Achieving Closed Loop Firewall Automation with Batfish Enterprise & ItentialItential
In today’s dynamic IT environment, network and security teams often find themselves caught between the need to make network and security changes quickly while allowing enough time for due diligence to ensure those changes are secure. IT teams are deploying applications at a rapid pace to support their business, so network and security teams need a modern way to rapidly deploy changes without creating unintentional security risks to the organization.
Batfish Enterprise allows network engineers to setup policy rule validation so configuration changes into firewalls (and other network devices) aren’t a guessing game. But now that you finally feel better about making changes, there is more to consider ¬– the change process, the actual change itself, the policy validation, and pre/post checks. That’s where Itential comes in. The Itential Automation Platform is an end-to-end network automation platform purpose-built for this very use case.
Join Mike Elrom, Senior Solutions Architect at Itential and Samir Parikh, Head of Product at Intentionet for a live webinar on achieving closed-loop policy configuration management. Mike and Samir will showcase how Itential automates the entire process, leveraging Intentionet’s Itential Pre-Built contributions to perform policy validation (pre- and post-change) with Batfish Enterprise.
With Batfish Enterprise and Itential, network operators can take comfort in knowing their configuration will meet the configured network policy, all while enjoying the full benefits of automation.
In this live webinar, you’ll see a demo of Batfish Enterprise and Itential’s Automation Platform perform:
Creation and management of a Change Request Process (ServiceNow).
Continuous notification (Slack).
Pre-change validation (Batfish Enterprise).
Fully automated deployment (Palo Alto).
Post-change verification (Batfish Enterprise).
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations, particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations.
Five Connectivity and Security Use Cases for Azure VNetsKhash Nakhostin
As you complete your plans for moving IT infrastructure and application workloads to Azure, it’s important to understand what connectivity and security services Microsoft includes by default – and what’s missing. Though Azure comes with baseline capabilities, it’s still up to you to choose judiciously among many Azure-native and third-party options to address unique requirements. This session explores use cases, such as encrypting traffic between VNets holding sensitive data, remote user access to VNets, multi-cloud connectivity, and filtering egress traffic to the Internet.
We cover the questions you should be asking: what are the key issues that matter, what does Microsoft provide, and what’s missing? We address these questions for each of the five most common use cases:
On-prem to VNet
VNet to VNet
VNet to Internet (Egress)
User to VNet
VNet to AWS VPC
We then demonstrate how a software-defined approach can deliver simplified and unified control over cloud routing, embracing both Azure-native and third-party services.
Three Innovations that Define a “Next-Generation Global Transit Hub”Khash Nakhostin
Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world.
We’ll share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that meet those requirements:
Software-defined and centrally managed – so anyone can run it.
Built-in security with fully encrypted tunnels, egress filtering, and VPC segmentation.
Operational readiness with integrated monitoring, alerting and troubleshooting that’s easy to hand off to an operations team.
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesKhash Nakhostin
Whether your cloud applications are multi-tenanted SaaS solutions or standalone instances hosted for individual customers, ensuring reliable and secure VPC connectivity poses a variety of challenges. Within minutes of signing up a new customer, your operations team will be expected to:
Build IPsec tunnels to, for example, support API connectivity or secure data as it moves between an on-premises database and the hosted app
Provision your customers’ administrative and end users with easy yet secure app access
Ensure internal teams have secure access to perform maintenance and support
Security Requirements and Tradeoffs for Controlling VPC-to-Internet Egress Tr...Khash Nakhostin
Limitations of Existing Firewalls and AWS NAT Gateways
There are legitimate reasons why AWS VPCs or Azure VNets need Internet access; for example, to receive software updates from vendors or integrate with native AWS services or third-party SaaS services. But this is substantially different from an on-premises use case, where traditional, full-featured firewalls are needed to filter co-mingled end-user traffic and application traffic. And while AWS provides a NAT gateway, it can be configured only on a per-VPC basis against a limited number of IP addresses.
Network Troubleshooting in the Cloud: Tools, Techniques and GotchasKhash Nakhostin
When someone reports an EC2 connectivity failure, what do you do? Open your Amazon VPC Console, launch an SSH session, and start typing CLI commands in search of clues.
Common root causes include problems related to:
Route table updates
Phantom network ACLs
Security policies
Missing BGP routes
Overfilling route tables or summarization mistakes
Moreover, in many cases, networking is not an issue, but valuable time is lost eliminating the network as a cause before you can progress. Unfortunately, AWS does not natively provide the visibility and troubleshooting features needed by CloudOps and DevOps teams to identify and resolve problems quickly.
Achieving Closed Loop Firewall Automation with Batfish Enterprise & ItentialItential
In today’s dynamic IT environment, network and security teams often find themselves caught between the need to make network and security changes quickly while allowing enough time for due diligence to ensure those changes are secure. IT teams are deploying applications at a rapid pace to support their business, so network and security teams need a modern way to rapidly deploy changes without creating unintentional security risks to the organization.
