ATE-CL328 - Simplify and Secure Your Network with Cisco Backbone SwitchingCustomers and IT organizations face many challenges today, including mobility growth, operational complexity, and security concerns. IT organizations need more efficient operations and better support for their business priorities.
Cisco Unified Access provides a single network infrastructure that can enable innovative and connected experiences. In this webcast, learn the latest on Cisco backbone switching, which is an integral part of Cisco Unified Access. You will get details on how to use Cisco backbone switching products (including the newest Catalyst 6800 series) and technologies to improve business efficiency and security, as well as lower TCO.
• Industry trends and Cisco backbone switching portfolio update• Additional Cisco switching innovations• Deployment considerations• Live Q&A
For More Information
Visit the Cisco Unified Access Solutions Center to get additional information, download product and solution material, and more.
UCS-4792 - UCS Security Engineering Overview (2012 San Diego)We will outline key security features and best practices for UCS. This is a session broken into two key areas between the UCS control plane (processes, open ports, organizational boundaries, access methods, etc.) and the UCS data plane (VLAN groups, FEX isolation, DisJoint L2 operations, VM-FEX for isolation to the VM, etc.) and finish up with certification status.
ATE-CL501 - Bring Your Own Device (BYOD) & Unified Workspace (2013 Melbourne)The Cisco BYOD Smart Solution transforms the workspace, providing end-to-end BYOD lifecycle management with secure data access and a more productive end-user and IT experience that meets the needs of a broad set of work styles and application needs.
The solution secures data with unified policy, delivers uncompromised experience with powerful collaboration tools native to the device, and simplifies operations with proactive management. The presentation covers the Cisco Architectural approach for BYOD, BYOD Smart Solution, and concludes with a Case Study on how Cisco leverages BYOD internally.
For More Information
Visit the Cisco Smart Services virtual resource center to get additional information, download product and solution material, and more.
CIN-WS177 - Scale Your Knowledge and Your Network: Cisco BYOD CVD 2.2 System DesignView this technical deep-dive workshop to hear a pre-brief about the newly updated Cisco Validated Design (CVD) 2.2 for the BYOD Smart Solution published in November, 2012. This BYOD CVD 2.2 release will expand on the foundation for the Cisco BYOD Smart Solution and extend the solution with new capabilities in the Branch Office, highlighting new WLAN architectures such as FlexConnect, and more. Join our experts Srinivas Tenneti, Cisco technical marketing engineer, Fernando Macias, Cisco Business Architect and Nelson Figueroa, Cisco Technical Engineering Leader, as they dive into the BYOD CVD 2.2 release.
ATE-CL326 - Architecting a Modern Approach to Real Time Business with Vblock Specialized System for SAP HANA (2013 Orlando)Learn how VCE’s new Specialized System is enabling customers to get SAP HANA software up and running in production more smoothly, quickly, and reliably in order to capitalize on the benefits of real-time insights to help address fleeting business opportunities faster.Takeaways:
* Identifying transformational opportunities
* Planning an SAP HANA installation
* Advantages of Vblock Specialized System
For More Information
Visit the VCE virtual resource center to get additional information, download product and solution material, and more.
GENSSN-1616 - Super Session – Intelligent Cybersecurity for the Real World (2014 Melbourne)Driven by market trends in cloud, mobile and the Internet of Everything, technological change is accelerating at lightning speed with the network at the core. Security is no different. Attackers are innovating faster than the industry, finding new attack vectors to exploit their targets and creating significant new security challenges. Join Christopher Young for a discussion on how these phenomena have driven defenders to challenge today’s security assumptions and how Cisco’s new security model and offerings can address our customers’ biggest security problems.
CP-1006 - Network Models and the Network ArchitectOne of the very first things any aspiring network engineer learns is the OSI seven layer model -- but once it's learned, it's often left in the background, another trivia item that doesn't seem to be much use in the real world. Leaving models in the background is, however, a mistake; these are some of the most useful tools the network engineer has to classify and understand protocols and network operation. This session will discuss the history behind the popular seven layer model, and then move into some other models network engineers might find useful, including some you may never have seen before.
