No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
Participant
Conference Event
Meeting
Interest
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
On-demand Library
Cisco Live Session Videos and Presentations Listing
Online Events
Upcoming Cisco Live events
Social Networking
Connect with Cisco Live
Solutions Center
Cisco Live Conference Exhibitors
Prizes
Cisco Live Survey
In-person Events
http://www.ciscolive.com/global/?zid=CLO-global
Cisco Live Milan 2014
http://www.ciscolive.com/emea/?cid=CLO-EU
Event Details
http://www.ciscolive.com/emea/details/?cid=CLO-EU
Scheduler
https://www.ciscolivemilan.com/connect/publicDashboard.ww?cid=CLO-EU
Social Media
http://www.ciscolive.com/emea/social-networking/?cid=CLO-EU
Cisco Live Melbourne 2014
http://www.cisco.com/web/ANZ/cisco-live/index.html
Cisco Live San Francisco 2014
http://www.ciscolive.com/us?cid=CLO-US
Event Details
http://www.ciscolive.com/us/details/?cid=CLO-US
Scheduler (Live Jan 13)
https://www.ciscolive2014.com/connect/publicDashboard.ww?cid=CLO-US
Social Media
http://www.ciscolive.com/us/attendees/social-networking/?cid=CLO-US
Cisco Live Cancun
http://www.cisco.com/web/MX/ciscolive2013/
Log in to access thousands of sessions on cloud, BYOD, data center, and more!
Join now to access free content from global Cisco Live conferences.
Add to My Interests
Add to My File Queue
Remove From My Interests
Remove from my File Queue
Incomplete Account Information
You have not yet completed your account information. Would you like to do so now?
Edit Account Now
Ignore
You already have an account in the system. Please click here to login

If you don't remember your username and password, please use the forgot password utility.
  File Download Queue
Search Catalog
 

SOLGEN-1000 - See More, Know More and Do More with Cisco IT Insights (2017 Las Vegas) Today, across every industry, applications are not only important to your business – they are core and inseparable from your business. As a result, new IT intelligence from the code, all the way to the consumer is critical to supporting the digital customer and the digital enterprise. Cisco’s Insight offerings provide real-time visibility, end-to-end visibility from the code to the customer, predictive and prescriptive insights, and automation to help you manage today’s complex IT environments. Join us to learn how you can unlock new insights to improve the customer experience, ensure security everywhere and deliver operational efficiencies.
SOLEWN-2000 - CLUS Network Topology (2017 Las Vegas) Learn how the Cisco Live NOC team supports over 50k devices across 3 MGM Resorts Properties during Cisco Live 2017. Review the event topology and have a chance to ask your questions to one of Cisco's engineers.
SOLEWN-1001 - Indoor Location Based Analytics (2017 Las Vegas) This session will discuss how indoor location is calculated with methods from WIFI to BLE. The level of precision of different indoor location methods, from AP presence to HyperLocation will be explored. Finally, different use cases, including how indoor location is used at Cisco Live will be discussed
5.0/5.0
PSODGT-1359 - Public Safety Architecture for Safer Communities and Countries in the Digital Era (2017 Las Vegas) Cisco helps government, public safety and justice organizations to accomplish their mission and deliver capabilities based on public safety architecture, ecosystem partners, and security to achieve strategic goals to improve citizen satisfaction, reduce costs, and mitigate public safety and security risks. This session will highlight trends and challenges driving the need for the public safety architecture showcasing best practices with Cisco and ecosystem partner solutions.
SOLCLD-2010 - Smart Manufacturing Enables Guaranteed Business Outcomes (2017 Las Vegas) Enabling a manufacturing environment with an IoT end to end solutions provides a great deal of benefits to a business. Many manufacturing companies struggle with maximizing the return on invested capital, unplanned machine downtime, quality issues, as well as supply chain efficiencies on the factory floor. A "connected factory" allows for real time visibility as to what is occurring on the factory floor. Applying analytics to the data the sensors capture off the machines creates the ability to predict equipment failures, before they occur. This significantly reduces unplanned machine downtime, increases the life of the asset, as well as streamline the flow of raw materials, making the supply chain operate much smoother. Because an end to end IoT solution provides objective data gathered by sensors and analyzed through analytics software rather than being gathered and analyzed by humans, guaranteed business outcomes are now being offered. This guarantee mitigates the risk companies might perceive when deciding whether or not to invest in a "connected factory" initiative.
TNKIOT-1001 - 5G Unleashing the full potential in IoT (2017 Las Vegas) There are 7.5 Billion mobile subscriptions in the world today and 4.1 Billion smart phones. 101% mobile penetration. Who would have thought that would happen when we introduced the first generation mobile telephony 40 years ago? 2G brought mobile voice to the people around the globe, with 3G we brought mobile Internet to the people and with 4G we changed the world again and made broadband mobile. Now we are in the midst of the next big shift in the history by connecting Things to the Internet. Enabling the Networked Society where any thing that can be connected will be connected, smart and interactive. With 5G we will really unleash IoT. Welcome to join us in this industry revolution!
TNKCLD-2000 - Automated Dependency Mapping in the Data Center (2017 Las Vegas) If you’re responsible for IT service assurance, you know it’s no longer sufficient to monitor the performance of individual network and data center components. Today’s data centers are all about the applications, and these applications rely on a complex web of technologies that must come together to deliver a seamless experience for customers. This session focuses on some of the newest Cisco technologies in the data center, including HyperFlex, Cloud Services Platform 2100, UCS Director, UCS Central, and CloudCenter. See how automated dependency mapping provides a complete view of these technologies, how they relate to each other, and how they relate to successful application delivery. This session is hosted by ScienceLogic, the leader in Hybrid IT Service Assurance. See how ScienceLogic affords their customers incredibly broad and deep coverage of Cisco technologies.
SOLCLD-1001 - Containers and Microservices to Accelerate Your Digital Business - WoS Session (2017 Las Vegas) Enterprise IT is getting stretched due to the need for speed to deliver disruptive business applications. Containers enable several key tenants of digital transformation. Portability across different platforms by standardizing packaging of applications reduces friction in deployments. Containers and Microservices accelerate adoption of DevOps, which is key in delivering applications faster. In this session, you will learn what Cisco has to offer from Datacenter and Cloud product portfolio for Containers and Microservices. We will cover products and solutions such as Docker on UCS, Contiv, and Cisco Analytics for Containers.
PSOGEN-1100 - Next Generation Security Services (2017 Las Vegas) With the market rapidly evolving toward digitization, Cisco is capturing extraordinary insights into the next generation of security.  Even though security is the foundation for innovation and growth in the new digital environment, organizations are struggling to anticipate and respond to new threats due to complex and fragmented networks, and lack the ability to adapt with agility to changing business models. As the #1 cybersecurity company, Cisco Services is a digital partner by your side, and we position you to anticipate change and move forward quickly. In this session, we will cover the trends as seen, end-to-end, by Cisco security experts, examine real examples of the current threat landscape, and the impact to security operations.
5.0/5.0
PSOCOL-2003 - Overview of Unified Communications on Cisco ISR 4000 (2017 Las Vegas) IISR4000 architecture allows consolidation of branch UC (unified communications) infrastructure and services with guaranteed performance and flexible deployment options. This session will provide architectural deep dive regarding UC features, capabilities including voice modules on Cisco ISR4000 series routers. This session starts with an overview of traditional telephony (digital/analog voice) and new DSP architecture in ISR4000. Session participants will learn about high density analog voice gateways series (VG3XO) as well as new capabilities offered by high density DSPs (digital signal processor). This session will cover UC scale enhancements and features introduced in CME (Call Manager Express) / SRST (Survivable remote site telephony) as well as CUBE (Cisco Unified Border Element). Attendees will leave the session with • Understanding of existing UC capability on ISRs and role of virtualization in evolution of Cisco UC applications on branch routers.
5.0/5.0
TNKCLD-1000 - Cloud Value Remains Cloudy (2017 Las Vegas) Uncover how to make the Cloud work for you. Through the cloud, new digital-centric businesses are emerging that are more agile and innovative than anything seen before. Enterprises are worrying about these new, agile competitors, while dealing with upheaval on a massive scale. The challenge: disrupt or be disrupted. There is an extremely important and compelling reason to incorporate agility and continuous development and deployment into your business strategy. There is a pressing need to digitally transform your company in order to keep pace with the market, innovate and win new customers. There is also an easy way to do all of the above wrong. This session will ask the CXO: will the system you are running today work the same when you move it into the cloud? Will it cost the same? Scale the same? In the end, every CXO will need to think about management. You will need to think about measurement and metrics and choose an approach that will work in both your existing and future environments and be able to maintain the constants you expect to rely upon.
PNLSPM-2121 - Evolution to 5G and Cisco's Strategy (2017 Las Vegas) Mobile industry saw major inflection point in 2008 when Long Term Evolution (LTE) was introduced. LTE served the needs for radio and core harmonization using an IP architecture. In the next generation of wireless, another inflection occurs when 5G technology specification are released. Unlike LTE, 5G specifications are developed with Internet of Things (IoT) in mind. Different standards bodies are working aggressively to propose a standard architecture and framework, which will lay foundation for 5G. This panel session will provide an engaging discussion around 5G evolution. Learn how Cisco is developing the integration of 5G into Cloud and Infrastructure strategy. As the 5G evolution continues to be active into the next decade, Operators will adopt new enhancements and provide new services and business models as new players will emerge. Our panelists are leading Cisco’s strategy and engaged with customers in forward-thinking models.
PSOCLD-1225 - Containers and Microservices to Accelerate your Digital Business (2017 Las Vegas)  Enterprise IT is getting stretched due to the need for speed to deliver disruptive business applications. Containers enable several key tenants of digital transformation. Portability across different platforms by standardizing packaging of applications, reduces friction in deployments. Containers and Microservices accelerate adoption of DevOps, which is key in delivering applications faster. In this session, you will learn offers from Cisco’s Datacenter and Cloud product portfolio for Containers and Microservices and Modernizing Traditional Applications (MTA) program. MTA program allows IT ops teams to dramatically streamline the operational tasks like application provisioning, deployment and updates. Learn everything about this collaborative program from Cisco and Docker and how MTA can help accelerate container adoption in your organization.
PSOSEC-1905 - Protection against ransomware for medium sized businesses (2017 Berlin) Cyber crime is on the rise worldwide and criminals are increasingly targeting midsized companies. A January 2016 New York Times article reported that 60% of all online attacks are aimed at small and midsize businesses. A 2016 Ponemon global study found that in any two-year period, there is a 26% chance that your business will be breached and the average cost to deal with that breach is $4M. These statistics are shocking, and should give every CEO pause. Even more shocking is that 25% of midsized organizations have no in-house information security resource dedicated to combat cyber crime. Ransomware is an indiscriminant threat that doesn't prejudice. Attackers will use ransomware to make a profit from any size organization so long as they can find a vulnerability to exploit.  By taking a multi-layer approach to security, smaller organizations can protect themselves from ransomware as they grow their businesses in the new digital economy. 
1.0/5.0
BRKRST-2337 - OSPF Deployment in Modern Networks (2017 Berlin) This session covers the OSPF topics relevant for modern networks. How can scalability be achieved with intra-area and inter-area routing? What techniques, or best practices, should you use when it comes to dealing with external routes. What are the design issues with full meshed and Hub and spoke networks. We will discuss how and when to use OSPF resiliency and fast convergence techniques. The challenges of OSPFv3 IPv6 deployments and design consideration when OSPF is used as a MPLS PE CE protocol. The OSPF solutions in the session will be applicable to both Enterprise and SP environments. Basic routing and OSPFv2 knowledge is a per-requisite for this session.
5.0/5.0
BRKRST-2041 - WAN Architectures and Design Principles (2017 Berlin) The WAN Architectures and Design Principles session offers an end-to-end design approach featuring the Smart Business Architecture with key areas of focus including resilient IP forwarding, QoS, application optimisation, and data privacy and security. The cornerstones of the session are real-world use cases and WAN design best practices. The WAN Architectures and Design Principles session includes a detailed discussion of the head-end WAN aggregation and remote site design options for branch locations. These options include the use of layer 2 and layer 3 WAN transport models, usage of single and dual WAN links, as well as single/dual router edge topologies. Additionally, Internet VPN as both a backup and primary transport option is discussed. Design guidance will include routing protocol best practices, QoS for the WAN edge, IP multicast enablement, and interconnection with other network modules as well as access to the Data Centre. Other key WAN technologies which are integral to the design are DMVPN and GETVPN for data privacy as well as Wide Area Application Services (WAAS) and WCCP for bandwidth optimisation.
5.0/5.0
BRKUCC-1600 - Introduction to Cisco Mobile Collaboration (2013 Orlando) This introductory session describes how Cisco's collaboration enterprise mobility solutions provide fixed mobile convergence (FMC) and fixed mobile substitution (FMS) features and functionality to enable mobile workers both inside and outside of the enterprise. The session covers the following Cisco unified communications mobility solutions: 1. FMC with Cisco Unified Communications Manager Unified Mobility feature set which includes features like single number reach, mobile voicemail avoidance and enterprise 2-stage dialing 2. FMS with Cisco mobile clients and solutions for smartphones and tablets including Cisco Jabber These solutions provide a comprehensive set of mobility features and functions for enterprise mobile workers. Individually or in concert these FMC and FMS solutions provide access to enterprise collaboration applications and services to mobile users including voice and in some cases video over IP calling, presence, messaging, and directory integration. These solutions also provide productivity improvements both for the mobile user as well as users inside the enterprise that the mobile user may communicate with. Further these solutions provide a good return on investment by allowing enterprises to reduce the use of cellular minutes for business calls At the end of the session it is expected that attendees will have a good understanding of the various Cisco unified communication mobility solutions for enabling mobile workers including a clear picture of the features and functions available with each, solutions and component requirements, and the basic design considerations for deploying the solutions. To maximize the material learned, ideally the attendee should have some familiarity with Cisco Unified Communications Manager including associated devices, services, and principles as well as enterprise collaboration generally.
4.5/5.0
BRKSPV-1126 - Deploying IP Video over DOCSIS (2013 Orlando) This session will offer attendees an overview of the features and capabilities that the Cisco CMTS has for delivery of IP video over DOCSIS. Attendees will learn how the DOCSIS network can be optimally used for such services. The tools and technologies that will be covered include: - DOCSIS 3.0 multicast - RF spanning - QoS and admission control - Dynamic bandwidth sharing - Adaptive Bit Rate video - Variable Bit Rate video This session will also cover interaction of these features and how they can be combined together to achieve different goals such as spectrum optimization, cost optimization, service separation, and efficient cable modem migration.
5.0/5.0
BRKSPM-2008 - LTE Roaming Design and Deployment (2013 Orlando) Long Term Evolutions (LTE) is newest technology for mobile operators. Most of existing 2G, 3G mobile networks are migrating to LTE. Compared with 3G, LTE provides high throughput, much better QoS control and low latency. Subscribers have same expectation whether in home network or roaming. This is intermediate level session covering LTE along with 2G/3G roaming design and deployment. The session will focus on LTE roaming using IP exchange (IPX) network and how to inter-operate GRX and IPX simultaneously. I will also cover in depth about policy, QoS implementation, and different local breakout options during roaming. LTE security for home and roaming subscribers will be covered in detail. The participants are expected to learn LTE roaming and security design using best practices and case studies. The content of session will be based speakers hands on experience with tier-1/2 mobile networks.
4.7/5.0
BRKEVT-2802 - Deploying TelePresence and Video Endpoints on Unified Communications Manager (2013 Orlando) This 90 minute session is aimed at video architects and administrators who are considering, or planning to deploy TelePresence and Video endpoints on Unified Communications Manager The first section reviews the deployment models, provisioning methods and features available today on Video Communications Server (VCS), TelePresence Management Suite (TMS) and Unified Communications Manager (UC Manager); and provides best practice recommendations on which models and methods to use for various endpoint models and network connectivity scenarios The second section is for customers who plan to deploy their endpoints on UC Manager and want to understand in more detail how the TelePresence endpoints work on UC Manager, which features they support, and best practices for deploying them
5.0/5.0
BRKEWN-3021 - Troubleshooting Converged Access Wireless Deployments (2013 Orlando) This session discusses troubleshooting techniques and best practices for the Cisco Converged Access Mobility Architecture. We will cover how to troubleshoot mobility issues under the various deployment models, including Mobility Agents (MA), Mobility Controllers (MC), and Mobility Oracles (MO). We will cover common information, tools, and debugs used by TAC to resolve issues. We will also review key issues to watch out for.
COCEWN-3427 - Inside Cisco IT: BYOD...Coping with the Explosion of Mobile Devices in the Enterprise (2013 Orlando) When your CEO implements drastic changes on new devices you need to support, can your architecture and policy structure handle it? How do you control your data when it?s accessible almost anywhere by a demanding workforce? What security measures are scalable to prepare for the future? How can you plan for the next big device?
5.0/5.0
ITMGEN-3250 - The Innovation of Everything (2013 Orlando) As the industry begins enabling the Internet of Things, the way we work and do business will change at lightning speed. How do you use innovation to drive creativity? How can you optimize technology to free up other resources? Hear from Carlos Dominguez, a leader in innovation, as he shares his eye-opening ideas about how to prepare for the future.