Batfish Enterprise allows network engineers to setup policy rule validation so configuration changes into firewalls (and other network devices) aren’t a guessing game. But now that you finally feel better about making changes, there is more to consider ¬– the change process, the actual change itself, the policy validation, and pre/post checks. That’s where Itential comes in. The Itential Automation Platform is an end-to-end network automation platform purpose-built for this very use case.
Join Mike Elrom, Senior Solutions Architect at Itential and Samir Parikh, Head of Product at Intentionet for a live webinar on achieving closed-loop policy configuration management. Mike and Samir will showcase how Itential automates the entire process, leveraging Intentionet’s Itential Pre-Built contributions to perform policy validation (pre- and post-change) with Batfish Enterprise.
With Batfish Enterprise and Itential, network operators can take comfort in knowing their configuration will meet the configured network policy, all while enjoying the full benefits of automation.
In this live webinar, you’ll see a demo of Batfish Enterprise and Itential’s Automation Platform perform:
Creation and management of a Change Request Process (ServiceNow).
Continuous notification (Slack).
Pre-change validation (Batfish Enterprise).
Fully automated deployment (Palo Alto).
Post-change verification (Batfish Enterprise).
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations, particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations.
Five Connectivity and Security Use Cases for Azure VNetsKhash Nakhostin
As you complete your plans for moving IT infrastructure and application workloads to Azure, it’s important to understand what connectivity and security services Microsoft includes by default – and what’s missing. Though Azure comes with baseline capabilities, it’s still up to you to choose judiciously among many Azure-native and third-party options to address unique requirements. This session explores use cases, such as encrypting traffic between VNets holding sensitive data, remote user access to VNets, multi-cloud connectivity, and filtering egress traffic to the Internet.
We cover the questions you should be asking: what are the key issues that matter, what does Microsoft provide, and what’s missing? We address these questions for each of the five most common use cases:
On-prem to VNet
VNet to VNet
VNet to Internet (Egress)
User to VNet
VNet to AWS VPC
We then demonstrate how a software-defined approach can deliver simplified and unified control over cloud routing, embracing both Azure-native and third-party services.
Three Innovations that Define a “Next-Generation Global Transit Hub”Khash Nakhostin
Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world.
We’ll share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that meet those requirements:
Software-defined and centrally managed – so anyone can run it.
Built-in security with fully encrypted tunnels, egress filtering, and VPC segmentation.
Operational readiness with integrated monitoring, alerting and troubleshooting that’s easy to hand off to an operations team.
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesKhash Nakhostin
Whether your cloud applications are multi-tenanted SaaS solutions or standalone instances hosted for individual customers, ensuring reliable and secure VPC connectivity poses a variety of challenges. Within minutes of signing up a new customer, your operations team will be expected to:
Build IPsec tunnels to, for example, support API connectivity or secure data as it moves between an on-premises database and the hosted app
Provision your customers’ administrative and end users with easy yet secure app access
Ensure internal teams have secure access to perform maintenance and support
Security Requirements and Tradeoffs for Controlling VPC-to-Internet Egress Tr...Khash Nakhostin
Limitations of Existing Firewalls and AWS NAT Gateways
There are legitimate reasons why AWS VPCs or Azure VNets need Internet access; for example, to receive software updates from vendors or integrate with native AWS services or third-party SaaS services. But this is substantially different from an on-premises use case, where traditional, full-featured firewalls are needed to filter co-mingled end-user traffic and application traffic. And while AWS provides a NAT gateway, it can be configured only on a per-VPC basis against a limited number of IP addresses.
Network Troubleshooting in the Cloud: Tools, Techniques and GotchasKhash Nakhostin
When someone reports an EC2 connectivity failure, what do you do? Open your Amazon VPC Console, launch an SSH session, and start typing CLI commands in search of clues.
Common root causes include problems related to:
Route table updates
Phantom network ACLs
Security policies
Missing BGP routes
Overfilling route tables or summarization mistakes
Moreover, in many cases, networking is not an issue, but valuable time is lost eliminating the network as a cause before you can progress. Unfortunately, AWS does not natively provide the visibility and troubleshooting features needed by CloudOps and DevOps teams to identify and resolve problems quickly.
Getting the Most Value from Your Aviatrix Controller & GatewaysKhash Nakhostin
The Aviatrix AVX Software-Defined Cloud Router establishes an abstraction layer between the public cloud provider’s networking primitives and the application to simplify the creation of logical cloud networks and services for hybrid connectivity, data security, multicloud connectivity, monitoring and troubleshooting. The solution consists of two components: Aviatrix Controller; and the Aviatrix Gateways, all of which are deployed in your VPCs or the on-premises environment.
Seven Criteria for Building an AWS Global Transit NetworkKhash Nakhostin
Global Transit Network architecture is critical to the success of your AWS cloud deployment. Implemented correctly, a Global Transit Hub enables traffic to securely flow from on-prem to VPCs, or from VPC to VPC, in a way that minimizes complexity and cost and maximizes agility and availability. Implemented poorly, it becomes a choke point that is time-consuming – and costly – to maintain and troubleshoot.