Cisco Press book: The Art of Network Architecture: Business-Driven Design by Russ White and Denise Donohue
ATE-CL346 - Build Your Own Innovative Support Applications leveraging Cisco Support APIs (2014 San Francisco)How are APIs delivering both a competitive and support edge to a growing number of companies and IT professionals? A recent survey by Venture Beat found that more than 85% of large companies will have API programs in the next 5 years. Join Alok Patel and colleagues from the Cisco Smart Web Technology Group to explore how –
1. The market landscape of APIs for Enterprise Customers and Channel Partners is changing
2. APIs enable you to pull vital Cisco support data into your own systems on demand
3. Companies are using APIs to unlock business innovation and boost their bottom lines
This session covers the “what,” “why” and “how” of Cisco APIs now available to you. We will spotlight lessons learned, best practices, and exemplary API strategies adopted by Cisco partners and customers.This session also features live demonstrations of Cisco Support APIs, and illustrates how companies are using APIs today to both innovate support solutions and advance business priorities.
For More Information
Visit the Cisco Services Solutions Center to get additional information, download product and solution material, and more.
ATE-CL327 - Security Defined Networks: Deploying Security Defined Networks in the Real World (2013 Orlando)Today’s advanced network security threats are growing in complexity, scale and scope. Highly co-ordinated resources and activities are being leveraged to assault today’s networks with unprecedented speed and agility—a new paradigm in network security monitoring is required in order for organizations to adapt and respond to these threats.
In this presentation, Net Optics VP of Technology & Solutions Sharon Besser defines the next generation approach to security utilizing security-centric SDN, and provides concrete steps organizations must take with their network security and monitoring.
For More Information
Visit the Net Optics virtual resource center to get additional information, download product and solution material, and more.
BRKGEN-2999 - Autonomic Networking (2014 Milan)Autonomic Networking is an emerging, fundamentally new way to operate networks: Network elements configure themselves, and operate largely independently. There is minimal dependency on operators and NMS systems. This session introduces the fundamental concepts of Autonomic Networking, and explains the current development status.
CIN-WS205 - Activate—Identity Services Engine 1.2Learn about the Cisco Identity Services Engine and the new enhancements available with its most recent release—ISE 1.2. The Identity Services Engine provides a comprehensive, all-in-one solution to manage and maintain network access and policies—ensuring consistent enforcement across wired, wireless, and VPN networks. During this online event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors. Join Cisco experts Sanjay Raja and David D’Aprile for a closer look at ISE 1.2, and all the advantages it can bring your business.
ATE-CL412 - Application Centric Infrastructure (ACI) (2014 Milan)Learn how Application Centric Infrastructure is ushering in a new era of simplicity and automation, and driving the next generation of data center infrastructure.
For More Information
Visit the Cisco Switching Solutions Center to get additional information, download product and solution material, and more.
ATE-CL408 - Cisco Unified Fabric: Delivering Architectural Flexibility (2013 London)The confluence of a number of trends, including cloud computing, video, virtualization / workload mobility, the data deluge brought on by the “Internet of things,” is driving significant change in the data center. Customers are looking for flexible data center architectures that will adapt to these changes as their business evolve to take advantage of these trends. Cisco’s Unified Fabric and Nexus portfolio deliver this flexibility and continue to lead the industry with a number of leading innovations that enable architectural flexibility for general, virtualized and cloud deployments.
What are these leading innovations and how they enable architectural flexibility that extends from the server to the cloud will be discussed.
Visit the Cisco Switching virtual resource center to get additional information, download product and solution material, and more.
ATE-CL401 - Delivering a Future Proof Service Orientated Infrastructure to Your Business (2013 London)The consumption model for IT is changing rapidly to include many services delivered by the Cloud. To remain competitive the challenges facing organisations today include time to market for services and products, adaptability and flexibility. The key to evolving a resilient IT strategy is to provide an infrastructure that delivers, non-disruptive operations, immense capability to scale, workload independence, efficiency and automation. In this session Cisco and NetApp will discuss how their industry leading joint FlexPod solution is enabling their customers and cloud service providers to make this move to a future proofed, service orientated infrastructure. Using the Cisco Validated Design (CVD) framework to de-risk implementations and accelerate solution delivery, this session will cover technology areas including utilising pooled computing assets, creating virtualised resource pools at scale, managing elasticity on demand, introducing automation for policy, application awareness and mobility, secure multi tenancy architecture and metered billing.