BRKSEC-3007 - Advanced Cisco IOS Security Features (2013 Orlando) This session mainly covers design and deployment for the Zone-based Policy Firewall (from the foundations to advanced policy construction) and Identity-based features ( Downloadable ACLs, User-based Zone Firewall and the brand new SGT Firewall). Throughout the session, typical troubleshooting tools are largely employed to provide insight about feature operations and interactions, thus establishing the linkages between theory and practice. The session also discusses IOS advanced filtering resources such as specialized ACLs and Flexible Packet Matching and brings information about IPv6 Security features already available on IOS. This Session is targeted at network security specialists who want to learn about important security features in the Cisco IOS Router platform and Network engineers who need a better understanding of the Firewall and Identity functionalities available on IOS Routers. It is important to emphasize that this breakout does not cover VPN, L2 Security, IOS IPS or even IOS hardening techniques. This breakout is a natural follow-on to BRKSEC-2017.
4.3/5.0
BRKSEC-3020 - Troubleshooting Firewalls (2013 Orlando) This presentation focuses on preemptive measures and reactive techniques that can be used to troubleshoot, secure, and maintain the Cisco Adaptive Security Appliance Products and the Cisco Firewall Services Module (FWSM). Providing an in-depth understanding of the packet flow through the firewall device, as well as how to effectively utilize the available commands and on-board tools to troubleshoot connectivity problems are the main goals of this presentation. Knowledge is assumed of security fundamentals and firewall technology at the level presented in the Cisco Networkers Online Introduction to Firewalls and Deploying Firewalls.
4.6/5.0
BRKSEC-2900 - Cloud Managed Security with Meraki MX (2013 Orlando) Meraki's cloud managed networking portfolio includes out-of-the-box capabilities to help administrators secure their network environments. This session will provide an introduction to the Meraki architecture and a deep-dive into the Meraki MX security appliance product line. Presenter will feature a live demo of key features such as Auto VPN, client fingerprinting, identity-based policies, intrusion detection, and more.
5.0/5.0
BRKOPT-2102 - Software and Control Plane Evolution for IP+Optical Architectures (2013 Orlando) IP+Optical is a emerging architecture for Service Providers and large corporations that require transport of massive amounts of data at very high speeds. In this session, we'll look at the software components that enable this architecture, from agile DWDM networks to novel advanced restoration technologies, multi-layer control plane and path computation and network optimization solutions. These software innovations will be reviewed in the context of Software Defined Networks (SDN) and how they can bring a new level of efficiency to the network. The session will also explore the role of these software innovations in the future of Service Provider networks.
BRKUCC-2021 - Understanding, Integrating, and Troubleshooting Fax Communications in Today's Enterprise Networks (2013 Orlando) Comprehensive VoIP solutions must address the transport of fax communications in addition to traditional voice communications. However, unlike traditional voice communications, fax transmissions have unique characteristics that require alternative integration and implementation methods. This session examines the various real-time fax transport methods, including passthrough, T.38 fax relay, and Cisco fax relay and helps one determine the correct fax transport method based on network capabilities and other design considerations. Additional focus will be given to T.38 fax relay as this is the de facto standard that is widely deployed for fax communications today and is a Cisco recommended best practice. Best practices dealing with product and protocol interoperability, Quality of Service (QoS) considerations, and SIP trunking will be provided for integrating fax communications with Cisco voice gateways, CUCM, and T.38 fax servers. T.38 fax servers are becoming increasingly prevalent in Unified Communications solutions and this session addresses the common fax server deployment models. Key troubleshooting tips will also be highlighted throughout this session. Pertinent configurations, common mistakes, and the important troubleshooting commands, debugs, and traces will be provided to ensure that any fax issue that arises can be quickly resolved.
4.6/5.0
CCSUCC-2375 - How to manage the transition and evolution of your contact center - the customer point of view:McKesson (2013 Orlando) How to manage the transition and evolution of your contact center - the customer point of view: Is your company ahead of what your customers are saying about you in social media? Are you thinking of how your customer contact can differentiate you in the marketplace? Are you simply in need of a technology refresh? With the right investment, your contact center can be on the forefront of the strategic differentiation for your company. Learn first hand from McKesson how they are managing through their technology transition and managing for business success and differentiation. From architecture, to training, to process, to partnership, learn the key points directly from the end user.
BRKSPG-2204 - Building Carrier Ethernet Services Using Cisco Ethernet Virtual Circuit Framework (2013 Orlando) This session provides an overview of Cisco Ethernet Virtual Circuit (EVC) framework. A Cisco innovation that provides consistency, service awareness, flexibility and increased scalability for Carrier Ethernet and Layer 2 Virtual Private Network (VPN) deployments. Fundamentals of Cisco EVC operation and configuration are covered in detail. The session also illustrates how the framework aligns with the Metro Ethernet Forum (MEF) service attributes and definitions. Finally, Data Center Interconnect (DCI) and business services deployment use cases are covered. Target audience for the session are Service Providers who plan to build or currently operate a Carrier Ethernet network servicing residential and business customers, and Enterprises considering data center interconnection using Carrier Ethernet services.
4.7/5.0
BRKCOL-2060 - Ignite Your Business! Smart Services for Business Collaboration (2013 Orlando) Collaboration has emerged as an important tool that empowers people to work together in new ways to transform business, accelerate innovation, and do more with less. It's the next-generation of business interaction, where everyone � everywhere -- can be more productive through closer working relationships. But getting there can be painful for organizations that aren�t prepared. Collaboration questions you need to ask include: 1. Is my network ready? 2. Do I have in-house expertise to plan, design ,implement, optimize and maintain a complex solution? 3. Can we monitor and manage collaboration applications and devices? Learn the answers in this introductory session. You�ll have a unique opportunity to learn about Cisco lifecycle collaboration services and tools, and how they enable you to successfully plan, build, and run your network as a powerful business collaboration platform. The session will discuss in detail the Cisco options customers have for Readiness Assessment, PDI, Optimization and Ongoing Management.
BRKSEC-2044 - Building an Enterprise Access Control Architecture with ISE (2013 Orlando) This session covers the building blocks for a policy-based access control architecture for wired, wireless, and VPN networks using Identity Services Engine. Starting with basic user and device authentication and authorization using technologies like 802.1X, MAB, Web Authentication, and certificates/PKI, the session will show you how to expand policy decisions to include contextual information gathered from profiling, posture assessment, location, and external data stores such as AD and LDAP. The architecture will be expanded further to address key use cases such as Guest access and management, BYOD (device registration and supplicant provisioning), MDM policy integration, and 802.1AE (MacSec). Visibility and pervasive policy enforcement through VLANs, ACLs, and Security Group Access (SGA) will also be discussed. This session is intended for Network, Security and Systems Administrators, Engineers, and Managers that need to implement the next generation Unified Access Network.
4.0/5.0
BRKRST-2509 - Mastering Data Center QoS (2013 Orlando) All you need to know about Nexus QoS: capabilities, implementation, design and best practices for optimization of applications. From Data (FCoE, NFS, iSCSI, CIFS) to Video and Voice. The hardware capabilities will be explained. The focus is to understand QoS, how to design and configure end-to-end QoS in the Data Centre. Configuration templates and best practices will be provided. The session is targeting Network Engineers and Architects involved in Data Centre designs and implementation. Various Cisco NX-OS series platforms are covered.
5.0/5.0
BRKSEC-2073 - Threat Defense using NetFlow and ISE (2013 Orlando) Trends such as BYOD and the rise of the Advanced Persistent Threat (APT) are leading to the erosion of the security perimeter and increasingly attackers are gaining operational footprints on the network interior. Participants of this session will learn how to leverage NetFlow and the Lancope StealthWatch System in concert with the Cisco ISE and ASA to gain contextual awareness of network activity in order to identify insidious threats and accelerate incident response. This session will cover how to leverage these technologies to gain visibility throughout the kill chain to accomplish tasks such as identifying command and control channels, detecting network reconnaissance, tracking malware propagation and detecting data loss. The target audience for this session are security administrators and analysts interested in learning how to best leverage NetFlow and other telemetry sources as part of their security toolkit.
5.0/5.0
BSACOL-1005 - Mapping Business Communication Methods & Workflows into an Innovative Architecture (2013 Orlando) This session will provide a proven business alignment technique with a strong focus on innovation. This mapping process links common requirements, communication methods, devices and workplaces to the latest trending collaboration capabilities. It also maps critical business policies and conditions to the required feature sets in the collaboration architecture. 10 of the most trending innovative UC & Collaboration use cases will also be revealed. At the end of the session the attendee should be equipped with a proven technique to align their strategic collaboration needs into an innovative architecture by opening up to newer and more effective ways of communicating.
ITMGEN-3465 - Beyond BYOD: Enterprise Apps and Cloud Services (2013 Orlando) Does your organisation already allow corporate email from personal smartphones? Do your employees want access to more services from more devices? If your company has already launched a BYOD program but is wondering what comes next this session is for you. Join Evan Parthenis as he shares how Cisco's BYOD program evolved from email on iPhones in 2009 to its Any Device strategy today. Understand the importance of workforce segmentation, user driven demand, and an integrated IT storefront. Learn about the role Cloud Services can play in your strategy and see real world examples of how Cisco's EasyApps strategy has increased productivity and transformed the way employees work.
5.0/5.0
BRKCCT-2052 - UCCE Deployments on Cisco UCS Platforms Best Practices (2013 Orlando) Deployment of UCCE on UCS platforms can be a complex endeavor without proper knowledge, information and methodologies. During this Cisco Live 2013 presentation, best practice design and deployment considerations will be examined to facilitate successful implementations of Cisco Contact Center Enterprise (UCCE) on Cisco UCS Server Virtualized Platforms. Using these best practice processes to realize reductions in both the time and level of effort involved for these deployments will be discussed as well. This session will provide the attendee information as to the distinct advantages of utilizing Cisco best practice guidelines to enable the deployment of UCCE on UCS consistently and with less opportunity for error. Participants will learn how the UCCE deployment procedures have changed from those of a traditional hardware model and will be provided insights into how the deployment model can be replicated for repeated use over multiple deployment scenarios. Session attendees will also receive the latest information regarding Cisco Contact Center Enterprise running on virtualization platforms including recent updates, what's just around the corner, as well as some common design pitfalls and poor practices associated with virtual machine population and upstream network connectivity.
5.0/5.0
BRKNMS-1040 - Application Visibility and Control: Managing AVC with Cisco Prime infrastructure 2.0 (2013 Orlando) Cloud and Data center consolidation along with BYOD has changed the how enterprise services are delivered by IT. The network plays an important role in providing visibility into users, their devices and their application experience. AVC enables the network administrators gain to get visibility into applications and user experience. This session will focus on planning and deployment of Application Visibility and Control (AVC) which consists of NBAR2, FNF, PA, QoS, PfR and Performance Monitor using Cisco Prime Infrastructure 2.0. We will go though the deployment architectures for AVC and how to incorporate AVC at the various points in the network. This session will also walk though the use cases with respect to voice/video troubleshooting and end user experience and how AVC helps with troubleshooting and remediation.
PSOSPG-1330 - IPv6: Where Do We Go From Here? (2013 Orlando) June 2012 officially brought us the new IPv6 Internet with the World IPv6 Launch led by the Internet Society. Less than six months later IPv6 traffic broke the 1% threshold for the first time, showing that it's moved from experiment to mainstream. current trend show strong growth of IPv6 content and IPv6 users in certain part of the world. In this session we'll review some of the key milestones of the IPv6 transition but more importantly review the key areas that must be addressed in the industry to continue to drive the growth of IPv6 on the Internet for enterprises, fixed and mobile users. The Business decision that will lead to broader IPv6 adoption need to be backed-up by data: We will review metrics about IPv6 adoption globally, that should enable better business decisions in adopting IPv6. We'll also look at the new business opportunities enabled by IPv6 in the Internet of Everything.
5.0/5.0
BRKCDN-1005 - Better Network Management Through Network Programmability (2013 Orlando) As we enter the age of network programmability the data models, protocols, and tools provided by a programmable network can greatly improve and simplify network management tasks. Configuration and operational data can be read and set regardless of the underlying device. Errors are properly reported to ensure reliable delivery of data. Connections are secure and robust. Data is more intelligently extracted. This session will explore how tools like NETCONF, YANG, and Cisco's Embedded Event Manager and onePK API can radically improve network management applications by offering visibility and provisioning power throughout the network stack. We will also provide an overview of the Cisco Process Orchestrator solution which provides an excellent way to interface disparate systems and achieve robust automation in your environment. Operational state checks and assisted troubleshooting are enabled through automation and orchestration.
BRKSPM-2005 - LTE Policy and Charging Control Architecture (2013 Orlando) Today's mobile internet is being driven by rapid change across the ecosystem. The challenges that mobile operators face are far more complex than just increasing data traffic. A growing number of connected devices and a growing variety of these devices ("phablets," smart meters, autos, sensors, etc.) are running more and more apps for our productivity and entertainment. Even as LTE promises to bring down the cost per bit through improved efficiencies, an always-on architecture means more concurrent sessions per subscriber on the network, with each new LTE subscriber increasing the number of transactions exponentially. Traditionally, the policy and charging rules function (PCRF) of the network is where operators mounted their defensive approach to network management -- ensuring fair usage, capping and throttling users and/or traffic types. This is what's commonly referred to as Policy 1.0. As more and more operators look to differentiate their service plans, policy control has become a strategic point of network control, not just for cutting costs, but as a way to monetize the traffic. This next level, Policy 2.0, focuses on the subscriber, the application, and how the service provider can deliver a more relevant online experience. If 3G was coverage focused; LTE is capacity focused -- ideally suited to deliver high-bandwidth, latency-intolerant, multi-media services. A scalable policy control solution must harness the capabilities of an LTE architecture to differentiate these services and create new business models based on the dynamic control of QoS at an application and flow level.
COCUCC-2360 - Inside CIsco IT: How Cisco IT introduces new UC and Video Services to its users (2013 Orlando) Advanced Cisco Experience (ACE) network under Cisco IT is used to introduce new Unified Communication and Video Services. These services include new releases of Cisco unified communications, collaboration, video, and mobility technology products that our employees use to work the way they want, across different devices and locations, which drives gains in user productivity. ACE team works with Cisco IT Production network teams to synchronize plans at the network architecture and design level in order to identify risks and roadblocks as well as work through dependencies when a service transitions from testing to production.To ensure the best possible user experience, we integrate the dial plan and user directories across both networks and the engineering-led Alpha networks. This integration means that all of our users, regardless of communication platform, can use the same dialing patterns and click-to-communicate features that are so important for a positive user experience. ACE team also specializes in improving user experience by providing custom solutions like unified portal where users can self manage their devices, sync passwords, change PIN, change Caller-ID etc. ACE Team also solved other challenges like keeping end users programs up-to date and finally capture very useful data analytics which will provide valuable feedback to Cisco Product teams and also overall Cisco IT.
BRKNMS-2443 - One Management for Unified Access (2013 Orlando) Design, Deploy, and Operate a Unified Access wired and wireless network with Cisco Prime Infrastructure. In this session, participants will learn how to use Cisco Prime Infrastructure to inventory, configure, monitor, and troubleshoot Cisco Catalyst 3860 converged access switches, Cisco 5760 Wireless LAN Controllers, and the new mobility architecture introduced by these platforms. We will demonstrate how Cisco Prime Infrastructure can be used to: 1. Configure Cisco Catalyst switches and Cisco 5760 WLCs with plug-and-play simplicity 2. Collect and report detailed network inventory and health information 3. Efficiently manage and visualize the new mobility architecture 4. Troubleshoot end-user connectivity and access policies through integration with the Cisco Identity Services Engine 5. Assure end-user network experience with application visibility, leveraging Application Visibility and Control (AVC), flexible netflow, NBAR2, and other performance technologies built into the Cisco network infrastructure
BRKNMS-2030 - Onboard Automation with Cisco IOS Embedded Event Manager (2013 Orlando) Did you ever wish that your routers and switches could become smarter to monitor its own transient error conditions and conduct automated diagnostics? Did you ever struggle with some repetitive tasks that you hope you could have the devices do them automatically? Did you ever dream that your router could automatically configure itself when a new device is plugged in? Come and join us for the session on an in-depth review of the Cisco IOS Embedded Event Manager (EEM) which allows you to achieve all these things and more that you never thought possible before. This session covers the following topics: - EEM Architecture - Understanding Event Detectors - Understanding EEM Policies - EEM real world use case review - Latest EEM feature update - Introduction to ';Embedded Automation Systems (EASy)';, a program offering EEM-based solutions in the area of onboard diagnostics, deployment simplification, high availability and more - EEM new feature and use case demo This session is for attendees who have worked with Cisco IOS, and who wish to strengthen their skill set to provide improved manageability for their network. If you are interested in this topic, you may also be interested in attending the following session: BRKNMS-3021 - Advanced Cisco IOS Device Instrumentation, which will give you an overview on several embedded automation technologies
5.0/5.0
BRKCOL-2455 - Fixing SIP Problems with Cisco Unified Communications Manager's SIP Normalization Tools (2013 Orlando) Increasingly, systems and applications use SIP to communicate with each other; unfortunately, not all SIP implementations use compatible message headers or bodies. These SIP compatibility issues can bring projects to a halt while waiting for code fixes, new software versions, or expensive service calls. When faced with these issues, the SIP Transparency & Normalization Feature of Cisco Unified Communications Manager provides a tool for the administrator to deal with incompatibilities in the SIP messages exchanged between systems. This session will review SIP basics and terminology before introducing the SIP Normalization Feature in Unified CM. We'll look at how to configure Unified CM to leverage SIP Normalization, how some simple scripting makes this feature so powerful, discuss the kinds of information you'll need before writing a script, and cover scripting basics. Finally, we'll show real-world examples of SIP Normalization Scripts used to solve interoperability issues.