What You Need to Know About Operationalizing Your AWS Transit HubKhash Nakhostin
You’ll see a demonstration of the best practices we’ve gleaned from working with operations teams, who all require:
Visibility. Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details?
Deep Analytics. Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools?
Monitoring and Troubleshooting. Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues?
Alert Management. When issues do occur, what real-time alerting is available?
Securing Your AWS Global Transit Network: Are You Asking the Right Questions?Khash Nakhostin
Now that you’ve designed and implemented your Global Transit Network, it’s time to revisit one of those seven considerations: security. What are the right questions to start asking to verify that your security posture is adequate for your AWS cloud environment?
Your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? Unfortunately, even this is not the right starting question. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options.
How to Quickly Implement a Secure Cloud for Government and Military | WebinarPLUMgrid
In this webinar see how Awnix meets your needs with its Secure Private Cloud products and services through a live demo and technical deep dive of common use cases.
Andrea Di Lecce, IT Technical Project Manager at Cisco, describes how Cisco IT uses ThousandEyes for insights into the Cisco WAN, CDNs like Akamai, customer-facing apps like WebEx and SaaS apps like Salesforce.
Leveraging the JSON API as a Self-Service ToolZenoss
Presented by Portland GE's Chad Beers (Enterprise OPS, PGE) and Anthony Thayer-Osborne (Enterprise OPS, PGE).
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
There is a lot of talk now around the term Service Mesh. The hype is high and the promise is real. The problem is that there is not really a good definition of what service mesh really is. In this talk we are going to review the problem service meshes are trying to solve, name the core components that make up a service mesh, and discuss the benefits an organization can receive by implementing this new technology.
Torusware accelerates performance-critical software, whether running on premises or in the cloud (AWS, Azure ...).
Speedus is Torusware product for accelerating applications in a non-intrusive way through optimizing BUS (intra-server) and LAN (Local Area Network) communications for the enterprise, cloud and big data.
Successfull track record both on financial services and start-ups accelerating trading applications, Docker, Redis, MongoDB, Spark, memcached, MySQL, PostgreSQL, ActiveMQ, ZeroMQ, Qpid, ElasticSearch, Solr... and more to follow.
Zenoss' own Nick Turner (Director, IT Operations) and Jacob Keith (Deployment Architect) present Zenoss as a Service: How to Get There.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Windows 10 Creators Update: what’s on tap for business users - Ionut BalanITCamp
The next version of Windows 10 is not just for the gamers and digital content creators, business users will have also a number of benefits. As Microsoft says, Windows 10 is built for modern IT, offering advanced features for security, manageability and new experiences for the business users driving the digital transformation inside of the corporate networks.
This talk will cover the most important (and most expected) Windows 10 new and improved features for enterprise along with the best additions for business users.
How Intuit Monitors Connectivity to AWS ThousandEyes
Presentation by Daniel Shanahan, Staff Network Performance Engineer @ Intuit on how they rely on ThousandEyes to monitor connectivity and infrastructure performance to AWS
TechWiseTV Workshop
(Original Webinar May 11, 2016, replay: http://cs.co/9005BoG6c
Cisco recently introduced Enterprise Network Functions Virtualization (NFV) as part of the digital network architecture: an architecture that allows you to transform your business to innovate more quickly, simplify operations, and reduce risk.
In this 60-minute workshop, we will deep dive into the technology behind Cisco Enterprise NFV. You’ll learn about the four components—orchestration and management, virtual network functions, virtualization layer, and the underlying hardware—and how all the components work together to provide a custom-fit solution for the enterprise. You will also see a demo of Enterprise Service Automation (ESA), the software-defined networking application that makes NFV all the easier for you to adopt.
Cisco Enterprise NFV will transform the way you think about the network and its services.
Watch the Workshop Replay: http://cs.co/9005BoG6c
Animation: 'Fundamentals of Enterprise NFV': http://bit.ly/ENFV_FUN
Watch the TechWiseTV DNA Episode, Part 1: https://youtu.be/TzGpNEfvMC8
Part 2: https://youtu.be/314-NyizsCA
Getting the Most Value from Your Aviatrix Controller & GatewaysKhash Nakhostin
The Aviatrix AVX Software-Defined Cloud Router establishes an abstraction layer between the public cloud provider’s networking primitives and the application to simplify the creation of logical cloud networks and services for hybrid connectivity, data security, multicloud connectivity, monitoring and troubleshooting. The solution consists of two components: Aviatrix Controller; and the Aviatrix Gateways, all of which are deployed in your VPCs or the on-premises environment.
Seven Criteria for Building an AWS Global Transit NetworkKhash Nakhostin
Global Transit Network architecture is critical to the success of your AWS cloud deployment. Implemented correctly, a Global Transit Hub enables traffic to securely flow from on-prem to VPCs, or from VPC to VPC, in a way that minimizes complexity and cost and maximizes agility and availability. Implemented poorly, it becomes a choke point that is time-consuming – and costly – to maintain and troubleshoot.
What You Need to Know About Operationalizing Your AWS Transit HubKhash Nakhostin
You’ll see a demonstration of the best practices we’ve gleaned from working with operations teams, who all require:
Visibility. Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details?
