses a range of security, performance and management services. As leaders in the application services industry, F5’s expertise in helping power fast, available, and secure applications forms the foundation for our entire catalog of solutions.
Any Device. Anytime. Anywhere. Not only are employees accessing enterprise applications on mobile devices, they’re increasingly using their own devices. Making applications always available anywhere on any device is critical to lowering costs and maximizing productivity. With F5, you can remove the roadblocks in your network to efficiently and securely deliver applications that are available to users when and where they need them.
Load balancing isn’t dead—it has evolved into something much greater. While it remains a core functionality for delivering any application, traditional load-balancing has moved beyond the network to encompasses a range of security, performance and management services. As leaders in the application services industry, F5’s expertise in helping power fast, available, and secure applications forms the foundation for our entire catalog of solutions.
Any Device. Anytime. Anywhere. Not only are employees accessing enterprise applications on mobile devices, they’re increasingly using their own devices. Making applications always available anywhere on any device is critical to lowering costs and maximizing productivity. With F5, you can remove the roadblocks in your network to efficiently and securely deliver applications that are available to users when and where they need them.
The F5 Networks Application Services Reference Architecture (White Paper)F5 Networks
Build elastic, flexible application delivery fabrics that are ready to meet the challenges of optimizing and securing applications in a constantly evolving environment.
The F5 Networks Application Services Reference Architecture (White Paper)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)F5 Networks
Secure your business from today's sophisticated attacks.
Distributed denial-of-service (DDoS) attacks have changed in recent years. Motivations for aacks are increasingly financial or political, but the objective is the same: to cause a service outage. While there are still traditional aacks aimed at filling Internet pipes, aacks intended to exhaust application server resources are becoming more prevalent.
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
CIOs want harmony. Security directors loathe point products. Network operations won’t buy into anything new. CIOs can get the harmony they need around DDoS mitigation by extending the F5 Application Delivery Controller into a hybrid solution: on-premises with a new cloud component.
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Paper)
Developed in 1983, the Domain Name System or DNS translates the names people type into a browser into an IP address so the requested service can be found on the internet. It is one of the most important plumbing components for a functioning internet. So welcome to F5’s Intelligent DNS Scale story.
DNS: Challenges in a Changing Landscape (Infographic)F5 Networks
DNS: Challenges in a Changing Landscape. Infographic.
IDG Research Services surveyed DNS administrators from large organizations to understand the challenges of deploying an available, secure, high-performance DNS infrastructure.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.