4.0/5.0
BRKSEC-4054 - Advanced Concepts of DMVPN (2013 Orlando) This session covers advanced concepts of the Dynamic Multipoint VPN (DMVPN) solution. It starts with an overview of DMVPN functionality; DMVPN hub-and-spoke and dynamic spoke-spoke (Phase 2 and Phase 3) networks. This includes DMVPN network design concepts, choosing a routing protocol and scaling with respect to routing, encryption and redundancy. The talk then continues with an SDN style use case, where the DMVPN Smart-Spoke feature is used to modify the standard DMVPN behavior. This session is for designers and managers of extended corporate DMVPNs and for service providers that are deploying these services for their customers.
5.0/5.0
BRKCOL-2020 - Cisco Interoperability with Microsoft (2014 Milan) This intermediate-level session provides attendees with a detailed understanding of the Cisco Unified Communications solution when integrating and interoperating with Microsoft. It includes a review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products, a detailed explanation of migration and deployment scenarios, and things to keep in mind before deployment. Related technologies are treated, including call control, presence, unified communications security, telepresence, and rich media applications. This session is for people involved with the planning and implementation of unified communications solutions and those involved in strategic decision making for selecting unified communications solutions. Attendees should have a good understanding of the Cisco Unified Communications high-level architecture and a basic understanding of the Microsoft product set. Content: Review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products. Detailed explanation of migration and deployment scenarios. Things to keep in mind before you deploy... Related technologies: call control, presence, unified communications security, telepresence, rich media applications Audience: People who are involved with the planning and implementation of unified communications solutions. Individuals involved in strategic decision making for selecting unified communications solutions. Pre-requisites: Good understanding of Cisco Unified Communications high level architecture. Basic understanding of Microsoft product set.
4.0/5.0
BRKDCT-2367 - OpenStack Deployment in the Enterprise / OpenStack - Implementaciòn en las empresas (2013 Cancun) OpenStack is an open source cloud operating system. More and more SP and Enterprise customers are looking for a top-to-bottom cloud stack that is rapidly deployable, open source based and does not break the bank and this is where OpenStack shines. This session will address common questions such as: What is OpenStack? Why should I use OpenStack in the Enterprise? How do I deploy OpenStack? The bulk of the session will focus on deploying OpenStack based on the Cisco OpenStack Edition starting from bare-metal provisioning all the way through the deployment of the controller and compute nodes as well as storage, and networking. A case study will be used to expand on topics such as multi-tenancy, quantum networking and application deployment. The use of open source and commercial tools such as Puppet will also be discussed. This session is very technical with a lot of configuration details.
CEWN-001 - Cisco Empowered Women's Network (2013 Cancun) TOMORROW starts here Please join us at the Cisco Empowered Women’s Network (Cisco EWN). This network is a global community of highly motivated professional women who connect at Cisco Live! and throughout the year to exchange thought leadership and grow their careers. It was launched at Cisco Live Orlando. An inclusive tomorrow starts here — and it starts with connecting you to successful and motivated women. Attend this exciting event and prepare to: Get energized with our executive panel of Cisco and customer/partner leaders Get inspired by “real and raw” role models   Únase a nosotros en la red de Cisco Empowered Women's Network (Cisco EWN). Esta red es una comunidad de mujeres profesionales altamente motivadas que se conectan en Cisco Live! y durante todo el año para el intercambio de liderazgo de pensamiento y hacer crecer su carrera. Se inició en junio en Cisco Live Orlando. Un mañana inclusive comienza aquí - y empieza conectando a mujeres exitosas y motivadas. Asista a este emocionante evento y prepárese para: Energizarse con nuestro panel de ejecutivas de Cisco Inspirarse con modelos reales a seguir
BRKSPS-2602 - EMC and Cisco: Transform Your Data Center With EMC VSPEX and Cisco Technology (2014 Milan) Deployment of private cloud can be a complex task – with VSPEX Proven Infrastructure it doesn’t have to be. This session will take an in-depth look at how VSPEX simplifies and accelerates private cloud deployment to support your most robust application SLAs. Understand the EMC and Cisco technology behind VSPEX, and learn about its benefits in real world terms – through actual an customer case study.  Come to this session to learn what VSPEX can do for your business and what it has already done for others just like you.
BRKEWN-2014 - Cisco Meraki Cloud-Managed Wireless Solution (2014 Milan) Cisco Meraki's cloud-managed wireless solution provides administrators with the tools to implement scalable wireless networks enabling new business applications such as post-PC devices, mobile POS, and BYOD. This session will provide an intermediate level of information about the Cisco Meraki unique Cloud architecture, and a deep-dive into the wireless product line, including the latest 802.11ac offering. The presenter will provide live demonstrations and deployment strategies for key features platform, including client fingerprinting, layer 7 traffic shaping, location services, integrated MDM, and more.
5.0/5.0
BRKRST-2370 - IP Mobility Technologies (2014 Milan) Mobility is a very important current BUZZ topic in the industry. However, it is also a topic which means many different things depending on who speaks about it. This session will demystify what Mobility means and how network architectures and internet protocols deliver the ';mobility'; experience. An overview of Mobility use cases will be given and demonstrated to generate the participants feedback in the marketing exercise which consists of determining if such and such use case is a valid one the industry should be concerned of. This initial discussion will abstract the network architectures and focus on the user experience. The discussion will then refocus on current network architectures which deliver Mobility as it is mostly understood by many, hence Mobile Cellular and Enterprise WLAN architectures, highlighting protocols such as GTP, MIP/PMIP, and CAPWAP.
4.0/5.0
ITMGEN-3200 - Influencing the Business Equals Increased IT Value (2013 Orlando) IT has an increasingly critical role in driving technology innovation to deliver business value and results. How can IT become an influencer and drive the discussion and decisions made by the business? Cisco leaders will share insights into how to influence business counterparts and discuss multiplying the value you can bring through a new type of relationship.
ITMGEN-2605 - Leading in a Dynamic Environment: Panel Discussion (2014 Milan)  How do you accelerate and drive growth in your IT career?   How do you position yourself to present your ideas in a changing environment?  Do you know what keeps your CIO up at night and how this will impact your career?    What does it take for an IT professional to gain the respect of the board?  How does an IT manager make the transition from provider of services to a business partner?  What are the characteristics of a truly business-relevant IT professional?   Join Cisco IT’s own Vice President, Lance Perry, as he shares his insights into the behaviors of senior IT executives that are making a direct business impact through their technology leadership and business influence.
BRKNMS-2692 - DNS Architecture for Cloud Computing Environment (2014 Milan) In highly dynamic environments such as public and private cloud, Domain Name Services (DNS) updates are imperative particularly for architectural components such as availability, security, performance and scalability with respect to the application services. For example, provisioning Virtual Machines (VM) during the peak periods in order to meet the capacity on demand, the VMs must be scaled horizontally and each VM must be interfaced with the DNS. The management of all the zones, tenants, new entries and maintenance of the current configurations are important and resources such as orchestration tools and DDNS (Dynamic DNS) might help but there are some implementation challenges. This presentation is intended to provide the participants in a vendor neutral approach with detailed necessary information from client and server point of view and discuss the challenges while architecting DNS solution for public, private cloud environments.
4.0/5.0
BSADCT-1004 - Data Center Unified Infrastructure Business Strategy & Architecture Best Practices and Migration (2013 Orlando) (Title) - Data Center Unified Infrastructure Business Strategy & Architecture Best Practices and Migration: Covering Flex PoD, vBlock Design/Implementation Best Practices Architecture. Migration Best Practices Recommendations from Customers existing Architecture onto a Flex PoD / vBlock Unified Infrastructure.
5.0/5.0
BRKIND-1258 - The Internet of Things (2013 Orlando) Today, less than 1% of things in the physical world are connected. An avalanche of technology is accelerating and driving the convergence of the physical and digital worlds: the Internet of Things (IoT). Join this session to learn how Cisco is leading the way in connecting the previously unconnected and supporting trillions of sensors collecting massive amounts of data that will affect nearly every aspect of our lives. Cisco is driving the redesign and scalability of network architecture in partnership with service providers, manufacturers, and other IoT participants and has led standardization efforts, including IPv6 adoption, that are needed to realize the potential of the IoT. This session will discuss Cisco's IoT strategy and vision along with their presence and relevance in a host of vertical industries including manufacturing, transportation, and energy, as well as the growing impact of machine-to-machine (M2M) communications.
BRKCRS-3147 - Advanced troubleshooting of the ASR1K and ASR4400 made easy (2014 Milan) In this session, we will explain the architecture of the ASR series and demonstrate advanced troubleshooting techniques for tracing packets and flows throughout the forwarding path. We will also see how flows are created by the control plane processes, typically on IOS and installed in the forwarding plane on the ESP. Those troubleshooting techniques will be applied to various feature such as packet forwarding, NAT, Firewall, Crypto VPN etc. In particular, we will focus on finding the needle in the haystack by debugging a live router forwarding hundreds of thousands of flows learn how to isolate a specific flow for debugging. The session will cover the IOS XE release 3.10 or later which includes multiple debugging enhancement based on the feedback collected during TAC cases.
5.0/5.0
PNLRST-4007 - Real Software Defined Networking Solutions: Optimize in an Open Network Environment - CiscoONE (2013 Orlando) How do you harness network intelligence via programmatic access to optimize business agility? Can the network be tied into emerging orchestration and automation frameworks that streamline complex provisioning tasks? Everyone wants greater extensibility and flexibility in leveraging their network, but how quickly will new technologies be adopted and how soon can you realize the benefits implied by software-defined networking solutions? Hear from a panel of experts as they discuss the new principles, products and tooling for building, deploying, scaling and automating software defined networks. This will include discussion around new solutions offerings, real-world use cases and monetization potential with SDN, and overview multiple strategies for delivering on network programmability for your business, project and organization. Bring your hard questions & join us in this interactive and invigorating conversation!
BRKAPP-9000 - Introduction to Application Centric Infrastructure. (2014 Milan) This session is an intermediate session that provides detailed information on Application Centric infrastructure and the requirement to drive data center infrastructure based on application demands. The methodologies behind application development and deployment are constantly changing. The current trends of massively scalable applications, cloud deployments and DevOps practices have placed new stresses on data center infrastructure. Infrastructure has become a bottleneck for application development, deployment and growth.Application Centric Infrastructure places the application center stage in the infrastructure design process and automates the configuration of the hardware underneath. This approach provides a platform for automation, orchestration and higher level system control while bridging the language barriers between development and infrastructure teams.
4.7/5.0
PSORST-2003 - Integrated Branch Services without Compromise (2013 Orlando) You don't have to trade off performance for rich services delivery anymore. Learn about the architectural advancements of the Cisco Enterprise routing portfolio that provides tighter integration of integrated services with significantly improved performance. In this session, you will get a technical overview on how Cisco's new multi-core IOS XE architecture forwards packets and how the services virtualization layer allow you to run integrated services, such as Cisco Wide Area Application Services (WAAS) and Cisco Adaptive Security Appliance Services (ASA) firewall, within the router just like they're on an appliance. You'll become the expert on this new flagship of the ISR portfolio and know more about the technology under the hood than anyone else you know.
4.5/5.0
PSODCT-1001 - Data Center Computing Strategies (2013 Orlando) Cisco's Unified Computing System is the industry's first and leading implementation of fabric computing which integrates compute, network, virtualization and storage access into a cohesive system. Understand the vision for where we are taking UCS in the future and learn what trends we are tracking as we evolve this industry changing solution. This integrated approach reduces costs, improves operational efficiencies and allows customers to be more responsive to rapidly changing business demands. This session will introduce the key building blocks of Cisco's UCS, highlighting key features like service profiles and stateless computing. Learn how Cisco is continuing to evolve our Unified Computing solutions with new capabilities, performance and scale.
5.0/5.0
PSONMS-1036 - Cisco Prime for IT: Assuring Application Experience from Connected Users to the Data Center (2014 San Francisco) Connected user technologies are evolving rapidly providing new and innovative ways for Enterprises to engage with customers and employees, lower costs and drive revenues. The dynamic nature of the connected user and applications they consume means that network, datacenter and application services need to scale and shift as demand and usage profiles vary across location, time and activity. IT organizations need an end to end management system that can help them deploy, monitor and manage their physical and virtual infrastructure to meet the application experience expectations of the connected user. This session will cover how Cisco Prime products for IT provide an integrated management platform to deploy and assure application experience from the Connected User to the Data Center.
BRKSPV-3112 - Industry & technology developments: HEVC, UltraHD and video production (2014 San Francisco) In this breakout session we will review the following technology developments: Every decade the video coding industry has come up with a major new codec: MPEG-2 in the 1990s and H.264/AVC in the 2000s which enabled the delivery of new services such as HD. The work to improve compression hasn't stopped. In early 2013, MPEG and JCT-VC finalized their latest codec known as HEVC (High Efficiency Video Coding) or H.265. We will review how HEVC enables the delivery of new services at either lower bitrates, better picture quality or high resolutions that H.264/AVC. Ultra High Definition (UHD) provides 4 times the resolution of current HDTV and has been under trial at events such as the London and Sochi Olympics or the Confederations Cup. Whilst much focus is on the higher resolution, other developments linked to UHD provide additional value to such a system. We will have a look at how the end to end chain is impacted, from creation to delivery. Finally, with the move from traditional SDI interfaces for the carriage of uncompressed video to IP, the timing and synchronization of encoders, mixers, video servers and other elements will require a new system to be introduced. We will look at how the industry is addressing this change and the different ongoing efforts.
5.0/5.0
BRKSDN-2777 - Open Network Environment (ONE) Software Development Lifecycle (SDLC) (2014 San Francisco) The Open Network Environment Software Development Lifecycle (ONE SDLC) project brings IT techniques, for continuous integration and software development, to the world of network engineers. Focused on the goal of fully automated end-to-end IT service delivery, the ONE SDLC uses DevOps concepts to marry different disciplines from the network and IT domains. Through a combination of best practices, tools and sample projects, the ONE SDLC will help network engineers bring automation and programming techniques to their domain, and understand how to expose greater value from the network domain for their IT colleagues. Using the ONE SDLC as a common frame of reference, network engineering and IT teams will be able to work together more efficiently with a greater understanding of each other’s respective domains. This breakout session will provide examples of advanced development and tooling techniques based on the DevOPs VM, which combines simulated networks, development tools and fully automated samples.
BRKOPT-2118 - Multi-Layer Network Architectures (2014 San Francisco) This session will explore the role of IP/MPLS, OTN and DWDM when used as individual, independent network layers in Service Provider or Large Enterprises, their main applications and highlight the strengths of each one. It will then introduce the concept of a Multi-Layer Architectures and how they allow tighter integration from a hardware, software and control plane point of to improve the overall network efficiency. The role of the network layers will be revisited in the context of the Multi-Layer Architecture. The session will end with an overview of market trends and evolution and how these architectures will be key to address the exponential bandwidth growth challenge faced by the industry in the next several years.
5.0/5.0
BRKMPL-8624 - Introduction to MPLS VPN During the webinar, Cisco subject matter expert Nagendra Kumar will provide an introduction to MPLS VPN. During the live event he will discuss the common terminology, configuration, and best practices in setting up MPLS VPN networks. To view additional related content such as the Q&A from the session, as well as the Ask the Expert Forum Event that followed the webcast, visit the Cisco Support Community Webcasts
5.0/5.0
BRKSPG-2202 - Deploying Carrier Ethernet Services on ASR 9000 (2014 San Francisco) **The video for this session is unavailable.** The session will cover: - What is Carrier Ethernet and why to implement it? - How to implement and deploy Carrier Ethernet features on ASR 9000? - This includes features like EFP, L2VPNs, IRB, EOAM and other related features - Implementation details and IOS XR configurations - Verification commands for the same. - Case studies, best practices and special features on Cisco ASR 9000 associated with the end-to-end deployment of Carrier Ethernet.
BRKCOM-1002 - Data Center Architectures and Virtual Private Data Centers with UCS (2014 San Francisco) This session will focus on the aspects of connecting Cisco UCS systems with current customer Data Center infrastructures and how the user can programmatically utilize compute, networking, storage, services, and environmental policy via an API, PowerTools, and the Cloupia Unified Infrastructure Controller. This also shows how the UCS integrates to existing LAN and SAN fabrics. Topics to be discussed include mechanisms in configuration, monitoring, enforcing security policy, and offering traditional Data Center services into a server cluster running either single OS, or as virtualized devices. This is presented along with the view of actual cloud design goals and making sense of how some of those ideas can actually be implemented. Specifics on alternatives that customers are deploying with real examples will be presented. This will also include demonstrations of using PowerShell to create servers, and using Cloupia to create end to end services. The focus here will be on building a foundation for Virtual Private Data Center.