Deep Analytics. Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools?
Monitoring and Troubleshooting. Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues?
Alert Management. When issues do occur, what real-time alerting is available?
Securing Your AWS Global Transit Network: Are You Asking the Right Questions?Khash Nakhostin
Now that you’ve designed and implemented your Global Transit Network, it’s time to revisit one of those seven considerations: security. What are the right questions to start asking to verify that your security posture is adequate for your AWS cloud environment?
Your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? Unfortunately, even this is not the right starting question. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options.
How to Quickly Implement a Secure Cloud for Government and Military | WebinarPLUMgrid
In this webinar see how Awnix meets your needs with its Secure Private Cloud products and services through a live demo and technical deep dive of common use cases.
Andrea Di Lecce, IT Technical Project Manager at Cisco, describes how Cisco IT uses ThousandEyes for insights into the Cisco WAN, CDNs like Akamai, customer-facing apps like WebEx and SaaS apps like Salesforce.
Leveraging the JSON API as a Self-Service ToolZenoss
Presented by Portland GE's Chad Beers (Enterprise OPS, PGE) and Anthony Thayer-Osborne (Enterprise OPS, PGE).
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
There is a lot of talk now around the term Service Mesh. The hype is high and the promise is real. The problem is that there is not really a good definition of what service mesh really is. In this talk we are going to review the problem service meshes are trying to solve, name the core components that make up a service mesh, and discuss the benefits an organization can receive by implementing this new technology.
Torusware accelerates performance-critical software, whether running on premises or in the cloud (AWS, Azure ...).
Speedus is Torusware product for accelerating applications in a non-intrusive way through optimizing BUS (intra-server) and LAN (Local Area Network) communications for the enterprise, cloud and big data.
Successfull track record both on financial services and start-ups accelerating trading applications, Docker, Redis, MongoDB, Spark, memcached, MySQL, PostgreSQL, ActiveMQ, ZeroMQ, Qpid, ElasticSearch, Solr... and more to follow.
Zenoss' own Nick Turner (Director, IT Operations) and Jacob Keith (Deployment Architect) present Zenoss as a Service: How to Get There.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Windows 10 Creators Update: what’s on tap for business users - Ionut BalanITCamp
The next version of Windows 10 is not just for the gamers and digital content creators, business users will have also a number of benefits. As Microsoft says, Windows 10 is built for modern IT, offering advanced features for security, manageability and new experiences for the business users driving the digital transformation inside of the corporate networks.
This talk will cover the most important (and most expected) Windows 10 new and improved features for enterprise along with the best additions for business users.
How Intuit Monitors Connectivity to AWS ThousandEyes
Presentation by Daniel Shanahan, Staff Network Performance Engineer @ Intuit on how they rely on ThousandEyes to monitor connectivity and infrastructure performance to AWS
TechWiseTV Workshop
(Original Webinar May 11, 2016, replay: http://cs.co/9005BoG6c
Cisco recently introduced Enterprise Network Functions Virtualization (NFV) as part of the digital network architecture: an architecture that allows you to transform your business to innovate more quickly, simplify operations, and reduce risk.
In this 60-minute workshop, we will deep dive into the technology behind Cisco Enterprise NFV. You’ll learn about the four components—orchestration and management, virtual network functions, virtualization layer, and the underlying hardware—and how all the components work together to provide a custom-fit solution for the enterprise. You will also see a demo of Enterprise Service Automation (ESA), the software-defined networking application that makes NFV all the easier for you to adopt.
Cisco Enterprise NFV will transform the way you think about the network and its services.
Watch the Workshop Replay: http://cs.co/9005BoG6c
Animation: 'Fundamentals of Enterprise NFV': http://bit.ly/ENFV_FUN
Watch the TechWiseTV DNA Episode, Part 1: https://youtu.be/TzGpNEfvMC8
Part 2: https://youtu.be/314-NyizsCA
Network Function Virtualization (NFV) BoF, by Santanu Dasgupta.
A presentation given at the APNIC 40 APNIC Network Function Virtualization (NFV) BoF session on Tue, 8 Sep 2015.
Aricent offers comprehensive WLAN/Wi-Fi testing services to ensure that the devices work seamlessly in any kind of deployment. Our WLAN testing offering portfolio - including system validation and test automation framework, along with a state-of-the-art Wi-Fi test lab - helps our clients improve quality, reduce cost and accelerate time-to-market
Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...Eric Sloof
IT is undergoing a transformation. The current ‘accidental architecture’ of IT today increases procurement, management costs, and complexity while making it difficult to meet customer service level agreements. This makes IT less responsive to the business and creates the perception of IT being a cost center. IT is now moving towards a ‘private cloud’ model, which is a new model for delivering IT as a service, whether that service is provided internally (IT today), externally (service provider), or in combination. This new model requires a new way of thinking about both the underlying technology and the way IT is delivered for customer success.
While the need for a new IT model has never been more clear, navigating the path to that model has never been more complicated. The benefits of private clouds are capturing the collective imagination of IT architects and IT consumers in organizations of all sizes around the world. The realities of outdated technologies, rampant incremental approaches, and the absence of a compelling end-state architecture are impeding adoption by customers.