Visit the NetApp virtual resource center to get additional information, download product and solution material, and more.
UCS-4797 - Cisco Intelligent Automation for Cloud (UCS) (2012 San Diego)Cisco Intelligent Automation for Cloud is a self-service provisioning and orchestration software solution for cloud computing and data center automation. This session will provide a detailed product overview, followed by an instructor led demonstration of the software suite. We will build off the UCS Manager capabilities describing how this solution automates key data center functions and actions.
ATE-CL338 - Scale your Network Security and Monitoring infrastructure to Keep up with Advanced Targeted Attacks and Big Data Flows (2014 San Francisco)Even as network data has exploded in volume, velocity and variety, network security and monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale, and accommodate continuous monitoring in consolidated physical, virtual and cloud based datacenters. The network’s increasing speed and rapidly growing complexity (e.g. virtualization, and tunneling with encryption), pose challenges for IT network and security professionals trying to manage and secure network infrastructure. How does one architect a scalable security & monitoring architecture to withstand the test of time while ensuring adaptability to evolving business needs? The IT organization as a whole needs to ensure end-to-end visibility and data access to meet and exceed business, network and application performance SLAs while keeping their infrastructure and data secure against continually evolving advanced and targeted attacks.
Join Tony Zirnoon, CISSP – Sr. Director Security Strategy VSS Monitoring, as he discusses:
1. Monitoring gaps and security vulnerabilities in today’s traditional network security and monitoring architecture
2. How to address those gaps and vulnerabilities without defaulting to a rip and replace approach
3. Proven best practices in architecting a future-proofed physical or virtual DC monitoring fabric for total network visibility
4. Learn how you can architect a defense-in-depth network security model that scales across converged networks (with real production deployment examples)
5. Future proofing your security infrastructure design and investments against the ongoing barrage of advanced security threats while maintaining high availability and agility to keep up with Big Data flows.
ATE-CL334 - Realize Faster Resolutions with Smart Call Home (2014 San Francisco)Start using the technology embedded in your Cisco devices to proactively monitor their health. Receive notification of events based on internal diagnostics with recommendations from Cisco's deep pool of Intellectual property. Realize faster resolution through automated TAC case creation for the most critical events. Topics will include supported devices and faults, deployment scenarios in and out of the datacenter, and configuration examples including UCS blades and rack servers.
For More Information
Visit the Cisco Services Solutions Center to get additional information, download product and solution material, and more.
ATE-CL508 - IoT Wireless Sensor Networks and Multi-Service Field Network Architecture (2014 Melbourne)Wireless sensor networks are the foundation for enabling the Internet of Things. Cisco has designed a field network architecture to provide IPv6 network services for Smart Grid and other industries. This session will provide an overview on how to build a multi-service, secure, scalable, and resilient Field Area Network (FAN). It will include case studies of customers who are servicing millions of smart meters using Cisco’s FAN architecture.
For More Information
Visit the Cisco Internet of Things Solutions Center to get additional information, download product and solution material, and more.
BRKPCS-2059 - ACI Impact on Physical Infrastructure Design and Deployment (2014 San Francisco)Adoption of Cisco’s new Application Centric Infrastructure (ACI) will require some changes to the way data center physical infrastructures are designed and deployed. Depending on the scalability, performance, and applications requirements, customers will need to determine the best physical infrastructure to accommodate a variety of spine/leaf network topologies options including ToR, EoR, and MoR leaf switches. In this session, Panduit examines the physical implementation requirements of an ACI deployment including how to design ToR, EoR and MoR network architectures for ACI, and strategies to simplify the deployment of this next generation architecture in order to help customers accelerate their path to ACI.In addition an overview of available services and product sets that help customers manage risk within the physical infrastructure by intelligently converging physical and logical systems to simplify the deployment will be presented.
GENKEY-1626 - Decoding Connectivity: Leading & Thriving in an “Internet of Everything” WorldThe benefits of connectivity have already changed our world and this is only the beginning. Carlos Dominguez, Senior Vice President of Cisco, brings the Internet of Everything to life in his fascinating keynote during Cisco Live 2013 Melbourne. Learn about what's coming and find your place in this exciting new world. Discover:
• What is the Internet of Everything? • How will it influence and change business – today and in the future? • What is the personal impact each of us will experience?