5.0/5.0
BRKVIR-2014 - Architecting Scalable Clouds using VXLAN and Nexus 1000V (2014 San Francisco) Are the needs of Virtual Machine networking stressing your VLAN infrastructure? This session will discuss how to use VXLANs and the Nexus 1000V to architect highly scalable data center clouds. Multi-tenant Clouds drive the demand for large numbers of isolated layer 2 network segments. Deployment of cloned vApps with overlapping addresses drives the need for these network segments beyond what VLANs can provide. This session will show how VXLANs on the Nexus 1000V, can be used to provide efficient, dynamic on demand network provisioning. It will cover the requirements and design goals that went into shaping the solution, as well as VXLAN protocol operation, deployment scenarios, best practices and comparisons with other techniques.
5.0/5.0
BRKCDN-2303 - DevOps in Programmable Network Environment (2014 San Francisco) **The video for this session is unavailable.** With the emergence of software as a driver for network and infrastructure orchestration and automation, network programmability has become a key differentiator between various network device offerings. DevOps is a key area of focus not only for the compute block in today's data centers, but it has penetrated into the network tiers as well. This allows for a clear mix of operations and implementation tasks shared between operations and development teams. The new range of Cisco Nexus products allows for the integration with DevOps tools like Chef and Puppet and also provide the device programmability options using Python, XML etc. This session covers the overview of integration between the Network and Compute portions of a data center and the application of this using programmability tools and stacks such as Chef, Puppet, OpenStack and Python. The session will include a deep dive on the industry trending DevOps Network Use Cases.
BRKUCC-2932 - Troubleshooting SIP with Cisco Unified Communications (2014 San Francisco) This session will provide a brief overview of the SIP protocol followed by details on how to troubleshoot SIP call flows using Cisco Unified Communications manager, Cisco VCS / Expressway, and Cisco Unified Border Element. We will explore how to enable debugs and traces to view SIP call flows traversing the system as well as highlighting some of the serviceability features and post-processing tools that can assist in root cause determination. We will then go through some real-world case studies showing problems and how to determine the root cause using the various trace, debug, and serviceability interfaces. Attendees should have experience configuring Cisco Unified CM and CUBE. Some familiarity with the SIP protocol is helpful, but not required.
4.8/5.0
BRKUCC-2450 - Designing & deploying UC networks with Cisco Unified Session Management Edition (2014 San Francisco) As your UC network grows in size or as part of a dual vendor or PBX migration strategy, Cisco Unified Session Management Edition (SME) plays a key role as a centralized aggregation platform in your network architecture. SME provides a multi-protocol, multi trunk aggregation platform that allows you to centralize and simplify your UC dial plan and provide connections to multiple CUCM leaf clusters, 3rd party UC systems, applications and IP PSTN services. Updated for Unified Communications 10.0 release, this session reviews the protocol recommendations for SME deployments and focusses on SIP as the primary Trunk protocol for SME designs. For large scale UC deployments with multiple leaf UC systems, Trunk protocol choices and Trunk configurations need to be considered holistically to provide the UC administrator with a UC deployment that is easy to manage and troubleshoot whilst also providing users with a feature rich UC experience. This session : Describes the benefits of a SIP only SME architecture where a single SME cluster, without media resources, can interconnect globally distributed leaf UC systems. Reviews aspects of SME designs with respect to trunk configuration for end to end features such as DTMF and codec support. Provides design recommendations for SME and Leaf system Dial Plans, Global Dial Plan Replication (GDPR), Call Admission Control options, URI based call routing, application integration and SME sizing considerations. This session is intended to provide design guidance to an audience with a working knowledge of CUCM and SIP Trunking. For an in depth primer session on SIP Trunks and SIP protocol functions and operation. Use the SIP Trunking breakout session (BRKUCC-2006) as a primer for this session.
5.0/5.0
BRKSEC-2088 - Identity Based Networking: IEEE 802.1X and Beyond (2014 San Francisco) **The video for this session is unavailable.** This intermediate session focuses on recent and upcoming innovations in the IOS identity framework. For over a decade, the IEEE 802.1X protocol has been the foundational component of the identity based networks. For a comprehensive secure access solution, we have built complimenting features that takes concept of Identity-aware networking beyond 802.1X. We are starting with a review of the three deployment models (Monitor Mode, Low Impact Mode and Closed Mode), highlighting best practices, benefits, limitations, and advanced features such as NEAT and Per-MAC VLAN. Proximately, we're going to show you a new approach which has been designed from the ground up to be extensible, flexible and agile to enable new use cases, address existing challenges and leverage the intelligence of the network. We will discuss the architecture, the policy model and various use cases demonstrating the new policy model. The target audience are security and network administrators and architects. Builds on content previously offered as BRKSEC-2691.
5.0/5.0
BRKUCC-2270 - Network Media Recording and Streaming with Cisco MediaSense (2014 San Francisco) Cisco MediaSense is an open-standards, network-based platform that supports recording, playback, live streaming, and storage of media, including audio and video, with rich recording metadata. MediaSense's network-based architecture allows for quick availability of the captured media for different applications, regardless of location. This session will cover the uses and architecture of deploying Cisco MediaSense. Topics will include call recording architectures for entire sites or specific phones, Video Greetings with Cisco Unity Connection, Video In Queue, Video on Hold, and API uses for Cisco MediaSense. The session will include the business cases, design guidelines, scaling, and deployment of these topics. After this session, attendees should be able to understand the capabilities of Cisco MediaSense and how it could be leveraged in collaboration deployments.
5.0/5.0
BRKCCT-1002 - Hosted Collaboration Service Contact Center Overview (2014 San Francisco) Update on Cisco Contact Center Integration with Cisco's Hosted Collaboration Services. Update will include current status of program, features available and roadmap
BRKCCIE-3508 - Cisco Extension Mobility Cross Cluster in Cisco Unified Communications Manager Release 10 (2014 San Francisco) This session discusses Cisco Extension Mobility Cross Cluster (EMCC) and its implementation in Cisco Unified Communications Manager releases 9 and 10. It describes the challenges associated with cross cluster registration and explains how EMCC addresses these challenges, how it works, and how to implement it. The session covers basic cross cluster registration, the optional use of cross cluster PSTN access, and the optional use of RSVP agents.
5.0/5.0
BRKARC-3452 - Cisco Nexus 6000 and 5600 with Fabric Extender 2000 Switch Architecture (2014 San Francisco) This session presents an in-depth study of the architecture of the Nexus 6000 and 5600 families of Data Center switches and the Nexus 2000 Fabric Extender. Topics include internal architecture of the Nexus 6004, 5672, 56128, 2000, and 10G/40G cut-through Layer 2 and Layer 3 Ethernet. This session does not cover the Nexus 5500 in detail but will show how the Nexus 6000 and 5600 compare to the Nexus 5500. This session is designed for network engineers involved in network switching design and Data Center architecture. An understanding of switching technologies and the basic operation of the Nexus 5000/5500 Series is assumed. Basic knowledge of routing protocols as well as traditional switching design is recommended.
5.0/5.0
BRKSPV-2951 - Lessons learned from the first deployment of an IPv6 IPTV system (2014 San Francisco) This talk describes the lessons learned from a recent deployment of an IPTV video delivery system into an IPv6-only network. It describes the deployment architecture, and then discusses the challenges overcome. The talk will briefly describe the SP network and the in-home network. The challenges begin with a description of the fairly mundane software changes required to enable IPv6-only operation in the lab - including the well-understood kernel build options, the middleware changes and the application layer changes to support IPv6. This was the easy part. The talk moves on to discuss the challenges that had to be overcome as the system was REALLY deployed. Among these challenges was the design considerations around Any Source Multicast / Source Specific Multicast, the algorithm used to select the local IPv4/IPv6 address on an IPv6-only system, the IPv6 prefix coloring high level design, and configuration of IPv6 prefix coloring in the field. The talk then describes how traditional CBR Video on Demand is carried; compared to how ABR VoD needs to be carried.
5.0/5.0
BRKSPV-1257 - IP Video Evolution (2014 San Francisco) **The video for this session is unavailable.** This session describes the evolution of Cisco's Videoscape Architecture which provides a foundation for IP Video service delivery across managed and unmanaged networks to managed and unmanaged devices. Core to this architecture is a focus on both user experience and interoperability.
5.0/5.0
CPC-1000 - The Cisco Powered Cloud Day Program (2014 Milan) The Cisco Powered Cloud: Connecting Businesses and Providers Please join us to gain insight into what business opportunities and challenges can be addressed with cloud. Our all-day program is designed to be a comprehensive track for organizations adopting cloud and providing cloud. You not only will learn from Cisco cloud leaders but also will hear from other industry leaders who are successfully taking advantage of the cloud with Cisco solutions. Agenda: • Part 1 - A World of Many Clouds and Infinite Opportunity • Part 2 - Cisco Cloud Portfolio – What’s New • Part 3 - Cisco IT Evolution: Embracing the Cloud Opportunity • Part 4 - Accelerating Cloud Services with Application Centric Infrastructure • Part 5 - Innovation Panel: Emerging Cloud Technology and Its Impact on Business • Part 6 - Cloud and Network Orchestration Management • Part 7A - “Cloud Adoption. Realities and Experiences” • Part 7B - Class Editori Journey to Cloud: Benefits and Expectations • Part 8A - Telecom Italia • Part 8B - Video Communication: A New Way of Working with Cloud and Video Technology
5.0/5.0
BRKSEC-3036 - Advanced IPsec designs with FlexVPN (DMVPN phase 4) (2014 Milan) In this session, we will see how FlexVPN can be used in advanced designs such as VRF re-injection, Multicast, MPLS over FlexVPN, Quality of Service and AAA. We will cover the use cases and applicability for Remote Access and Site-to-Site designs. We will expose the protocol suites inside-out in order to facilitate the understand of the design recommendations. At the end of the session, we will also look into the roadmap and performances. This session is targeted to Network Architects and Designers who need to deploy Crypto VPNs in a variety of environments.
5.0/5.0
BRKRST-3320 - Troubleshooting BGP (2014 San Francisco) The Border Gateway Protocol (BGP) is one of the most widely deployed protocols in networks today and is the definitive routing protocol in the Internet. BGP is a flexible protocol, in that a variety of options are available to network engineers. Furthermore, extensions and implementation enhancements make BGP a powerful and yet complex tool. Because of BGP's pervasive deployment across multiple networks and the large number of use-cases that BGP can be applied to, it is becoming increasingly important to understand how to troubleshoot BGP issues quickly and easily. This session examines a framework for troubleshooting that provides attendees with various tools and techniques that they can use to make troubleshooting BGP networks easier.
5.0/5.0
BRKRST-2021 - Comprehensive analysis on Service Provider offerings for Enterprise WAN (2014 Milan) This session is designed for Decision makers such as Enterprise and Network Architects and Network Designers working on Enterprise WAN and Metro networks who would like to understand availability of the Service Providers offerings, and how these services can be leveraged in Enterprise network design. With the evolution of technology and enhancements in Service Provider offerings, they offer a multitude of services based on MPLS, Optical, Ethernet and Mobile technologies. The service portfolio is wide and offers different options for Enterprise WAN and Metro networks. This session explores different Service Provider offerings through relevant use cases which include technologies such as Layer 2 and Layer 3 MPLS VPN, Hub and Spoke VPNs, Metro Ethernet services, Mobile Backup and Internet demonstrating the different ways these technologies can be integrated to a complete solution by the Enterprise customers.
3.0/5.0
BRKNMS-2516 - Service Orchestration & Workflow Automation with Cisco Intelligent Automation for Cloud (IAC) (2014 Milan) In this breakout session an attendee will learn how to take advantage of the architecture design in Cisco IAC to implement a modular and extensible cloud solution using extension points, software patterns and agile software development principles.
3.0/5.0
BRKPCS-2046 - Convergence: A Global Leading Healthcare Services Provider Accelerates Migration to Cloud and Delivers IT-as-a-Service (2014 San Francisco) Come hear how Molina Healthcare, a Fortune 500 Healthcare Services Provider, evolved their traditional infrastructure to a highly virtualized IT environment that supports 4.3 million Medicaid\Medicare members and 5,500 plus employees in 15 states on a foundation of VCE, EMC and Cisco technology. Molina deployed VCE Vblock Systems to become more agile in responding to growth while increasing application performance and availability. Additionally, deploying the EMC, Cisco, and VCE infrastructure has improved total cost of ownership, boosted application and storage performance by 25-40 percent due to integrated compute, storage and network processing, and provided predictable service levels and high application availability. In this session Molina will walk attendees through their journey towards building a cloud computing platform.
BRKPCS-2043 - Microsoft Pro Reveals Top 4 Troubleshooting Tips (2014 San Francisco) Learn time-saving troubleshooting strategies from a network veteran who honed his skills managing Microsoft’s global enterprise network operations. You’ll get a rare look at the performance monitoring methodologies and tools used by the software giant’s network team to ensure on-time application delivery and avoid performance problems. From this seminar, network managers and architects will take away: • Processes Microsoft pros use to quickly prioritize and respond to network fires • Steps for anticipating network problems before they occur • Strategies to cut troubleshooting steps in half • Best practices for performing root-cause analysis on 85% saturated 10 Gb links • 5 career-limiting comments to avoid when fire-fighting with other IT teams
BRKOPT-2102 - Software Innovations and Control Plane Evolution in the new SDN Transport Architectures (2014 San Francisco) In this session, we identify the important software innovations, and SDN control-plane evolution characteristics, that jointly enable more efficient capacity utilization and enhanced SLA for IP/MPLS and WDM transport. We analyze the significant benefits of these future programmable WAN transport architectures that leverage SDN to advance traffic engineering, optimization of converged multi-layer transport, and novel restoration techniques. The session focus on the main SDN transport technologies becoming available in the market place, including SDN controllers like Open Day Light, and new protocol extensions like PCE-P/C, BGP-LS, (Open Flow, Segment Routing, GMPLS, and WSON.)
5.0/5.0
PNLRST-4008 - Advanced - The Business Implications of Software Defined Networking (2014 Milan) Software-defined networking promises great improvements in network agility, ease of deployment, improved manageability and ultimately lower cost of operations.  However, reaping those advantages will involve more than just another software upgrade to your switch.  This session will talk about the implications SDN will on how you operate your network and support your business.  Industry experts share their real-world experiences and perspectives to help you formulate your own SDN strategy.
ITMGEN-3150 - Initial Steps to Building Your Catalog: Working Session (2014 Milan) Having a well-structured service catalog is foundational to achieving the benefits of IT as a Service.  During this session, you will hear key lessons learned during the evolution of the their Services Catalog over the past five years.  Participants will have the opportunity to work in small groups and leverage these lessons learned as they apply them to their organizations.  Attendees will leave with a better understanding of how to build the catalog for their own organization.
4.0/5.0
ITMGEN-2601 - Bridging the Business to IT Architecture Gap (2014 Milan) Enterprise Architecture has been a focus for IT organizations for years.  As capabilities and results mature it becomes obvious that technology architectures generally reflect the complexity of the businesses they support.  Thus, true architectural success and value require alignment between the business and IT.  In this session, hear how Cisco has made progress establishing organizational structures, processes, and governance that bridge the gap between Business and Technology Architectures.  
3.0/5.0
BRKUCC-2932 - Troubleshooting SIP with Cisco Unified Communications (2014 Milan) This session will provide a brief overview of the SIP protocol followed by details on how to troubleshoot SIP call flows using Cisco Unified Communications manager and Cisco Unified Border Element. We will explore how to enable debugs and traces to view SIP call flows traversing the system as well as highlighting some of the serviceability features and post-processing tools that can assist in root cause determination. We will then go through some real-world case studies showing problems and how to determine the root cause using the various trace, debug, and serviceability interfaces. Attendees should have experience configuring Cisco Unified CM and CUBE. Some familiarity with the SIP protocol is helpful, but not required.
5.0/5.0
BRKCRT-2204 - Implementing Cisco Edge Network Security Solutions - Preparing for the SENSS Exam (2014 San Francisco) This session covers the topics to help students prepare for the SENSS exam (300-206) and understand that this advance security course includes topics on Cisco switches, Cisco Routers and Cisco ASA firewalls that are securing the perimeter edge of the network. Specifically, this exam discusses Cisco module security architectures such as Secure X and TrustSec. Plus, the exam covers, infrastructure management, layer 2 and 3 security controls, NAT, threat defense, and Zone-Based firewalls.
5.0/5.0
BRKSPM-2010 - Cisco Quantum Self Optimizing Network (2014 San Francisco) Cisco's Quantum SON Suite enables mobile operators to build heterogeneous Radio Access Networks (RAN) that encompass multi-vendor UMTS & LTE macro cells, small cells and Wifi. Harmonizing all network elements, it generates operational and financial efficiencies, delivers the capacity, coverage and QoE demanded by users and unlocks the possibility of network equipment commoditization. This session will introduce Cisco's Quantum SON Suite, and will show how customers can utilize the solution to make their network more agile, more efficient - and better equipped to meet their key challenges today and tomorrow.