This new ‘private cloud’ model, which is a new model for delivering IT as a service, whether that service is provided internally (IT today), externally (service provider), or in combination. This new model requires a new way of thinking about both the underlying technology and the way IT is delivered for customer success.
By harnessing the power of virtualization, private clouds place considerable business benefits within reach.
Cisco and EMC, together with VMware, are putting you on a new road to greater efficiency, control and choice. A faster road to unprecedented IT agility and unbounded business opportunities. With the Virtual Compute Environment’s Vblock experience.
With uCPE/SD-WAN taking center stage in enabling software-defined Cloud services to enterprise branch offices globally, this session will provide a uCPE review from a solution, deployment and reference design standpoint.
Speaker: Sab Gosal, Segment Manager
Network Platforms Group (NPG), September 2018
Automatic Integration, Testing and Certification of NFV in China MobileOPNFV
Qiao Fu, China Mobile, Liang Gao, Huawei
As Operators expand their deployment of NFV, automatic integration, testing and compliance certification become more and more important. In this speech, we would like to share our experience and progress in the China Mobile OPNFV Testlab on an automatic system of integration, testing and certification. This system takes fully use of OPNFV opensource tools, including installers such as Compass, testing such as Functest and Yardstick, compliance testing such as Dovetail. Such automatic system extremely decreases the human cost of Operators when deploying and testing the NFV cloud before large scale deployment.
This session will cover new and upcoming innovations to our ISR4K routing platform, as well as introduce a new solution that simplifies operations and redefines architecture at the branch.
vfirewall or virtual firewallFramework is a reusable high performance DPDK optimized security solution developed to run on Intel x86 based platforms that can be used by Network Equipment Manufacturers (NEMs) to develop customized Virtual CPE (vCPE), Firewall or IDS/IPS solutions for network operators.
Cisco Virtualized Multi-tenant Data Center solution (VMDC) is an architectural approach to IT which delivers a Cloud Ready Infrastructure. The architecture encompasses multiple systems and functions defining a standard framework for an IT organization. Standardization allows the organization to achieve operational efficiencies, reduce risk and achieve cost reductions while offering a consistent platform for business.
Introducing ONAP for OpenStack St Louis Meetupdjzook
An introduction to the Open Networking Automation Platform (ONAP) a new Linux Foundation Project for SDN/NFV, as presented to the OpenStack St Louis Meetup on June 20, 2017
This hands on workshop for OpenContrail will be led by Sreelakshmi Sarva & Aniket Daptari.
This is a labs session so we will have hard RSVP limits. Please RSVP only if you are confident that you will be able to attend.
About Sreelakshmi Sarva
Sree is currently working as part of solution engineering team at Juniper’s Contrail team. She is responsible for delivering & managing SDN solutions & partnerships relating to Contrail. She has been with Juniper for the last 13 years working on various Routing, Switching, Network programmability & virtualization platforms. Prior to Juniper, She worked at Nortel networks in the Systems Engineering group. Sree received her Masters in Computer Science from University of Texas at Dallas and Bachelor’s in Computer Science from India.
About Aniket Daptari
Aniket is currently working as part of Juniper Networks' Contrail Cloud Solutions team. He is responsible for delivering SDN solutions and technology partnerships related to Contrail. He has been with Juniper for the last 3 years working on various Network programmability & virtualization platforms. Prior to Juniper, he worked at Cisco Systems in the Internet Systems Business Unit (Catalyst 6500). Aniket received his Masters in Computer Science from University of Southern California and a graduate certificate in Management Science and Engineering from Stanford University.
Course Abstract
This session will be the first of a series of OpenContrail hands-on tutorials for developers who want to get deep into OpenContrail code.
This “Basic OpenContrail Programming” Hands-on Session will focus on making developers proficient in writing and contributing code for our OpenContrail Project.
Session will cover the following areas
1) Contrail Overview
· Use Cases
· Architecture recap
2) Contrail Hands on
· Demo + Hands on - Configuration , VN, VM, Network Policies etc
· DevStack introduction
Future-Proofing SD-WAN: Building on Open and Cost-Effective uCPEEnea Software AB
The rise of whitebox has given enterprises and service providers unprecedented ability to build custom solutions without being reliant on one vendor. With rising adoption of SD-WAN, both are turning to uCPE as a foundation to SD-WAN solutions built specifically for their needs.
This webinar will look at the significance of “openness” in SD-WAN offerings and the truth of just how “universal” most uCPE’s are. It will examine the need for interoperability and the steps vendors are and aren’t taken to enable it. Finally, it will address the role of service integrators, service providers, and enterprises as they all work to deploy SD-WAN with uCPE.