BRKPCS-2056 - See. Point. Click. Fix. Simplify Your Network with LiveAction (2014 San Francisco)Networks can be complex and difficult to manage, but with LiveAction they don’t have to be. In this session, you will learn how LiveAction simplifies network management. LiveAction is a network performance management tool with deep, rich visualization capabilities, QoS control, analytics, and automation. Attend this session to see how LiveAction can help you get the most ROI from your Cisco products and why it is available through the Cisco Global Price List. See. Point. Click. Fix.
BRKPCS-2058 - Forensically Uncovering Cyber Threats By Monitoring Behaviors (2014 San Francisco)Learn how Security Operation Centers are uncovering internal hosts communicating with botnets, machines participating in DDoS attacks and end systems performing unwanted data exfiltration. Since signature matching is ineffective at detecting many forms of malware, participants will learn how to leverage NetFlow and IPFIX to baseline behaviors and bring visibility to the active threats on the internal network. This session explains how to gain threat landscape clarity and how to avoid a sea of false positives. Learn best practices for leveraging Cisco ISE and Cisco AVC exports to provide richer contextual details surrounding a contagion.
BRKSEC-2042 - Web Filtering and Content Control in the Enterprise (2016 Melbourne)The adage 'HTTP is the new TCP' grows truer each day. With so many different applications and new services now running overtop common protocols like HTTP and HTTPS, filtering and inspecting web traffic becomes an ever increasing requirement for compliance and peace of mind. Cisco provides a wide array of different filtering technologies and products, but each has their own pros and cons, implementation success and pitfalls, strengths and weaknesses. Understanding what solution best fits your environment is tough balance between ease of use, scalability, troubleshooting and features. This class will cover Cisco's three primary Web filtering technologies (IronPort WSA, FirePower Appliances and Services and Cisco Cloud Web Security). Topics will include deployment strategies, scenarios, best practices and troubleshooting techniques.
BRKSEC-2111 - How to Defend Against Ransomware Attacks So You Don't Become a Hostage (2016 Cancun)Ransomware is the most profitable type of malware in history. All industries and companies are potential victims. If hit, you lose control of running your business, and face the dilemma of whether to pay the ransom or not. How do you prevent ransomware from getting into your network and taking you hostage? This session will go into ransomware characteristics, vectors they use to gain access into your network, how it encrypts your systems and files, and how it makes the ransom request. After dissecting the ransomware attack, the session walk through key architectural principles and capabilities to block the attack when possible, detect and contain if it does get in, and how to recover from an infection. This includes DNS layer security, endpoint security, email and web detection and analysis, and dynamic containment technologies. The session will include a demo showing ransomware attacks and how to thwart those attacks at different stages of the attack kill chain.
BRKIOT-1235 - Smart Cities – Concept to Reality (2016 Cancun)The goal of smart cities is to enhance the lives of residents through improved performance, efficiency and functionality. This is expressed through an increase in living standards, improvement of communities, and betterment of the overall people experience, join us in our journey and experience and learn how Cisco Connected Digital platform & Public Safety solutions can create a difference & help you & your City to be smart & connected. The Session will cover on Cisco Smart-City solution overview, Cisco Connected Digital Platform Architecture for Cities with real time demo of CDP from different city deployments & Cisco Public Safety Analytics Architecture and Dashboard solutions with demo
BRKCOL-2013 - Understanding how to make the most of your Cisco Jabber Deployment (2016 Cancun)Cisco Jabber enables core UC capabilities to allow users collaborate more effectively and efficiently. These include voice, video, IM/presence, voice messaging and the ability to launch web conferencing. This session focuses on deployment and configuration of Jabber features to ensure a successful deployment and mass user adoption. We will focus on delivering important features such as Persistent Chat Rooms, File Transfer, Desktop Sharing and show how Cisco Jabber can easily escalate to video and web conferencing for increased user experience and productivity. Finally we will focus on how Jabber can integrate with 3rd party applications such as Microsoft Office and Web browsers, and how to take advantage of the Custom HTML Tab feature where organisation web portals can be made accessible from Jabber
BRKSPG-3630 - Service Driven Network Automation - Powered by Tail-f (2016 Melbourne)Today’s network infrastructure is complex comprising of multiple fragmented domains. Each domain consists of multi-vendor network-elements with vendor specific interfaces and CLIs. Consuming the infrastructure to achieve an outcome is slow and complicated involving multiple EMS/NMS, ad-hoc scripting, complex functional device adapters, error-prone box-by-box manual configuration which are all best-effort and fire-and-forget approaches. Cisco NSO enabled by Tail-f removes this bottleneck by providing a horizontal platform sitting across the network infrastructure decoupling the Services from the infrastructure. NSO manages the infrastructure complexity and exposes the network intelligence via standards based YANG device models. Services, also modelled in YANG, leverage the well-defined device models to consume the infrastructure. This allows for surgical precision, automated and API driven services, transactional guarantees and instant activation of end-to-end Services. With NSO horizontal platform in place bringing new cross-domain and NFV services to the market is achieved in days/weeks.