4.5/5.0
BRKSPG-2603 - How to Securely Operate an IPv6 Network (2014 Milan) This intermediate session describes how an IPv6 network can be securely operated. The session explains how the management, control and data planes can be secured. It also covers topics such as forensic, telemetry and lawful intercept. The content is mainly geared to Service Providers but enterprises may also find it useful. It is targeted to security and network architects with operational background. There is also an enterprise version of this session BRKSEC-2003 (you should not attend both as 70% of the content is identical).
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (2014 Milan) This session covers platform specific troubleshooting methods for the Cisco Nexus 7000 Series switch which runs NX-OS. The session will cover some of the differences in troubleshooting IOS / NX-OS devices. We will also cover basic Layer 2, Layer 3 troubleshooting methods for Nexus 7000.The session will include more details on troubleshooting VPC and advanced NX-OS features. Target audience is network engineers and implementation partners.
5.0/5.0
BRKSEC-2206 - Security and Virtualization in the Data Center (2014 Milan) The evolving complexity of the data center is placing increased demand on the network and security teams to come up with inventive methods for enforcing security policies in these ever-changing environments. The goal of this session is to provide participants with an understanding of features and design recommendations for integrating security into the data center environment. This session will focus on recommendations for securing next-generation data center architectures. Areas of focus include security services integration, leveraging device virtualization, and considerations and recommendations for server virtualization. Design and implementation highlights for a typical Enterprise Data Center scenario will be presented as a case study. The target audience are security and data center administrators. Related sessions are BRKSEC-2009 "Securing Cloud Computing" and TECSEC-2670 "Data Center Security"
5.0/5.0
COCDCT-2765 - Inside Cisco IT: Migrating Cisco Oracle ERP systems from RISC/UNIX to Cisco UCS (2013 Cancun) Inside Cisco IT: Migrating Cisco Oracle ERP systems from RISC/UNIX to Cisco UCS
BRKIND-2333 - Capturing Trading Alpha with Performance and Intelligence in Financial Markets (2014 Milan) As ultra-low latency architectures become the foundation of trading fabrics, embedded analytics and instrumentation capabilities are critical to capturing key opportunities in a fast-paced market. Due to these growing data analytic requirements within the architecture, scalable fabrics—without compromised latency—are becoming more important. Join this session to hear industry experts discuss how Cisco’s High Performance Trading Fabric is unique in the marketplace in it’s ability to enable competitive advantage in the form of capturing sustained trading Alpha.
ITM-0003 - The Innovation of Everything (2013 Cancun) As the industry begins enabling the Internet of Everything, the way we work and do business will change at lightning speed. How do you use innovation to drive creativity? How can you optimize technology to free up other resources? Hear from Carlos Dominguez, a leader in innovation, as he shares his eye-opening ideas about how to prepare for the future.
BRKNEG-1128 - XPORTAL: Security and Digital City / Seguridad y Ciudad Digital (2013 Cancun) Issues and Security Solutions for your Business or Project. Temas y Soluciones de Seguridad para tu Negocio o Proyecto.
BRKNEG-1123 - XPORTAL: xPortal Evolution / Evoluciòn de xPortal (2013 Cancun) Case of Studies and Development of xPortal Group Casos de Éxito y Desarrollo de xPortal Group
BRKSUP-2444 - CONNEXT BY MIGESA: Development of Projects of Unified Control / Experiencias en el Desarrollo de Proyectos de Control Unificado (2013 Cancun) SUPER SESSION - CONNEXT BY MIGESA: Development of Projects of Unified Control / Experiencias en el Desarrollo de Proyectos de Control Unificado
ITMGEN-3275 - Embracing Software Defined Networking and Going Beyond (2014 Milan) Application demands within the IT organization are changing rapidly due to the impact of cloud, mobility and big data.  Learn how Cisco is creating the next-generation data center and cloud deployments with Application Centric Infrastructure (ACI).  John Manville, SVP of Global Infrastructure Services will share how his team is currently deploying this new infrastructure approach to simplify and optimize the entire application deployment lifecycle.  
ITMGEN-2885 - Emerging Trends in the Data Center (2014 Milan) A day in the life of an enterprise CIO can be daunting—challenges such as managing complex environments, security and ongoing TCO pressures face us everyday.  Addressing these challenges offer opportunities to significantly improve operations, productivity and have an impact on the bottom line if done successfully.  This session will provide an insider's look at these challenges and offer strategies and technologies to maximize IT environments today and for the future.
CCSEWN-2090 - IAEA: HD WLAN deployment at Vienna International Center (2014 Milan) IAEA deployed HD WLAN at VIC (Vienna InternationalCenter) to provide WLAN services for up to 1.600 attendees of the annualGeneral Conference at Vienna VIC.
5.0/5.0
BRKVIR-2931 - End-to-End Application-Centric Data Center (2014 Milan) Although automation and virtualization have been of important use at Data Centers for resource optimization, the evolution of how applications are built nowadays demand for a new application-centric approach, mainly due to the current mobile-cloud application development reality; the fast growing "BigData way" of building scale-out applications and the upcoming Internet of Everything effect.     Because applications' outcome and associated data are the ultimate asset that - altogether with the network - touches multiple layers within the Data Center, an application–centric approach to its infrastructure is what's really needed, even further as almost all Data Centers do run legacy, traditional and cutting edge applications side-by–side, each of them with distinct infrastructure requirements.     This session will cover Cisco Application-Centric Infrastructure (ACI), its elements and how it actually works.   However, this session will approach this by inviting you to a "end-to-end journey" inside an Application Centric environment.     This ACI environment will be a full policy-based forwarding infrastructure and the journey will go through a secure multi-tenant implementation inclusive of both physical and virtual workloads as well as inclusive of storage, L4-L7 services and WAN connectivity.   All these elements together will then become the sources for a ACI policy-based forwarding required for effective Data Center planning, design and deployments.    Our journey will also cover system management & automation, orchestration tools and how to drive the ACI via API calls and its native Application Policy Infrastructure Controller (APIC).   Considerations on how to adopt ACI when coming from the current network environment and  how these technologies interact are on the scope of this session as well. Please 'Fasten your seat belts' and welcome to the End-to-End Application-Centric DataCenter!   See you there !
5.0/5.0
BRKSEC-2017 - Fundamental IOS Security Features (2013 Orlando) As networks increases in complexity, so does the risk of attacks and vulnerability. This session explores design and deployment of integrated security solutions on Cisco IOS routers to mitigate and protect against these threats. The session will start with fundamental security considerations on how to harden a Cisco IOS router to protect network infrastructure. Topic covered will include password security, login control and user accounting. The session will then move towards protecting the router from resource exhaustion by securing the control plane. This helps protect the router from expected communication. The presentation then finishes with securing transit traffic. Cisco Zone Based Firewall as the framework for securing the data plane. Various defenses against denial of service attacks will be discussed. This presentation provides many real world examples to bridge the gap between theory and application.
4.7/5.0
BRKDCT-2202 - FabricPath Migration Use Case (2013 Orlando) This session will review some of the common FabricPath deployment use cases. This is more focused on Enterprise environments. We will cover deployment best practices, migration strategy, lessons learned and pitfalls to avoid. Additionally, we will discuss top troubleshooting steps, as well as tips & tricks during migration of the FabricPath Deployment.
5.0/5.0
BRKSAN-2047 - FCoE - Design, Operations and Management Best Practices (2013 Orlando) This session will describe some background of Fibre Channel (FC) and Fibre Channel over Ethernet (FCoE) technologies and terminologies, such as Fabric Logins (FLOGI), Fibre Channel Forwarder (FCF), and FIP Snooping, Multi-hop FCoE (VE), and FCoE-NPV. Then it will go into concepts on how to design and configure a Unified network. With the various supported topologies for FCoE, a best practice in design and operational tools will be describe in managing this FCoE enabled network.
4.8/5.0
BRKCRT-3133 - CCNP Security: IPSv7.0 Exam Prep (2013 Orlando) Network Intrusion Prevention and Detection technologies are much more effective when they are deployed and managed effectively.by network and security administrators. In this session, we will discuss the new CCNP Security IPS Exam 642-627. This session will include high level discussion of the Cisco IPS Hardware & Software Overview and touch upon other important topics that will prepare the audience for the exam.
4.7/5.0
BRKARC-3001 - Cisco Integrated Services Router G2 - Architectural Overview and Use Cases (2013 Orlando) This session will update the attendee to the enterprise branch architectures from Cisco. This session will target the technical audience interested in the integrated services available in the latest branch routers from Cisco and the advances that have been made beyond the original ISRs. We'll spend time looking at the latest innovations introduced with the second generation of ISR as well as the capabilities built into the platforms that will allow them to grow with branch needs over time without the need for expensive hardware upgrades. There will be something here for those unfamiliar with Cisco branch routers as well as those intimately familiar with the original ISRs.
BRKCCT-2006 - Update and design of Multichannel Contact Center (2013 Orlando) This session presents an overview of Cisco Unified E-Mail Interaction Manager (EIM), Web Interaction Manager (WIM), and SocialMiner and considerations for designing a multichannel contact center using EIM/WIM and SocialMiner. Topics include new features and capabilities, virtualization, reporting, deployment models and system sizing.
BRKCCT-1050 - Introduction to Cisco Contact Center Capabilities and Design (2013 Orlando) This is an introductory session that introduces users to the basics of Cisco Unified Contact Center Enterprise capabilities and design concepts. Concepts discussed Includ: - Solution capabilities, solution and component sizing, basic architecture. This solution is geared for new or introductory users of Contact Center Enterprise.
4.2/5.0
BRKCCIE-9590 - Frame Relay for Route & Switching CCIE Candidates (2013 Orlando) Due to the reduction of frame relay in the industry, it's become obscure, therefore R&S CCIE candidates are struggling with what used to be considered easy or give-me points. This session is to cover the general operation of frame relay & how it may be used within the CCIE R&S practical exam. 1. Frame Relay basics 2. Router configurations 3. Frame relay advanced topics 4. Troubleshooting 5. Frame relay & routing protocols 6. CCIE R&S examples
4.8/5.0
BRKVIR-2023 - Cisco Nexus 1000V InterCloud based Hybrid Cloud Architectures and Approaches (2013 Orlando) This session will be based on details of Cisco Nexus 1000V InterCloud and related technology and feature capability, and how to design into a secure hybrid cloud with enterprise workloads and network services. Customer and Partners are looking for approaches and technologies to securely extend their data center workloads to public clouds. That too, while maintaining their current operational consistency and paradigms in their current data centers. Service Providers are also looking ways to expand their cloud services and on board workloads. This session will review approach and technical architecture for secure hybrid cloud where enterprises and SPs can extend their network and network virtual services in a secure fashion to public clouds.
5.0/5.0
BRKUCC-2444 - Introduction to Identity Services for Cisco Collaboration (2013 Orlando) We will explorer the most common directories and authentications services that we have today in the customer organizations We will cover the challenges that current organization has from an identity perspective. We will explore the different ways of integrating with directory services in a customer network, give special relevance to Active Directory
BRKUCC-2346 - UC on UCS Overview (2013 Orlando) For baseline prior to BRKUCC-2225 (design) or BRKUCC-1903 (migration). This session covers the Cisco UC on UCS solution at business / technical / product levels. This would include overall Cisco Collaboration direction for virtualization, solution overview, Cisco UCS and virtualization benefits, product / platform / virtualization feature support, differences between Tested Reference Configuration and Specs-based support, how to purchase Cisco UCS and virtualization software and highlights of design and physical to virtual migration considerations.
5.0/5.0
BRKSPV-1261 - Designing an Online Video Service (2013 Orlando) Streaming Video has been around for many years but with the advent of tablets & high speed broadband it has come into its own. This workshop will focus on the new wave of video delivery technologies used in �Over-the-Top� environments & explore the best practice designs used when building such a streaming video service. The session will start by looking at what we are setting out to achieve, and methodically set out the system architecture and each of the various elements that will contribute to the solution, and conclude with a typical example use case.
BRKPCS-2018 - Virtualizing SAP and our Hybrid Cloud Future (2013 Orlando) In the last 3 years Columbia Sportswear has virtualized almost 100% of their Enterprise workloads, including applications some believe are not a good fit for virtualization. In this presentation Michael will describe their journey in leveraging Vblock�Systems to support a 100% virtual environment, including applications such as SAP, PeopleSoft and Microsoft SQL. Additionally Michael will cover various leading edge concepts his team is exploring to further leverage their highly virtualized infrastructure to provide additional value to his business.
BRKEWN-2017 - Understanding RF Fundamentals and the Radio Design of Wireless Networks (2013 Orlando) This advanced session focuses on deep-dive understanding of the often overlooked Radio Frequency part of designing and deploying a Wireless LAN Network. It discusses 802.11 radio, MIMO, APs and antennas placements, antenna patterns. It covers the main environments such as carpeted offices, campuses and conference centers, and it provides feedback based on lessons learned from challenging deployments such as outdoor/stadium/rail deployments and manufacturing areas.
5.0/5.0
PSOSPG-1305 - Service Provider Cloud Managed Services (2014 San Francisco) Service Providers seek private cloud capabilities to improve its services and market delivery. SPs are also exploring becoming public cloud providers as well. This session will talk to both business segments.
PSODCT-1406 - Migrating to Cisco SAN (2014 San Francisco) **The video for this session is unavailable.** As Storage Area Networking (SAN) has evolved, it has always been challenging migrating SAN from one vendor to another one. Cisco is committed to make the migration process simpler by expanding its flexibility and simplicity to interoperate smoothly with Non-Cisco solutions. Cisco SAN switches have set a new industry standard by providing interoperability functionality within MDS switches. In this session we would cover following topics: 1. MDS Product portfolio overview 2. Overview of Technical concepts used during Migration 3. Migration Options 4. Execution and Verification of migration 5. Limitations and things to be aware of during Migration
BRKSEC-2027 - Comparison of Next-Generation Firewall Services on ASA and IOS (2013 Orlando) Cisco's Next Generation Firewall (NGFW) is a natural evolution of the stateful firewall which provides advanced capabilities such as application filtering and identity-aware access control. This breakout session compares the ASA and IOS implementations of NGFW services. We will explain the different architectural components and how these services can be deployed to provide more granular security control to your network. This session is targeted at firewall, network, and security engineers who already possess a good understanding of how firewalls work and want to learn more about Next Generation Firewall services on different platforms.
BSACOL-1002 - Implementing an Integrated Solution for Enterprise Mobility and Collaboration (2013 Orlando) Mobility is critical to any enterprise collaboration strategy. Mobility was ranked the 2nd most important priority in Gartner's annual CIO survey - up from 12th priority just 3-4 years ago. Mobilizing your collaboration investments is no small task. It is an enterprise wide project that involves people, processes and technologies. It is essential that companies have an integrated strategy to connect their business imperatives to mobile collaboration business transformation opportunities. In this session you will learn best practices and key considerations for developing an integrated mobility and collaboration architecture including: 1) Evaluating technology options such as device/app/content management, wireless infrastructure, virtualization, remote access, reporting and analytics 2) Refining existing processes such as defining compliance, eligibility, rate and reimbursement policies 3) Taking into account people considerations such as enforcing EULA and mobile usage policies.
BRKRST-2304 - Hitchhiker's Guide to Troubleshooting IPv6 (2013 Orlando) Are you about to deploy IPv6 in your network ? Afraid that you do not have enough experience yet ? Do not panic! In this session we will follow the recommended outside-in deployment model, starting from Internet Edge, and then going towards the Access Edge and the hosts stacks themselves - and highlight the tricky areas based on the previous practical deployment experiences. Join us for a 2 hour cadence across the broad range of topics including SLB, NAT64, Routing, WLC, FHS, and the end host behaviour.
3.0/5.0
BRKDCT-1253 - Introduction to OpenStack Cloud Computing Software (2013 Orlando) The session will provide an introduction to OpenStack open source cloud computing software which is gaining significant attention in the market. Additionally, the audience will understand how to deploy OpenStack on Cisco products.
4.6/5.0
BRKSPV-2018 - App Development with the Videoscape Open API (2013 Orlando) Until now, the SP Video service comprised of delivery to a STB provided by the SP in a very closed and vertical model - recently, adding support for unmanaged devices like iPads etc have opened this out, but the APIs are still closed and only available by the SP developers. This session explores an open web-services-based open API available to all developers for all devices. We will walk through coding expamples on how a developer can access content and metadata from a SP's video system to provide a rich companion app for multiple devices.
BRKUCC-2344 - Deploying Cisco Jabber on Mobile Devices (2013 Orlando) Cisco Jabber enables core Cisco UC capabilities on any devices to allow its users to collaborate more effectively and efficiently. The core UC capabilities include voice, video, IM/presence, voice messaging and the ability to launch web conferencing. This session will explain how to plan and deploy Cisco Jabber on mobile devices for enterprise customers. We will go through all the configurations in the Cisco UC applications and services to deploy Cisco Jabber on mobile devices. We will talk about key considerations to implement secure remote access with Cisco ASA and AnyConnect Secure Mobile Client.