Presenters:
Karl Mörner | VP Product Management | Enea
Roy Chua, Founder | Principal | AvidThink (formerly SDxCentral Research)
This webinar will cover:
-Why building custom edge and SD-WAN solutions is critical for enterprises and service providers
-How uCPE is the foundation for these customized solutions and why it improves the overall economics of the edge
-Why an open and flexible edge platform is required and how uCPE fulfills that requirement
-Why scalability is needed to for cost-effectiveness and how it can be achieved
-The requirements to make deployment, configuration, management and VNF onboarding effortless
View the On-Demand Webinar copy>> https://www.sdxcentral.com/resources/sponsored/webinars/enea-future-proofing-sd-wan-ucpe/
Similar to WWT: NFV Solutions Presentation from Cisco Live 2017 (20)
Mark Wall, Practice Lead, Application Delivery for World Wide Technology delivered this presentation at F5 Agility.
Description: Automation and orchestration is a hot topic but with so many different aspects, it can be overwhelming to take those first steps and stay on course. This session will cover how to get started with F5 automation using F5 iControl with Postman, specific F5 use cases solved with Ansible and integration into other platforms such as Phantom Cyber, Cisco Cloud Center and Service-Now.
Transcript of World Wide Technology (WWT) TEC37 webinar focused on deploying and managing Windows 10, including what tools will be needed to deploy OS patches and updates. Panelists include Wendell Layne, WWT’s end-user computing product manager, Steve Adams, partner technology strategist for Windows and devices from Microsoft; Dan Huber, a mobility solutions architect for WWT focused on digital experience; Kelly Ryan, a solutions architect for WWT focused on virtualization and Darrin Dennis, a solutions architect for WWT focused on all things Windows server infrastructure related.
Topics covered include:
- How to effectively manage physical and virtual desktops as well as mobile devices without the need for disparate systems
- New ways to deploy OS updates using Windows Insider Preview, Windows Current Branch and Current Branch for Business
- How to use patch management to lock down Windows 10
- VDI opportunities new to Windows 10
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1World Wide Technology
World Wide Technology (WWT) TEC37 webinar focused on deploying and managing Windows 10, including what tools will be needed to deploy OS patches and updates. Panelists include Wendell Layne, WWT’s end-user computing product manager, Steve Adams, partner technology strategist for Windows and devices from Microsoft; Dan Huber, a mobility solutions architect for WWT focused on digital experience; Kelly Ryan, a solutions architect for WWT focused on virtualization and Darrin Dennis, a solutions architect for WWT focused on all things Windows server infrastructure related.
Topics covered include:
- How to effectively manage physical and virtual desktops as well as mobile devices without the need for disparate systems
- New ways to deploy OS updates using Windows Insider Preview, Windows Current Branch and Current Branch for Business
- How to use patch management to lock down Windows 10
- VDI opportunities new to Windows 10
Transcript of World Wide Technology (WWT) TEC37 webinar focused on customer experience for retail, including guest panelist, Willis Hill, VP Retail Information Technology for Caleres, Inc. (Famous Footwear). In this TEC37 session, Hill discussed how his company is transforming their IT operations to align to the business and empower an omni-channel customer experience driven by technology. WWT panelists Matt Sebek, business development director of WWT Asynchrony Labs; Tim Brooks, a principal consultant with WWT’s Big Data Practice focused on retail; and Neil Anderson, WWT’s mobility and access lead also covered the role mobility, analytics and mobile application development can play to help stay in front of the competition.
How often do you learn that you must deliver a new capability or correct a network issue and it needed to be implemented yesterday? Do you get extra resources to make it happen? Do these asks cut into your personal time?
Now, imagine a world where you can not only easily execute these asks but one where you can also prove to your leaders how the network can be a competitive advantage and help your company make money.
The latest World Wide Technology (WWT) TEC37 webinar focuses on the operational challenges in the data center that can be addressed by software-defined networking (SDN), including how WWT is implementing SDN, as well as the cost benefits of adopting a programmable network.
World Wide Technology walks through how Cisco ONE can enable businesses to maintain customer service and meet the needs of end users while continuing to improve hardware
stacks. Cisco ONE can help identify how many licenses
you own and how effectively they are being utilized.
Every three to five years, IT departments are forced
to throw away 40 to 60 percent of their investments to
acquire assets and software to run it because of
changes in hardware. With Cisco ONE, now you can
procure hardware and software separately and own
and maintain your software licenses perpetually.
Learn more about this game changing program from Cisco by visiting wwt.com.
World Wide Technology presentation that focuses on Cisco Intelligent WAN (IWAN) and how it can help transform your business. Learn how industries have used IWAN to overcome business challenges associated with increased demands on bandwidth. For example, one institution saw a 30 percent improvement in test scores after adopting IWAN to speed their network. Presentation offers real-world examples and is geared toward those needing a high-level overview of IWAN.
WWT Webinar - The Role of Adoption Services in Tech DeploymentsWorld Wide Technology
If you are feeling dejected because no one in your organization is using the applications that your team has spent countless cycles to spin up for your users, what can you do to improve user adoption? The answer is simple. World Wide Technology. We have developed a proven methodology to improve utilization of technology purchases and create quick adoption within your organization. In this presentation, Sean McDonald, WWT Adoption Services Practice Lead provides an overview on how to architect comprehensive post deployment utilization strategies to ensure you are maximizing your investment, including a review of a customer use case example that will demonstrate how all roles in an organization can benefit from these strategies, from the CXO to end users.