BRKSEC-2664 - Cisco Sourcefire Advanced Malware Protection and ThreatGrid (2016 Melbourne)Today, the weapon of choice for attackers is malware. Targeted and cunning, advanced malware compromises environments from an array of attack vectors, takes endless form factors, launches attacks over time and can obfuscate the exfiltration of data. The Cisco Sourcefire Advanced Malware Protection (AMP) solution spans extended networks and devices to focus on threats across the full attack continuum - before, during and after - an attack.This session will provide the audience an overview of Cisco Sourcefire Advanced Malware Protection (AMP) solution - Advanced Malware Protection for Networks, and Advanced Malware Protection for Endpoints.
BRKSEC-1205 - Introduction to DC Security (2016 Melbourne)With IT departments increasingly centralising and virtualising all of their resources into the Data Centre Management and the Cloud, the security of those resources is becoming increasingly important. Security must permeate throughout applications, the virtualisation layer, compute, storage and network. Unfortunately, security is often left to a limited number of specialists, and understanding of the technologies used is often limited to those same experts. This session will outline how security can be propagated throughout the Data Centre Management and define how these technologies can work together to build a secure Data Centre Management and Cloud strategy for the enterprise. Topics covered will include Current Threats, Security Hardware and Software, Network Segmentation, Cloud Connectivity, Software Defined Networks, Data Centre Management Interconnects, Security Architectures and more. This session will provide an overview to anyone interested in how Security can be inserted in their Data Centre.
BRKCRS-2891 - Enterprise Network Segmentation (with Cisco TrustSec) (2016 Melbourne)This session provides an overview of the Cisco TrustSec Security Group Access (SGA) solution for Enterprise network segmentation and Role-Based Access Control. SGA allows for simplified network segmentation based on User Identity/Role and allows for secure access and consistent security policies across Wired/Wireless networks. We will cover SGA solution on the Catalyst, Nexus Switching and Routing (ASR1K/CSR/ISR) platforms, including converged wired/wireless with a focus on the deployment use cases in a campus, data centre & branch networks. The session covers an architectural overview of SGA and benefits of TrustSec role based policies, elements of Cisco TrustSec such as user identification with 802.1x, device identification, role classification using Security Group Tagging (SGT) and enforcement using Security Group Access Control List (SGACL). This session is for Network Architects, Pre-Sales Engineers and Technical Decision Makers. Previous knowledge or experience is recommended in campus design, Internet edge design, routing protocol design, and Layer 2 and Layer 3 switching.
BRKSPG-2518 - Cisco EPN Carrier Ethernet and Mobile Backhaul Architecture (2016 Cancun)This session will share a Carrier Ethernet and Mobile backhaul architecture proposal using the latest technologies including Segment Routing, EVPN, Unified MPLS, SDN & Microwave Adaptive Bandwidth. The goal is to achieve a zero-touch, self-protected, self-managed, and dynamic ECMP with flexible traffic engineering capability CE transport architecture. This new proposal will combine the advantage of the unified MPLS and nV solution together to build EPN transport network architecture.
DEVNET-1071 - Introduction to Tropo (2016 Melbourne)What is Tropo, how do you use it and what can you use it for? In this session, you'll learn how Tropo works, see some real-life examples, and learn how to create your own voice and SMS applications in minutes.