4.0/5.0
PSORST-3000 - Maximize Your WAN Investment with Cisco Intelligent WAN and Akamai (2014 San Francisco) Cisco Systems and Akamai Technologies deliver the world’s best optimization solution for Web traffic with a high-quality user experience for both public and private cloud applications to all remote offices. This solution includes best-of-class routing, security, and WAN optimization; unparalleled acceleration; caching; connected caching; and Internet traffic optimization based on technologies from both companies. Through this integrated solution powered by the Cisco Integrated Services Router with Application Experience (Cisco ISR-AX), customers will be able to significantly offload traffic from their enterprise WAN traffic and Internet links not only to provide a superior end-user experience but also maximize their WAN return on investment (ROI) while lowering costs. The session will cover the business challenges the joint solution addresses, and provides the solution overview including benefits for the business, end-customers and IT.
5.0/5.0
BRKSPM-2001 - Deploying Service Provider Wifi (2013 Orlando) SP Wifi has emerged as the answer for both mobile operators who want to offload data as well as for traditional SPs (ILECs & Cable Operators) who want to provide seamless user experience between wired and wireless subscribers. This session will walk through the different architecture models of SP Wi-Fi networks as well as provide the practical aspects of design and deployment for both mobile operators who want integration into 3G/4G Mobile Packet Core and cable operators who desire Fixed Mobile Convergence (FMC). Main topics will include Access, Backhaul, Authentication/Authorization, Address Allocation, Session Management, Redundancy/Load Balancing, Accounting/Billing/Policy, Web Portals, Mobility, Network & Subscriber Management. We will provide the right amount of detail by using call flow, relevant configuration samples and packet traces for you to walk away with a very good idea of what is involved in designing and deploying an end-to-end SP Wifi network.
5.0/5.0
PSOSPG-4325 - ASR9K BNG Update (2012 San Diego) The BRAS architecture is rapidly moving to Ethernet based deployment with proliferation of applications/devices which are bandwidth hungry. The industry is moving towards an architecture which can help address the bandwidth need , which can help service provider increase their customer penetration and which can evolve to next generation requirement. This session will provide an update on the BNG strategy of Cisco ASR9000 router series.
5.0/5.0
PSODCT-3863 - Journey to the Cloud: Benefits of a IT-as-a-Service (2012 San Diego) IT-as-a-Service and private clouds offer an ideal way to solve some of your organization's biggest business and technology challenges. A private cloud service delivery model can helps reduce costs, reach new levels of efficiency, and introduce innovative new business models. Consequently, your enterprise can become more agile and efficient, while simplifying its operations and infrastructure. Learn how the use cases in the journey to IT-as-a-Service and cloud can help you be more efficient and add new capabilities to your data center.
ITMGEN-4649 - Pervasive Security (2012 San Diego) “Is Security coming more into focus for you given the dynamics of today’s workforce with BYOD, business models & value chains extending beyond borders, attackers using sophisticated techniques? Are you prepared to deal with these changes and enable your business? If you are asking yourselves these questions, this session is for you. Bill Bragg, IT Director for Engineering and Sujata Ramamoorthy, Director of Information Security, both long time Cisco veterans will share their insights from an initiative they are currently leading at Cisco to prepare for exactly these dynamics. This is a CIO level transformational initiative called Pervasive Security Accelerator with focus on IT Security Governance/Operating Model, Security Architecture and acceleration of key capabilities. You can expect to hear the drivers, approach, architecture and key efforts tied to use cases that make up the program.
BRKUCC-2542 - Cisco Business Edition Solutions for SMB (2012 San Diego) This is an intermediate breakout session that will cover the Cisco Unified Communications Business Edition portfolio for Small and Medium sized customers. The session will provide a recap of features and deployment best practices for Unified CMBE 6000 and Unified CMBE 3000. It will introduce the new Cisco Unified Provisioning Manager tool that simplifies configuration of Unified CMBE 6000. Updates to the portfolio in System Release 9.0 will also be covered.
PNLSEC-4006 - Panel: BYOD: Managing the Proliferation of Smart Devices in the Enterprise (2012 San Diego) BYOD is Real, it’s Here. The BYOD (Bring Your Own Device) into the workplace environment is in full swing, creating an entire new set of issues for CIO’s and IT departments, as “mobility” invades the enterprise. How does an IT department cope with the proliferation of smart devices, dealing with issues such as access, bandwidth and management. Theft, device insecurity, poorly developed apps, corporate data accessibility – these are but a few of the realities that IT departments will have to face when travelling down the BYOD road. Hear from our panel of experts and how they are managing with this growing phenomenon.
5.0/5.0
ITMGEN-4839 - Simplify IT and Ignite Innovation with Oracle and Cisco (2012 San Diego) Join us for a breakfast conversation on how you can foster more innovation in your organization and improve productivity and performance by streamlining IT.
5.0/5.0
ITMGEN-4647 - Optimizing the Workforce of the Future: When Generations Collide (2012 San Diego) By 2016, 50% of the workforce will be millennials, along with Gen X, Gen Y and Baby Boomers. This creates an unprecedented mixture of cultures, learning styles, business acumen and technology proficiency. How are IT departments preparing for this influx of new workers, while retaining the experience and efficiencies of older workers? How do the expectations and rewards for the generations differ? What truly motivates them? What do you need to do to attract, cater to and understand the future workforce? Join this interactive session as we dig into the strengths and weaknesses of the generations and what they need to be successful both personally and for the business.
ITMGEN-4632 - Innovation in the Enterprise (2012 San Diego) Everyone talks a lot about innovative being a key driver to success, but exactly how do you create an innovative enterprise or business unit? How can you take advantage of market transitions and create a more inspired, efficient IT organization? Hear from leading experts, Thomas Koulopoulos, Author and Founder, Delphi Group and Carlos Dominguez, SVP, Cisco, as they discuss how they see innovative taking root within IT.
COCDCT-3468 - Inside Cisco IT: Private Cloud Architecture Designed for Business Continuity (2012 San Diego) The private cloud is one of today’s fastest growing data center solutions, and the significance of a secure architecture for business applications agnostic to the infrastructure is increasing. Cisco IT is building the foundation for business resiliency; however, resiliency at every layer of the business environment requires a holistic approach to managing and orchestrating infrastructure, platform, and application resources within a data center and across multiple data centers. This enables Cisco IT to automate delivery of end-to-end data center and infrastructure services to the business. Cisco IT has been a fundamental driver in building and adapting the suite of management tools needed to orchestrate virtual data center infrastructure needed to deliver business services. Attendees will learn how Cisco IT is designing and deploying these next-generation virtual orchestration solutions and directions for cloud services management. Cisco IT is migrating all its traditional data center applications to a radically simplified virtual infrastructure. This has significantly reduced the number of network and server devices and the cable overhead within the data center, while also speeding deployment time and overall application deployment agility. We have aggressively deployed Cisco Unified Computing System servers and Nexus physical and virtual switches, OTV, and Cisco Intelligent Automation for Cloud to provide cloud services inside Cisco. Attendees will learn about the difficulties involved in migrating a heterogeneous set of applications to an internal private cloud. Attendees will also hear Cisco IT’s initial results of this server platform migration in terms of cost savings as well as enabling more reliable data center architectures at an acceptable cost. Additionally, we can share Cisco IT’s early experience in creating and expanding cloud services within the enterprise. Session highlights include: • Elastic Infrastructure as a Service • Active – active Multitenant data center design • Cisco intelligent automation for cloud • Business resilient design for UCS and Nexus Switches • Cisco IT application optimization for a private cloud • Driving higher utilization of IT assets • Risk mitigation • Reduce SLA recovery times by 60% • Leverage workload mobility, OTV, and LISP to build a comprehensive disaster recovery architecture
3.0/5.0
CCSSEC-2202 - Clouds in My Coffee: How -- and Why -- a Global Leading Pharma CRO is Making BYOD Ubiquitous (2012 San Diego) The world’s largest leading Global pharmaceutical services provider Quintiles has been undergoing a technology revolution. A revolution in the way its employees work, the way its customers interact with the company, and the way the company is leading a competitive transformation through their IT organization. As part of that transformation, Quintiles has sought a reasonable way for its 23,000 employees to bring their own devices to their offices – smartphones, laptops and tablets of any kind and they’re making it simple for those employees to access information and applications. A trip to the local Starbucks convinced a few of their top executives that it was easier to get on the network at the coffee shop than it was in their own environment and thus the company’s BYOD initiative was born. But, it was the Cisco Identity Services Engine (ISE) that helped put BYOD into action, providing secure, role-based wireless access for its myriad users, regardless of device or location. Founded 30 years ago, and now the global leading pharmaceutical research and services company, Quintiles has helped develop or commercialize all of the top 50 best-selling products or compounds used in prescription drugs and can make similar claims for at least the past 10 years. Protecting their intellectual property is a given, yet the company was faced with the reality that most people bring at least one wireless device with them to work, and increasingly that’s more than just a smartphone. Employees wanted the flexibility to be able to work anywhere, anytime, whether in the office, on the road or at home. Now the global firm has revamped its IT infrastructure, including its unified wireless capabilities, expecting to roll out to 110 sites by the end of 2012 providing a borderless network experience for applications, voice and video. Thirty of the company’s branch offices already enable employees to register their iPads and jump on the BYOD network. In the next phase, they will lock down wired ports for contractors who frequently reside in hot desk and shared work areas. The final phase will expand the build-out of network access from home leveraging CVO for some of the companies power users who are home based. Each user group has differentiated access based on the control that the Cisco ISE provides. Their BYOD user base is expected to triple beyond the current 2000 concurrent users through 2013. The result is that the company can be better supported in advancing its business initiatives regardless of location, more closely work with its customers and contractors, and not be trapped with cumbersome network access policies and processes while keeping the network and its data secure.
3.0/5.0
BRKSEC-1003 - Social Networking Security (2012 San Diego) This session will talk about the security concerns of social networking and the impact it has to employees and also the company. Even if the social software is hosted within the enterprise, how this affects your company – who owns the data, where is the data stored, what international or state laws apply. What Personally Identifiable Information (PII) is the company allowed to retain if the system is internal vs. external, where the data is required to be stored internal vs. external deployments. This session will also talk about mobile clients possible ways to control the data on those systems, if they are Bring Your Own Device (BYOD) and what users responsibilities are in the case that they are using their own devices within the enterprise. The session will also look at company policy and why a policy is required for any social networking software even if the employee uses a system for personal use only.
BRKCOL-2181 - Deploying Cisco Quad - Enterprise Social Software (2012 San Diego) This session will cover at a high to medium level architecture, deployment models and requirements for implementing Cisco's Quad Enterprise Social software.
BRKEVT-2800 - Overview of Cisco TelePresence Solution and Deployments (2012 San Diego) Over the last few years, the growing interest in enterprise video collaboration has driven the development of different solutions: traditional room videoconferencing, immersive TelePresence experiences, personal video telephony, PC-based video clients and web collaboration. Enterprise customers are now faced with the challenge of integrating these solutions into a single TelePresence architecture that optimizes the end user experience. This session provides an overview for all components of a TelePresence deployment including: endpoints, call control, conferencing, and scheduling/management. Subsequent breakout sessions will cover specific components of the TelePresence solution in depth.Recent features and functionality will be covered as well as our direction for the future. Many of the these most recent features are dependent on the grouping of specific software versions across the solution. This session will explain these requirements and dependencies to ensure a successful TelePresence deployment. This breakout will cover the entire TelePresence solution including CUCM, VCS, TelePresence Server, CTMS, MCU, TMS, CTS-Manager and endpoints.
BRKSAN-2047 - FCoE - Design, Operations and Management Best Practices (2012 San Diego) This session will describe some background of Fibre Channel (FC) and Fibre Channel over Ethernet (FCoE) technologies and terminologies, such as Fabric Logins (FLOGI), Fibre Channel Forwarder (FCF), and FIP Snooping, Multi-hop FCoE (VE), and FCoE-NPV. Then it will go into concepts on how to design and configure a Unified network. With the various supported topologies for FCoE, a best practice in design and operational tools will be describe in managing this FCoE enabled network.
4.5/5.0
BRKCCT-1041 - Changing the way we record voice and video on the network with Cisco MediaSense (2012 San Diego) This session presents the Cisco MediaSense 8.5 solution to enable voice and video recording in the network, leveraging integration with industry leading application providers. The session will describe the functionality included in MediaSense 8.5 and provide a roadmap for additional features planned for the technology. Special focus will be provided on new use cases, deployment architectures, and applications enabled by open programming interfaces.
BRKDCT-2237 - Versatile architecture of using Nexus 7000 with F1 and M-series I/O modules to deliver FEX, FabricPath edge and Multihop FCoE all at the same time (2012 San Diego) This session will highlight various design options of deploying Cisco Nexus 7000 switches in a physical topology simultaneously supporting top of rack Fabric Extenders, Cisco FabricPath edge and Multihop FCoE technologies. When Cisco Nexus 7000 switches are equipped with combination of different module families, such topology has unique design considerations. We will walk through how leveraging device virtualization techniques allows us to deploy those technologies in consolidated fashion utilizing existing F1 and M-series I/O modules.
5.0/5.0
BRKRST-3052 - IP FRR: Network Availability and Simplicity (2012 San Diego) Internet Protocol (IP) was architected as a best-effort network protocol, traffic loss for tens of seconds was acceptable and tolerated. Newer applications imposed tighter requirements on service restoration after a network element failure, especially for Voice and Video traffic but also for numerous Business Applications. This session will describe latest enhancements with routing resiliency technology such as LFA FRR and BGP FRR. We will also describe a new way to monitor resiliency on a deployed live network.
5.0/5.0
BRKRST-2310 - Deploying OSPF in a Large-Scale Network (2012 San Diego) This session discusses techniques and issues with deploying Open Shortest Path First (OSPF) Protocol in large-scale networks, including how to make OSPF work well in a wide variety of situations. Topics include summarizing topology information (flooding domains), aggregating routing information (summary statements), hierarchical networks and OSPF, options and tradeoffs in placement of available bit rates, stub areas, aggregating and filtering routes in OSPF, specific topologies, nonbroadcast multiaccess (NBMA) options and more.
4.0/5.0
BRKCCIE-1001 - Cisco Data Center Training and Certification portfolio evolution (2012 San Diego) Learn about how the whole portfolio of training and certification products from Cisco is evolving to address the needs and the changes in job skillset that the virtualization and the cloud atre bringing to the industry.
BRKDCT-1253 - Introduction to OpenStack Cloud Computing Software (2012 San Diego) The session will provide an introduction to OpenStack open source cloud computing software which is gaining significant attention in the market. Additionally, the audience will understand how to deploy OpenStack on Cisco products.
5.0/5.0
BRKRST-2040 - WAN Design and Deployment using the Cisco Smart Business Architecture (SBA) (2012 San Diego) WAN Design and Deployment using the Cisco Smart Business Architecture (SBA) This session discusses WAN design and deployment best practices as outlined in the Cisco Smart Business Architecture (SBA). The Smart Business Architecture offers an end-to-end validated reference design for enterprise and midsize organizations that provides a path for accelerating the adoption of technology. The cornerstones of the approach and techniques discussed in this session are real-world use cases, prescriptive design guidance, and modular architectural components. The SBA methodology incorporates a highly available, flexible and scalable WAN-aggregation design that supports remote sites connected by MPLS Layer 3 VPN, Layer 2 WAN (VPLS/Metro Ethernet) and DMVPN as either primary or secondary WAN transports. Resilient Wide Area Application Services (WAAS) support for the remote sites is fully integrated into the design. A key focus area for the remote sites is how to accommodate growth and changing requirements and how the SBA designs provide a straightforward migration path to more resilient topologies and increased scale. The remote-site designs are modular; including single-router and dual-router WAN edge designs with multiple WAN transports, including options for 3G wireless WAN. The access and distribution layer options, WAAS integration, and their methods of interconnection to the remote-site WAN edge are also discussed. The session will focus on the consistent enablement of capabilities such as high availability, quality of service, application optimization, multicast, and encryption across a range of Cisco routing and WAN optimization platforms. This session is applicable for attendees responsible for the design deployment, operations, and management of the WAN and remote sites. Topics within this session are also covered in TECCRS-3963. Although not required to register for this session, attendees will benefit from having an understanding of routing fundamentals equivalent to a CCNA level.
4.8/5.0
BRKARC-2007 - IOS Strategy and Evolution (2012 San Diego) Cisco IOS is the foundational software that is pervasive across the majority of our products. Today, with the melding of various market requirements, we have evolved our software to address these transformative needs with IOS XE, NXOS and IOS XR. The goal of this session is to explain Cisco's overall OS strategy and the shift in networking software development to drive greater consistency, flexibility, and time to market via modularity, componentization and use of an abstraction layer. Our OS infrastructure evolution includes support for a broader set of services providing a lower cost of ownership. We will also discuss the new Release 15 strategy, including the relationship between IOS and IOS XE, explaining how it allows for (delivery of new features and) feature parity across IOS, IOS XE, NXOS, and IOS XR in the future.
BRKSPV-1367 - Insertion Strategies for Next Generation Video (2012 San Diego) Until today, there has been a "wall" between a service provider's traditional video services and the internet. Now, with broadband connections that are ubiquitous and faster than ever before, internet and traditional SP services are converging. This market disruption is driving significant changes in the video architecture. CDNs, gateways, next generation content management systems, transcoding systems, data center technologies, IP-based video delivery - all of these architectural components play a key role in enabling service providers to compete and win as we evolve to the "Next Generation Internet." These architectural shifts and how they insert into an existing Video and Next Generation network is the focus of this session.