Presentation from 9/24/15 webcast presented by WWT Mobility and Access Lead Neil Anderson, on how deploying a Cisco Intelligent WAN (IWAN) strategy will be critical to meet the demands on your business. Bill Thompson and Laks Vijayarajan, technical solutions architects in WWT’s Advanced Technology Center (ATC), covered technical best practices to ensure a successful IWAN deployment.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
2. W. Brooke Frischemeier
Product Line Manager NFV – Cloud Solutions
• WWT for 8 months building services to ensure
customer and partner success when deploying
NFV solutions
• 16 years at Cisco: Virtualization, Solution
development, Switching, Routing, Optical
• Other Experience: FORE Systems and AT&T Bell
Labs
Loves to mountain bike and play bass at jam
sessions…impatiently awaiting for the Last Jedi
movie
…
Brooke.Frischemeier@wwt.com
(919) 360-3840
3. Network Function Virtualization
Virtualization is the conversion of purpose-built-hardware appliances to
software code, VNFs, that runs on general purpose, less expensive, servers
FUNCTIONS Running
On General Purpose
Sever
Router Switch
Firewall
Video
Server
Voice
Gateway
Content
Engine
With virtualization, new challenges arise!
NFV is a framework for deploying services in a virtualized world
Orchestration
NFV Infrastructure (NFVI)
VNFs - Services
NFV
5. NFV Solutions Is a Multi-vendor Play
The key question is no longer what do your products do xyz
Infrastructure
Services
Orchestration
1. Single Vendor Stack
x
x
x
4. Multivendor w/ Unified
Orchestration
5. Fully Decoupled NFV
x y
1 2
A
1 2
A
x
2. Multivendor VNF
A B
x
x
3. Decoupled NFVI
x
1 2
x
Customer Desire
B B
But can they integrate who can they integrate with
Success takes a special team, a special partner!
7. Complete Solution Experience Services To Enable Your Success
WWT Multi-Vendor Offer Portfolio
Hardware
IT Infra, Security
Collab, Media
WAN, LAN
Routing, Optical
Mobility
Long List Of HW
Partners
Software
Orchestration
Virtualization
Automation
Monitoring
-
Adoption Services
Full Stack SW
Partners
Proof Of Concept
Solution Validation
Advanced Technology
Center
Solution
Customization
Mobile Apps
Back-End Automation
User Portals
Web Development
Orchestration
Customization
Asynchrony Labs
Supply Chain &
Installation Mgmt.
Custom-Secure Staging
and Burn In
Inventory Mgmt.
Custom Shipping
-
Install/Turn-up
Integration
Technology Center
&Facilities Team
Continuous
Solution Validation
8. Support For All Operation Models (Cisco Partner Example)
3rd Party
Engineering
Cisco
Engineering
Product
Development
Customer
Dev-Ops
Pod
Delivery & Install
Customer
Download
Support
Cisco TAC Support
Cisco-WWT Solution PLUS Multi-Vendor Support
WWT Engineering
Solution
Enablement
Supply Chain,
Staging, Burn-in
CI/CD aaS
Solution
Validation &
Integration
Full Stack Solution Validation
Common Test Procedures Across
All Development Avenues
9. Many Solutions Across SPs And Enterprises
Mobility
4G, 5G, WiFi
Infrastructure
Orchestration
Service
Service
Portal
Wifi
Mobile Data
Mobile Backhaul
Service Gateway
Mobile Mgmt.
Entity
Packet Gateway
Billing
Analytics
Provisioning
Mobile
Orchestration
Policy
Monitoring
Subscriber
Management
Authorization
Accounting
Authorization
Acquisition
Distribution Production
Consumer
Media
Infrastructure
Orchestration
Service
Software-Defined WAN
(IWAN, Viptella, Meraki) vCPE, Security,
WAN Optimization
Firewall
WiFI WAN Opt BYOD Collaboration
SaaSCryptoVPN
Infrastructure
Orchestration
Service
Service
Portal
NFV1
EMS-VNF
NFV1
EMS-VNF
NFV1
EMS-VNF
NFV1
EMS-VNF
10. WWT NFV Value Proposition
WWT enables multi-vendor flexibility
WWT eliminates risks
WWT uses a flexible and easy to use interaction model, competitive pricing
WWT provides faster time to outcome
WWT delivers custom solutions targeted at “your” customers
12. Support For All Operation Models (Cisco Partner Example)
3rd Party
Engineering
Cisco
Engineering
Product
Development
Customer
Dev-Ops
Pod
Delivery & Install
Customer
Download
Support
Cisco TAC Support
Cisco-WWT Solution PLUS Multi-Vendor Support
WWT Engineering
Solution
Enablement
Supply Chain,
Staging, Burn-in
CI/CD aaS
Solution
Validation &
Integration
Full Stack Solution Validation
Common Test Procedures Across
All Development Avenues
13. Flexible Engagement Model
WWT Provides Dynamic Resources to deal with both planned and unplanned events
WWT Run
WWT Hosted
Customer Run
Customer does the bulk of the integration and offloads tasks to WWT
WWT performs initial integration then trains and transitions to the Customer
Simple Tests
Orchestration x
InfrastructureA
Service 1
Orchestration y
InfrastructureB
Service 2
Complex Tests
Customer moves from simple POCs to full solution validation
WWT performs component validation and as resources change the full stack
14. Multi-Vendor Carrier Grade NFV Test Facility
Over $1M of Partner Investment
HW Vendor
Certification
VNF/Service
Validation
Lab On
Demand
Performance
& Scale
Testing
Proof
Of Concepts
Editor's Notes
Virtualization is the conversion of purpose-built-hardware appliances to software code that runs on general purpose, less expensive, servers.