BRKSPG-2619 - Cisco Evolved Programmable Networks (2016 Melbourne)As competition in Carrier services market intensifies Service providers are challenged to make services more agile, simplify networks and reduce operational costs while growing the capacity.
Cisco Evolved Programmable Network (EPN) provides an open programmable network architecture covering both physical and virtual network resources. In EPN architecture SDN controllers and consecutively applications are able to orchestrate network resources and facilitate network telemetry analytics in real time to optimise operations, ensure high availability & avoid brownouts. Open APIs used in the Architecture bring the full automation and on-demand programmability to enable flexible resource & service allocation.
The session will provide an overview of use cases/applications to leverage EPN in Internet Infrastructure, Carrier Ethernet & Mobile Backhaul layers. It will also review a set of Open APIs available on Carrier routing platforms and guide on relevant SDN controllers/orchestration middleware to build flexible automated network. Lastly the session will include demonstration of the Opendaylight (ODL)-based application which is using the EPN.
BRKSEC-2693 - ELK for Enterprise IR Visibility (2016 Melbourne)Cyber Security presents an ever changing and increasing challenge to individuals, corporations and nation states. It is no longer a case of "If' or "whether" an organisation will be subjected to a cyber attack of one kind or another. Today's reality is that it has probably already occurred. Cisco uses the concept of an "Attack Continuum" to highlight that if an organisation is to respond effectively to this reality, it needs to be prepared in advance and know what to do Before, During, and After an attack.
BRKEWN-2007 - High Density WiFi Networks for Stadiums and Large Public Venues (2016 Melbourne)This session will cover the details required to successfully deploy high density WiFi within sporting and other large public venues. Many of the concepts, challenges, and strategies discussed in this session can be applied to high density networks in general, however this session has a focus on the sports and entertainment market. The attendee will get detailed information on the use of various required features such as RF profiles and how they are used to address common challenges within these environments. Other topics will include WiFi network consolidation, interference (detecting and finding, as well as commonly seen interference sources), client issues, and much more.
BRKCOL-2101 - Preferred Architecture and Design (2016 Melbourne)Cisco Preferred Architectures (CPAs) provide a concise set of recommendations and best practices to simplify the deployment of Collaboration and provide a foundational set of products and feature through a recommended deployment model that covers most market segments based on common use cases. This session will discuss the latest CPA Cisco Validated Design targeted for Enterprise Collaboration and highlight some of the recommendations and best practices contained in it. The Collaboration portfolio will be broken down into 4 discrete sub-systems, call control, edge, conferencing and applications and will offer concise, prescriptive recommendations for each. Our documentation is split up into architecture and deployment process. In this technical overview we will only look at the architecture which comprises of the various components, their role and and design considerations and best practices. The deployment process is a more procedural aspect of the Cisco Validate Design and will only be covered in the presentation in form of reference for a complete understanding of the CPA Validated Design for Enterprise Collaboration.
BRKCCT-2661 - Recording and Video Enabling the Contact Centre (2016 Melbourne)Within the next couple of years it is anticipated that 9 in 10 companies will compete primarily on customer experience that is the ability to attract and retain customers not only through product and price but also via a superior customer experience compared to their competitors. While companies broaden the ways that they can engage with customers leading to a multi-channel or omni-channel strategy, they cannot neglect the requirement to record these transactions for regulatory compliance, quality management, employee education and business intelligence. This session will show how you can architect a solution that embraces new means of communicating with customers via voice and video while also ensuring that the recording challenges of these new channels can be handled more efficiently through a network approach.
BRKAPP-2033 - Big Data Architecture and Deployment (2016 Melbourne)This session is an intermediate technical mix of application, compute, and networking topics concerning the deployment of Big Data clusters. This session will cover the application and infrastructure architecture components of Big Data clusters with a specific focus on Hadoop deployments. We will begin with a brief look at why organisations are deploying Big Data and Hadoop clusters, and how these applications differ from traditional architectures from both a software and hardware perspective. We will then look at the application behavior in the context of building a network and compute infrastructure and its design considerations. The session goes into detail on network and compute architecture regarding UCS and Nexus 9000; specifically buffer usage and network bandwidth characterisation, cluster design, best practices, cluster management, sizing, and scaling. The goal of the session is provide the attendee a better understanding of Big Data cluster architecture and application behavior, to be better equipped for Big Data infrastructure discussions and design exercises in your data centre environment.