BRKCCIE-9592 - IPv6 for Route & Switching CCIE Candidates (2012 San Diego) IPv6 is expanding in the industry and within the CCIE routing and switching practical exam. This session is to cover the general operation and theory of IPv6 and how it may be used within the Route & Switching CCIE practical exam. This session will not look at real world applications, but at examples of how it may be presented within an exam. Session will cover: - IP version 6 (IPv6) addressing and different addressing types; - IPv6 neighbor discovery; - Basic IPv6 functionality protocols; - Tunneling techniques; IPv6 Unicast routing; - Filtering and route redistribution; - IPv6 Multicast; - IPv6 and 3560 switches; - IPv6 NAT protocol translation; - Troubleshooting; - CCIE R&S examples
3.5/5.0
BRKMPL-2101 - Deploying MPLS-based Layer 2 Virtual Private Networks (2012 San Diego) This breakout session covers the fundamental and advanced topics associated with the deployment of Layer 2 VPNs over an MPLS network. The material presents a technology overview with an emphasis on ethernet-based point-to-point and multipoint VPNs. Session content then focuses on deployment considerations including: Signaling/Auto-discovery, QoS, OAM, Resiliency and Inter-AS. The attendee can expect to see sample configurations (IOS, IOS-XR and NX-OS) associated with the provisioning of L2VPNs. This is an intermediate-level course that requires familiarity with MPLS. Previous attendance of session BRKMPL-1101, "Introduction to MPLS" is highly recommended. This session is intended for service providers and enterprise customers deploying L2VPNs over their MPLS network.
5.0/5.0
BRKSPG-2404 - Energy Efficient Data Center: Best Practices (2012 San Diego) Rising energy prices and drastic increases in the density and power requirements of server and storage solutions have made energy management critical to efficient data center operation. IT managers must integrate power considerations with availability, scalability, and resource utilization requirements to cost-effectively deliver robust service levels. Cisco is a company dedicated to advancing energy efficiency in data centers and computing ecosystems. This session will provide attendees with an overview of technology trends, industry-wide recommendations on best practices, metrics and technologies that will improve overall data center energy efficiencies. Attendees will receive information on assessing their data center energy usage and best practices and technologies which can help to improve their energy efficiency.
4.0/5.0
BRKEWN-2027 - Design and Deployment of Outdoor Mesh Wireless Networks (2012 San Diego) This intermediate session will describe the Outdoor wireless products involved in delivering outdoor broadband wireless services for Service Providers, Municipalities, Transportation and other end user customers. The Cisco Outdoor Wireless Bridging and MESH Technologies will be discussed in detail. The session is intended for wireless network architects, network designers, network planners working in Service Providers, Systems Integrators, small providers and enterprise customers. Attendees should have some base knowledge in configuration of IP routers, Wi-Fi access points, and policy management. Basic understanding of Controller Architecture and Service Provider networks and services is required.
5.0/5.0
BRKEVT-2807 - Enterprise Video Network Performance Analysis with Medianet (2012 San Diego) The session will discuss the current challenges and the available solutions for enterprise network operators for assessing network performance for voice and video traffic. This session will discuss Cisco Medianet video monitoring features and deployment strategies that will answer these common network operational questions; how do you know if your network is ready to support voice or video traffic? How does the network perform against peak time voice or video traffic? This session will demonstrate how Cisco medianet monitoring tools can be used identify and optimize an underperforming network to improve enterprise users video quality experience. Cisco medianet video monitoring implementation strategies will be used to identify the problem and show how the network can be optimized to improve the video quality experience.
BRKRST-2051 - Software Defined Networks and OpenFlow (2012 San Diego) Software Defined Networking (SDN) is a new approach to networking, complementing traditional network architectures. SDN aims at the normalization of network configuration and control through open programmatic interfaces to individual network devices as well as to the whole network. SDN incorporates concepts for network and network topology virtualization, and enables customized control planes. The latter allows close alignment of the network forwarding logic to the requirements of applications. OpenFlow is a specification being developed by the Open Networking Foundation (ONF) that defines a flow-based forwarding infrastructure and a standardized application programmatic interface (API) that allows a controller to direct the functions of a switch through a secure channel. This session supplies an overview of the different concepts present in SDN, discusses contributing technologies, and reviews OpenFlow as a protocol. The SDN concept is put into perspective with existing and evolving network architectures and principles.
4.8/5.0
BRKAPP-2029 - Design and Deployment of mission critical applications in the health care industry using a Cisco infrastructure (2012 San Diego) The exponential growth of technology in hospitals is forcing administrators to develop Health Care Information System (HCIS) infrastructures that support near zero downtime. This session will discuss advanced design and implementation guidelines to deploy this kind of applications that include server & client virtualization, automation & orchestration for disaster recovery, and client access. Reference architectures developed with HCIS vendors will be discuss in detail. Although we use HCIS as the use case the concepts are applicable in other industries with similar demanding requirements.
ATE-CL209 - Ortronics: Passive Thermal Management in the Data Centre (2012 London) This session will address the key issue of thermal management in the data centre. Ortronics, a Group brand Legrand, will begin at the foundation level, with best practices in infrastructure design, and subsequently address the specific steps to take when implementing a cold aisle containment system. Attendees will leave this session with an understanding of practical airflow improvements and the resulting energy and cost savings for their facility
5.0/5.0
BRKDCT-2340 - Virtual Bridge Port Extension (2012 San Diego) This session introduces and explains the IEEE 802.1-Qbh Architecture, which has now renamed into IEEE 802.1BR, and is close to be finished and submitted for publication. The session covers some of the history and evolution, starting from VNTAG over IEEE-802.1-Qbh and ending with IEEE-802.1BR, in explaining the principles of extending a standard IEEE-802.1Q Bridge with tagging based methodology. During this session you will learn about the main components and functions of an extended bridge (VDP; E-TAG; CDP; TLV's;...). How mobility, traffic isolation, multicast, and much more ... work over an extended bridge. The entire Cisco Nexus-FEX product line, as well as the UCS Architecture is based on the IEEE-802.1BR Architecture. After this session tattendees will understand the principles of an extended Bridge, functions and components, and the related Cisco implementation of it.
4.0/5.0
BRKPCS-4908 - Security Architecture: Coordinating Your Defenses (2012 San Diego) Today's hybrid networks are complex, dynamic, and ever-changing and threat landscapes are constantly evolving. Today's sophisticated security opponents are systemically assessing the weakest links in your security architecture. Your defenses are the strength of your aggregate security elements. In fact, the actual exposure of your critical resources is greatly impacted by the collective state of your infrastructure configuration TODAY; and may not be related to the findings from a penetration test two months ago. Thwarting today's sophisticated enterprise attacks requires consideration of more than just potential direct attacks, but also scenarios that involve indirect attacks. While scanning and penetration testing can provide important insights, they are limited to evaluating active conditions at a specific point in time. Join us as we talk about how systemic, automated continuous monitoring and analysis of your enterprise security architecture is a necessary strategy to winning today's security battles and can help your skilled resources prioritize their efforts to shut down attack paths and threat sources and make better daily operational decisions.
2.0/5.0
BRKCRT-8163 - CCNP Security: Securing Networks with ASA VPNs - CCNP Security Exam Preparation (VPN v2.0) (2012 San Diego) This session is a fundamentals ASA VPN lecture (using ASA 8.4) for participants seeking the CCNP Security certification. We will discuss VPN design, model selection, and solution integration. ASA operations topics will include configuration and verification of IPSec Site-to-Site VPNs, Remote Access VPNs, and Dynamic Access Policies.
5.0/5.0
BRKSEC-3172 - Advanced IOS XR Security (2012 San Diego) Networks have evolved into a critical infrastructure that requires a robust protection model from unauthorized access and attacks. IOS XR has developed a model that provides hardware based automatic protection for critical CPU resources. In this advanced session attendees will get a review of traditional security practices and how to deploy them on IOS XR. Also, you will gain an in-depth understanding of Local Packet Transport Services (LPTS) and Management Plane Protection (MPP) which provide the central infrastructure for IOS XR control and management plane protection. An understanding of how data plane protection in IOS XR works will also be gained from the session. Attendees are assumed to have a good knowledge of Service Provider security (protecting management, control and data planes) as well as IOS XR architecture.
5.0/5.0
BRKNMS-1032 - Network Management KPI's (2012 San Diego) An introduction to Network Management KPI's ( Key Performance Indicators) and best practices on what they mean and how they should be implemented. This session is intended for Technical leads and Managers that work in Operations, or with Operation teams. Understanding KPI's is important and how to use them to present information to your customer as well as how to use the data to improve internally. Session will also include an overview of ITIL with a focus on Incident, Change, and Problem Management. It will cover QA checks what they are some key points on what to do and not to do. Sample of where the data comes from and what the process is to generate the final KPi’s and graphs etc. The session is not technology specific and does not dive deeply into any technology specific KPI’s. It does cover generic Operational KPI’s based around the ITIL process guidelines in detail.
5.0/5.0
BRKSEC-3005 - Advanced IEEE 802.1X (2012 San Diego) This session builds focuses on design optimization and troubleshooting IEEE 802.1X. Drawing on real-world examples, we examine complex system interactions that can occur when deploying IEEE 802.1X and how to prepare for those situations. We briefly review three deployment models (Monitor Mode, Low Impact Mode, and High Security Mode), focusing on best practices, benefits, limitations, and advanced features such as NEAT. The session will also address how to troubleshoot common problems in each model, including authentication failures, authorization failures, IP telephony failures, and other complex system interactions. A basic understanding of IEEE 802.1X is required.
5.0/5.0
ITMGEN-2621 - Social Networking - Business Tool or Personal Space (2012 Melbourne) Social media is not a fad. It's here to stay and changing everything along the way. Social media is transforming how people communicate and collaborate, and in the process, is giving everyone a voice and the ability to change the world with a single tweet. People now have the power to voice their opinions or to organise millions to rally against causes or injustices. We have much to learn, teach and share with each other. I hope to share with you my stories and knowledge at Cisco Live so that we can truly be social!
BRKUCC-2058 - Understanding Cisco MediaNet and Rich Media Collaboration (2012 Melbourne) Are you stressed out about how to monitor your Cisco TelePresence Video deployment? Collaboration is having an increasing impact to the network, user work style, network applications as well as expectations from the network. Application and network operators are challenged with providing a reliable collaboration service that works every time. However, issues do occur and in this session we will cover strategies for quantifying video conferencing demands, fault identification , isolation as well as expedited resolution. We will cover architectural strategies for both the endpoint and the network as well as the day to day tools that provide much improved visibility into application health and performance to asses measure and accelerate troubleshooting of voice/video/data applications. Standard MIBs and alerting mechanisms as well as new management tools, new monitoring features like IOS and MSI performance monitoring, mediatrace and IPSLA VO will be covered. Live demonstrations of the tools and technology will be used to provide tangible context. Join this session, learn about the latest tools and strategies and get back the enjoyment from your TelePresence deployment! Are you stressed out about how to monitor your Cisco TelePresence Video deployment? Collaboration is having an increasing impact to the network, user work style, network applications as well as expectations from the network. Application and network operators are challenged with providing a reliable collaboration service that works every time. However, issues do occur and in this session we will cover strategies for quantifying video conferencing demands, fault identification , isolation as well as expedited resolution. We will cover architectural strategies for both the endpoint and the network as well as the day to day tools that provide much improved visibility into application health and performance to asses measure and accelerate troubleshooting of voice/video/data applications. Standard MIBs and alerting mechanisms as well as new management tools, new monitoring features like IOS and MSI performance monitoring, mediatrace and IPSLA VO will be covered. Live demonstrations of the tools and technology will be used to provide tangible context. Join this session, learn about the latest tools and strategies and get back the enjoyment from your TelePresence deployment!
ITMGEN-2010 - Coping with the Explosion of Mobile Devices (2012 Melbourne) When your CEO implements drastic changes on new devices you need to support, how do you handle the impact on the network? How do you control your data when it's accessible almost anywhere by a demanding workforces? What security measures are scalable to prepare for the future? How can you plan for the next big push? Share your experiences - good and bad - with your peers. Does your organisation struggle with the idea that the boundaries between work and play are blurred? Are you seeing an increase in productivity with the use of social tools? Session Summary: - Learn the history behind Cisco IT's transformation from a completely restricted, corporate provided mobility strategy to an open, Any Device strategy - Hear about the borderless security architecture Cisco built to quickly enable devices from all major manufacturers - Understand the unique liability model Cisco implemented and how it enabled device choice and reduced cos Questions: - What was the single biggest challenge in moving to an Any Device model? - Do you have thoughts on how 4G networks change usage patterns? - How well is community support working for you? - Can I have a free iPhone? (no)
BRKUCC-2041 - Unified Communications Security: Design and Best Practices (2012 San Diego) As the feature and functionality available within Unified Communication systems advance, maintaining security, reliability and confidentiality of the voice and video traffic traversing over IP networks becomes a growing challenge. This session explores the different vulnerabilities that an Enterprise Unified Communication system can be exposed to and the mechanisms available to address them and mitigate possible attacks. This intermediate session discusses design options available for securing the Cisco Unified Communication system. It also presents the best practices recommended for implementing the various security tools and technologies available within the UC product family.
4.8/5.0
ITMCOC-2577 - Inside Cisco IT: Pervasive Video Strategy (2012 London) You've decided to expand from five video endpoints to 500, but where to start? Planning for pervasive video is tougher than supporting voice or data, but it doesn�t have to be overwhelming. Learn from Cisco IT's four-year journey integrating thousands of endpoints and gain valuable insight for your own deployment. Just as vital as technology are the process and culture changes required for holistic video management. Not only will you learn about the deployment of video, but also how to align to your business values and increase user adoption. Beyond the technology itself, it�s important to understand the implementation processes involved and how to drive culture change throughout the organization.
ITMCOC-2568 - Inside Cisco IT: Elastic Infrastructure Services (2012 London) The Private Cloud is one of the fastest growing solutions today and the significance of the secure multi-tenant data center on business goals is increasing. Cisco IT is building the infrastructure foundation for Cloud Computing, but true virtualization of the data center environment requires a holistic approach in managing and orchestrating network, server and storage resources within a data center and across multiple data centers. Cisco IT has been a fundamental driver in building and adapting the suite of management tools needed today to orchestrate virtual data center infrastructure to deliver business services. Attendees will learn how Cisco IT is architecting, designing and implementing these next-generation virtual data center orchestration solutions, and possible directions for cloud computing management. Cisco IT is migrating most of their traditional data center applications to a radically simplified virtual compute platform. This has significantly reduced the number of network and server devices and the cable overhead within the data center, while also speeding deployment time and overall application deployment agility. We have aggressively deployed Cisco Unified Computing System servers and Nexus physical and virtual switches to provide the infrastructure foundation for cloud computing inside Cisco. CITEIS Gen2 Program Delivering Multi-Tenant IaaS Cloud Solution. It�s an End-to-End, fully integrated CIAC based Cloud Solution. Attendees will learn about the difficulties involved in migrating a heterogeneous set of data center platforms and applications to a virtualized platform. Attendees will also hear Cisco IT�s initial results of this server platform migration in terms of cost savings and power reduction as well as enabling more reliable data center architectures at an acceptable cost. Additionally we can share our early experience in creating and expanding the cloud computing platform within the enterprise. Session highlights include: � Multi-tenant Data Center Design � Infrastructure as a Service (IaaS) � Reducing data center operating costs � Driving higher utilization of existing servers and storage devices � Business continuity � Organization Alignment � Application transformation
BRKUCC-3420 - Advanced - Implementing Directory Integration and Single Sign-on with Cisco UC (2012 London) In this session we will cover the new directory integrations available after CU 8.6 and we will explore how to integrate it with different LDAP frontends like AD, ADAM, AD LDS, OpenLDAP, etc. we will explore the different ways that the it will reflect on the others Cisco collaboration products like Unity Connection, MP, CUP, and CSF clients. We will explore how the new CUCM directory implementations will affect the most common user directory deployment models seen in our customers ( single domain, multiple domains, single directory or multiple directory structure ) for each solution. We will also explore SSO ( Single Sign-On) subject and it�s integration with Cisco Collaboration portfolio using an Open Web Single Sign-On architecture based on OpenAM In the end of this presentation, the attendees will understand how the new directories models implement in CUCM, User Directories solutions and SSO Solution interact with the Cisco Collaboration portfolio. Attendees should have a good working knowledge of user directory solutions based on LDAP, good understanding of SSO concepts and know Cisco Collaboration Portfolio.
5.0/5.0
BRKCRS-2301 - Enterprise IPv6 Deployment (2012 London) **The video for this session is unavailable.** This session focuses on IPv6 deployment options for the enterprise and commercial network manager, with in-depth information about IPv6 configuration and transition methods. IPv6 deployment considerations for specific areas of the network such as Campus, Data Center, Internet Edge, and WAN/branch are discussed. The session features best practices for deploying IPv6 with a variety of associated technologies.