We call this software Virtual Network Functions (VNFs).
<click>
With virtualization, new challenges arise!
NFV is a framework for deploying services in a virtualized world
Over the years has earned the trust of 100s of partners, with gold statuses, platinum statuses, black statuses and so on.
All of that status has been earned by creating a strong foundation of working well with our customers and partners, earning an endless list of certifications, partnering to design the end to end solutions and also deploying them.
<click>
And that’s not just hardware infrastructure. As we pass through this decade we have seen a big swing to software value across a full stack, where automation is now a critical business vale that can often define success or failure.
One last thing I wan to to mention here is our SW adoption services. Many of our customers buy all you can eat multi-year SW licenses, sometimes referred to as ELA’s. With ELAs, the adoption part can be tricky. WWT adoption services help you understand and train you the value of the different SW services/features that suddenly help you come available.
<click>
In other words, we have complete solution skill and that skill set is going to help you with two things. First, we’ll always be there to help you come to terms with the frustrating task picking out the right vendors to deliver what you need, and second, we can help you do it faster, because multi-vendor solutions are our bread and butter, or in other words, it’s part of the core of what has made us successful.
<click>
But, let’s not stop there, because that’ just a prerequisite. The other key component is services.
First, Let’s start with solution validation. In the Advanced Technology Center is where we have honed our multi-vendor expertise. In the ATC we have over 300 racks of L1 through Layer 7 automated solutions, on-demand accessible by our easy to use, secure, customer portal. With the ATC we can speed up your time to delivery in two ways.
First, there are Proof of Concepts were we can instantly deliver pre-tooled demos, as well as custom demos, sandboxes and training.
Second, there is custom Solution Validation, where we fix the issues from the previous slide and work with you on an on-going basis to validate and roadmap each piece of your solution. We can even help out with license management.
<click>
Next, we can perform a number of customizations. This lead by two teams,
First, there is our architecture teams that work and run the ATC labs. They can perform numerous tasks across many different solutions. One example is automation. There are are a number of good tools out there, but they seldom do anything straight out of the box. Our architecture teams will work with you to understand needs and goals preconfigure the automation tools to run your specific tasks and services.
Next there is our Asynchrony Labs (ASL) team. Who performs a number of customization and business tasks. For example, User Portals, Web GUIs, Mobile applications and then they take all of this and the perform the difficult task of backend automation and integration.
They are also a fully Agile team that performs training in successful dev-ops and Agile processes.
<click>
Last but not least is our Integration technology Center, the ITC where we perform supply chain/inventory management, custom secure staging, custom functional testing, burn in, racking, configuration and custom delivery.
Furthermore, they excel in a 0-day handoff directly from the ATC validation team.
…and let’s not forget Installation and turn-up provided by Our Facilities management team.
At the end of the day operational flexibility and agility is of the utmost importance.
When two or more companies deploy similar solutions from the same vendors, what is there to differentiate them?
Time to market with new features that literally make their service more user appealing and better performing in one way or another.
The WWT Advanced Technology Center is a place where all of this integration comes together and solutions can be validated and revalidated from release 1.0 to release 100.0.
WWT van perform all of the testing or the customer can similar or complimentary tests, using secure remote access, in WWT facilities.
These validations can be rolled out via WWTs Integration Technology center in pre-staged, burnt-in Pods that WWT installs, or in the case of SW-only, via CI/CD systems
At WWT we
Reduce the risk of deploying multi-vendor solutions.
We do it fast
We customize solutions to your specific needs
We work in a n easy to use, flexible, interaction model that can also change as your needs do.
At the end of the day operational flexibility and agility is of the utmost importance.
When two or more companies deploy similar solutions from the same vendors, what is there to differentiate them?
Time to market with new features that literally make their service more user appealing and better performing in one way or another.
The WWT Advanced Technology Center is a place where all of this integration comes together and solutions can be validated and revalidated from release 1.0 to release 100.0.
WWT van perform all of the testing or the customer can similar or complimentary tests, using secure remote access, in WWT facilities.
These validations can be rolled out via WWTs Integration Technology center in pre-staged, burnt-in Pods that WWT installs, or in the case of SW-only, via CI/CD systems
With our partners, Cisco, Intel, Red Hat and Ixia we are developing an NFV test facility to sell a range of services that we will discuss in the next section!