BRKDCT-3640 - Nexus 9000 Architecture (2016 Melbourne)This intermediate level session will describe the Cisco Nexus 9000 architecture and innovations in terms of hardware, software, mechanical design, optical advantages in the 40 GE environment and power budget. The unique combination of Merchant silicon combined with Cisco internally developed ASICs make this platform a leader in the Data Centre switch market. This session will also approach the Data Centre design aspect and describe the Spine-Leaf architecture advantages.
BRKCOL-2020 - Cisco Unified Communications and Microsoft Integrations (2016 Melbourne)This intermediate-level session provides attendees with a detailed understanding of the Cisco Unified Communications solution when integrating and interoperating with Microsoft. It includes a review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products, a detailed explanation of migration and deployment scenarios, and things to keep in mind before deployment. Related technologies are treated, including call control, presence, unified communications security, TelePresence, and rich media applications. This session is for people involved with the planning and implementation of unified communications solutions and those involved in strategic decision making for selecting unified communications solutions. Attendees should have a good understanding of the Cisco Unified Communications high-level architecture and a basic understanding of the Microsoft product set. Content: Review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products. Detailed explanation of migration and deployment scenarios. Things to keep in mind before you deploy... Related technologies: call control, presence, unified communications security, telepresence, rich media applications Audience: People who are involved with the planning and implementation of unified communications solutions. Individuals involved in strategic decision making for selecting unified communications solutions. Pre-requisites: Good understanding of Cisco Unified Communications high level architecture. Basic understanding of Microsoft product set.
DEVNET-1608 - Developing the Connected Mobile Experience (2016 Melbourne)Mobile device applications are driving the workforce and customer experience, empowering employees and connecting consumers. This session explores how the wireless network can enable greater levels of visibility and interactivity through location based services. We will examine the fundamentals of location technologies, including hyperlocation and beacons, and explore how to leverage the CMX API to create engaging mobile applications.
DEVNET-1101 - Getting Started with OpenStack (2016 Melbourne)Hearing a lot about OpenStack and want to check it out for yourself? See how quick and easy it is to install and start using OpenStack within a VM on your own laptop. Acquaint yourself with the environment. Learn your way around Horizon (GUI) and the CLI to view and operate an OpenStack cloud, both from the perspective of a cloud administrator and as a tenant/user of the cloud. See how to automate typical workflows such as deploying a new multi-tier application. Best of all, take what you learn with you and experiment on your own to discover all OpenStack offers you.
PSOSDN-2801 - FD.io – Fast Data Processing on General Purpose Compute (2016 Las Vegas)Fd.io (fido) is a Linux Foundation project announced on Feb 11, 2015. Current members are (will provide list post launch) Fd.io includes Vector Packet Processing (VPP) - technology donated by Cisco. VPP provides an out-of-the-box vSwitch/vRouter utilizing Data Plane Development Kit (DPDK) for high-performance, hardware-independent I/O. Also included is a full build, tooling, debug, and development/performance environment and an OpenDaylight management agent.fd.io Member contributions are expected to extend FD.io capabilities in areas such as firewall, load balancing, LISP, host stack, IDS, hardware accelerator integration, additional SDN protocol support via additional management agents, DPI, and other critical IO services for network and storage traffic.
PCSSOL-2017 - Achieving Full-Speed IT (2016 Las Vegas)The Digital Age brings with it both significant challenges and amazing opportunities for today�s enterprises. Despite competition from digital startups, the challenges of legacy systems, flat budgets, transformation risks and limited bandwidth, there is an absolute need for enterprises to transform. Syntel, a global leader in digital modernization services, offers a suite of automation-driven IT and knowledge services powered by the SyntBots automation platform to overcome the challenges of the Two Speed World� and achieve full-speed IT. In this session you will learn how the SyntBots automation platform integrates with Metapod to: � Enable enterprises achieve faster time to market and agility � Improve quality and availability of IT systems and business processes � Boost efficiency and reduce TCO by as much as 40% � Harness the savings from automation to fund your Digital Modernization initiative