5.0/5.0
BRKMPL-2104 - Deploying MPLS Traffic Engineering (2012 London) This session covers the deployment of Traffic Engineering in MPLS networks. The material presents a brief technology overview and then focuses on three deployment scenarios: bandwidth optimization, traffic protection, and enhanced QoS. In the latter part, the session discusses inter-domain traffic engineering (multiple Interior Gateway Protocol areas and autonomous systems) and general deployment recommendations. The attendee can expect to see numerous sample configurations. This is an intermediate-level course that requires familiarity with MPLS and link-state routing protocols (OSPF or IS-IS). Previous attendance of session BRKRST-1101, "Introduction to MPLS," is highly recommended. This session is intended for service providers and enterprise customers deploying their own MPLS traffic engineering network.
5.0/5.0
BRKSEC-2003 - IPv6 Security Threats and Mitigations (2012 Melbourne) This technical session is about the security of IPv6 protocol and leverages the attendee's knowledge of network security. The session starts with threats common to IPv4 and IPv6 networks with topics like neighbour discovery, IP spoofing, and scanning by worms, ICMP security policy. It then addresses some specific IPv6 issues like transition mechanisms (especially tunnelling techniques and dual-stack network), extension headers, use of IPsec. Finally, the session covers how to enforce an IPv6 security policy and how to securely transport IPv6 on a public Internet (being IPv4 or IPv6). The session is mainly for enterprise networks, session BRKSPG-2603 is the SP version. Basic knowledge of IPv6 and a broad understanding of security in an IPv4 network are prerequisites.
5.0/5.0
BRKIPM-2262 - Multicast Security (2012 London) This session shows how the Cisco IOS set of command-line tools can be used to provide access and admission control to the network or router (for protocol security and prevention of attacks), as well as to multicast applications, and shows how to control their intended usage. Explicit examples for common cases are presented. The session also gives an overview of the current and upcoming functions available for IP Multicast with IP Security, discusses ways to dynamically provision or control multicast application usage, and reviews multicast and firewalls. This session covers requirements in both enterprise and service provider networks when using IP Multicast.
BRKSAN-2047 - FCoE - Design, Operations and Management Best Practices (2012 Melbourne) This session will describe some background of Fibre Channel (FC) and Fibre Channel over Ethernet (FCoE) technologies and terminologies, such as Fabric Logins (FLOGI), Fibre Channel Forwarder (FCF), and FIP Snooping, Multi-hop FCoE (VE), and FCoE-NPV. Then it will go into concepts on how to design and configure a Unified network. With the various supported topologies for FCoE, a best practice in design and operational tools will be describe in managing this FCoE enabled network.
3.0/5.0
BRKNMS-2847 - Ethernet OAM - Technical Overview and Deployment Scenarios (2012 London) This breakout covers the latest advances and the value proposition of Ethernet Operations, Administration and Maintenance (E-OAM) protocols to Enterprise and Service Provider market. With the increased adoption of Ethernet services, Ethernet OAM is a key requirement for their success and continued growth. The session provides a technical overview of the work at various standard development organizations, such as: IEEE, ITU-T and MEF. The following protocols will be covered: Connectivity Fault Management (CFM IEEE 802.1ag), Ethernet Link OAM (IEEE 802.3ah), ITU-T Y.1731, Ethernet Local Management Interface (E-LMI - MEF 16) as well as OAM interworking functions. Deployment scenarios and best practices will be presented covering fault management (detection, verification, isolation, notification) and performance management (delay, loss) of Ethernet services.
BRKNMS-2841 - Enterprise Network Device Administration with TACACS+ (2012 London) Network device administration based on TACACS+ is one of the key functionalities of network management. Whether for compliance or regulatory reasons or for auditing, knowing who did what and when on which device is mandatory in every network infrastructure. In this session we discuss basic AAA for device administration, showing the pitfalls of different methods for different access technologies (Console, SSH, ...) up to differentiated CLI command authorization. We show the difference in functionality between using TACACS+ and RADIUS for device administration. We also show granular access rights based on policies setup on CiscoSecure ACS 5 policy rules to allow different rights on different device groups and / or locations allowing complete control of CLI access. And we will blend in third party OTP servers into the mix.
4.3/5.0
BRKNMS-2464 - 13 Smart Automations to Configure Your Cisco IOS Network (2012 London) Is there too much manual configuration going on in your network? Have you ever accidentally locked yourself out of a remote device? Need to deploy a few hundred branch routers across the globe? Want to quickly apply maintenance config updates to a handful of devices running various different IOS releases? Your Cisco IOS Network provides a wealth of advanced device manageability instrumentation (DMI) and Embedded Automation Systems (EASy) to design and implement your own Network Automations. Learn how Network Automation allows you to automate manual tasks, better operate existing network services and even enable new and innovative networking solutions. This Breakout Session uncovers embedded Network Automation capabilities you can use to interact with your network elements for the purpose of (re-)configuring them in a more effective, efficient and robust way. Network Automation fundamentals as well as the choice and use of appropriate practices are illustrated through a combination of presentation and best practice examples. The topic is relevant for network planners and administrators, engineers and system integrators for both enterprises and service providers.
BRKNMS-2031 - SYSLOG Design, Methodology and Best Practices (2012 London) This session will help define the design and methodology for implementing a robust syslog solution using open source tools on Linux platforms. It provides leading practices for deployment of a set of tools and applications to support effective collection, storage, and analysis of syslog messages. This session provides examples using messages from Cisco IOS Software, but is applicable to all other syslog message types and general event management.
5.0/5.0
BRKSEC-2145 - MPLS VPN Security (2012 London) This session discusses the security properties of MPLS VPNs, both from the SP and the VPN customer perspective. First, we explain the fundamentals of MPLS VPN security, followed by design rules for MPLS providers to keep the service secure. We then discuss the security of advanced MPLS concepts and architectures, such as Multicast VPN, the various Inter-AS cases, and Carrier's Carrier. Target audience for this session are network designers, operators and security officers of both SPs and enterprises.
3.0/5.0
BRKSPG-2069 - Next Generation Optical Networks and Architectures (2012 Melbourne) Today's Transmission, Carrier Packet and Data Centre networks allow greater flexibility in design and service delivery but demand more from the underlying transport network to enable these dynamic multiprotocol services and how they integrate. In this session we will explore the evolution of Dense Wavelength Division Multiplexing (DWDM) networks and the ongoing migration from Fixed Optical Add/Drop Multiplexing (OADM or F-OADM) to utilise dynamic Reconfigurable Optical Add/Drop Multiplexing (ROADM) technologies to gain greater efficiencies and benefits as well as how this evolution will continue towards a dynamic zero-touch architecture based on Omnidirectional and Colourless optical routing technologies to deliver Wavelength Switched Optical Networking (WSON).
ITMCCS-2580 - Hybrid Cloud Networking (2012 London) "In a Cloud Computing environment a customer (enterprise or tenant) may acquire resources in (one or more) Public Cloud operated / owned by a Cloud SP to satisfy occasional peak demands (Cloud Burst) or acquire resources permanently for certain applications (such as backup or permanent workload outsourcing to Cloud). A tenant may decide to move certain components of distributed or parallel or multi-tiered applications to (off-premises) Cloud and keep others on tenant premises (on-premises). For example, DB tier remaining on-premises, whereas web and app tiers moving to Public Cloud or a set of slave nodes of a distributed/parallel application moving to Public Cloud. In this case a number of issues should be addressed, such as on-premises resources should be able to work seamlessly with off-premises Cloud resident resources, where firewall and other enterprise policies between tiers or components remaining intact. In addition a tenant may want to manage seamlessly on-premises and off-premises resources together (as if they are on the tenant intranet). We call a Cloud that facilitates seamless access to, execution of applications on, and management of on-premises and off-premises resources, a Seamless Hybrid Cloud (SHC). An SHC, first and foremost, will be facilitated by seamless and secure connectivity between on-premises and off-premises resources. While a typical (L2/L3) VPN can be used for seamless connectivity, it may not be suitable for a number of reasons. In a typical VPN, the end-points (EP) land on tenant premises. But in the case of a Hybrid Cloud there are EPs that are on the tenant side and the others on the Cloud side (EPs landing on public Cloud DCs), which is further complicated by a number of issues : 1) Public Cloud DCs host multiple tenants, 2) virtual Cloud resources of a particular tenant may be distributed over multiple physical resources (in one or more Cloud DCs), 3) multiple tenants sharing the same physical resources. These issues make it challenging to decide where to position the EPs on the Cloud side. In this case study, we discuss how PPVPN (Provider Provided VPN) can be extended to support SHC. "
BRKUCC-2725 - Deploying Cisco Unity Connection Unified Messaging or Single Inbox Messaging with On-Premise or Cloud Applications (2012 Melbourne) Current trends in business have IT professionals demanding the flexibility to deploy different types of voice messaging capabilities, on-premise or in the cloud, to their segmented employee populations for various reasons, including compliance. For example, you need to deliver the messaging solution that best fits the way your employees work by deploying unified messaging to your mobile employees, integrated messaging to your general employee population, and voice mail only to a subset of your employees or executives. This intermediate session will describe Cisco Unity Connection's new architecture and technologies when deploying unified messaging or "single-inbox" access to voice mails, faxes, and emails, in addition to integrated messaging and voice mail only access. Cisco Unity Connection's new architecture of synchronising messages and directory information with the existing corporate email and directory infrastructure for both on-premise and cloud solutions will be covered. The session will focus on Microsoft Exchange for on-premise integrations and Microsoft Office 365 (formerly BPOS) for cloud integrations. Plans for integrations with Lotus Domino and Google Mail will be discussed. In addition, migrations from Cisco Unity to Cisco Unity Connection will also be discussed briefly.
5.0/5.0
BRKSPG-3611 - Troubleshooting IOS-XE (2012 Melbourne) This session provides an overview of both the hardware and software architectures specific to the ASR1000 Series Router and IOS-XE, and will include troubleshooting methods and techniques to monitor overall system health and platform-specific troubleshooting techniques. It will also cover guidelines for deploying ASR1000 Series Routers into your organisation. This presentation is intended for network engineers, network managers and network administrators who are responsible for configuring, troubleshooting and/or maintaining ASR1000 Series Routers in their network. It is assumed that attendees will have a general understanding and knowledge of Cisco IOS technologies and routers.
4.7/5.0
BRKGS-2012 - Passive Thermal Management in the Data Centre (2012 London) Partner Presentation Today's digital networking users continue to ask for better processing performance, improved access and lower latency, while dealing with increased cost pressure from shrinking IT budgets. Ortronics, a Group brand Legrand, will address these needs by presenting a new look at the ISO/OSI model - a seven layer reference model that standardizes communication networks. Ortronics will introduce the concept of Layer Zero -- the infrastructure layer(TM) -- as the new cornerstone of a network. In this session, participants will learn how Ortronics can help implement a well designed Layer Zero foundation of pathways and physical support to optimize the performance of network applications and reduce energy and cable management challenges.
BRKEVT-2802 - Cisco Telepresence: Deploying and Provisioning Video Endpoints (2012 London) Over the course of the last years we have observed that many of our enterprise customer video deployments are becoming more pervasive. The requirement for being able to more easily deploy, provision and manage a larger number of TelePresence endpoints is more important than ever. This 90 minute session is aimed at video architects and administrators who will learn more about deploying large number of video endpoints. During the session we will offer a technical overview of how TelePresence endpoints are deployed on an enterprise network. We will also provide you with the latest knowledge on how to provision and manage TelePresence endpoints on CUCM and on VCS/TMS. Different solution on how to manage your TelePresence endpoints are also covered in this session. This session is part of the �Cisco Telepresence� series of sessions. Please refer to BRKENV-2800, �Architectural overview for Cisco Telepresence deployments� for an overview of the reference architecture and high-level design choices.
BRKEVT-2065 - Designing and Deploying TelePresence on a single call processing platform with Unified Communications Manager 8.6 (2012 Melbourne) Video is the new voice. As organisations realise the benefits of face to face communication, the volume of video endpoints is increasing rapidly within the enterprise. This session will explore the design aspects of deploying Cisco's video endpoint portfolio using Cisco Communications Manager 8.6 as the call control platform. We'll investigate the considerations for large volume personal devices right up to immersive systems and examine the benefits that can be realised with a single call control platform for voice and video, as well as best practise implementation recommendations.
BRKEVT-1300 - Introduction to Enterprise Video Technologies (2012 Melbourne) The use of video communications is increasing significantly within today's corporate networks but also between businesses. TelePresence and all forms of interactive video, including videoconferencing and video telephony, provide significant business value for modern enterprises, but deploying these technologies successfully requires careful network planning and architectural design. This session will provide a technical foundation for those that do not have an audio visual or video conferencing background. It will cover in depth topics such as video protocols and standards, video compression, network requirements and quality of service.
5.0/5.0
BRKGS-2019 - You can't manage what you don't measure. You can't measure what you can't see. (2012 London) Partner Presentation With the dramatic growth in the number of connected devices, the increasing breadth of applications and the explosive growth of the volume of traffic on the network, a new approach is required to ensure that management and monitoring systems have the right visibility to the appropriate network traffic. Although SPAN ports and network TAPs certainly provide some non-invasive visibility, they lack the intelligence that is essential to allow NOC and SOC teams to control and manage the flow of traffic to the management/monitoring systems. This session will explore a new approach " the Visibility Fabric " that addresses the limitations of the current approach and provides a real-world solution to this challenge.
BRKAPP-2025 - What Is Really Going On? - Best Practices in Choosing, Deploying and Using DPI (2012 London) Deep packet inspection (DPI) is a powerful set of tools and technologies for understanding network, traffic patters and user behavior and can be great platform for optimizing network usage, creating and supporting new and exciting services. This session will show you what DPI is and why is it important, will highlight important features of the DPI system and will guide you through a process of successful DPI implementation.
3.0/5.0
GENSK-1295 - Data Center-Solutions Keynote (2013 Orlando) The Data Center is evolving towards the next major architectural transition since Client-Server and the Web:  the Cloud Era.  A converged approach with unified computing, unified management and unified fabric is needed for an open, resilient, secure, and scalable platform in a multi-cloud environment to meet your needs today and address your cloud deployments of tomorrow.
4.7/5.0
GENWIT-1000 - Cisco Empowered Women's Network Event (2013 Orlando) An inclusive tomorrow starts here—and it starts with connecting you to successful and motivated women who are Cisco customers, partners, and employees. Start your week at Cisco Live! by attending this exciting inaugural event and prepare to: •     Get energized with our executive panel of Cisco and customer/partner leaders •     Get inspired by “real and raw” role models •     Get educated in a career coaching session designed to help you elevate your executive presence and networking skills 
5.0/5.0
GENKEY-1 - Cisco Live Milan Opening Keynote (2014 Milan) Hear from Rob Lloyd on how Cisco and the ecosystem of Cisco's partners are uniquely positioned to connect the unconnected with an open standard and an integrated architecture from the cloud to end devices.   Rob will share his vision of the Internet of Everything and examine the industry trends and technologies that are making that vision a reality.
4.2/5.0
ATE-CL312 - Ask the Expert: Cisco Advanced Services – Anatomy of a Virtual Event (2012 San Diego) Come and learn how collaboration impacts every department in the Enterprise. From Corporate communications, sales and marketing to HR and career fairs. You will learn about the 'anatomy of a virtual event' and discover the components that are leading to huge gains in ROI, cost reductions and improve efficiences.
GENSK-4344 - Solutions Keynote: Security (2012 San Diego) Security threats are growing in number and impact, and becoming increasingly difficult to detect and mitigate. Companies are moving rapidly towards the cloud, and employees are demanding a “work anywhere” environment. Today’s CIO and network administrator are faced with the dilemma of whether to “lock it down” or “free it up”…whether to shackle the business with security policies and practices, or to enable the business to innovate and grow. Join Christopher Young, Senior Vice President of Cisco’s Security and Government Group, as he examines the need for a more transparent and efficient network that enables businesses to open the door to new innovation. The answer is intelligent networks that integrate security and context awareness allowing control over who, what, where, when, and how company data is accessed. With annual revenue of $44 billion and the bulk of transactions conducted over the Internet, Cisco is a prime target for security attack and exploitation. Christopher will reference Cisco to demonstrate how enterprises can increase overall network visibility and application control while delivering secure access for users, devices and applications.
ATE-CL302 - Ask the Expert: Cisco Data Center – Unified Fabric: Delivering Architectural Flexibility (2012 San Diego) The confluence of a number of trends, including cloud computing, video, virtualization / workload mobility, the data deluge brought on by the “Internet of things,” is driving significant change in the data center. Customers are looking for flexible data center architectures that will adapt to these changes as their business evolve to take advantage of these trends. Cisco’s Unified Fabric and Nexus portfolio deliver this flexibility and continue to lead the industry with a number of leading innovations that enable architectural flexibility for general, virtualized and cloud deployments. What are these leading innovations and how they enable architectural flexibility that extends from the server to the cloud will be discussed. Visit the Cisco Campus Switching Virtual Resource Center and Cisco Data Center Resource Center to view additional documents and links.
GENPS-1001 - Get Your Network Ready for the Cloud (2012 San Diego) Cloud computing is expected to enable dynamic, flexible, and resilient IT application delivery with operational excellence. By 2014, 50 percent of workloads will be processed in the cloud (Global Cloud Index, December 2011). Is your network ready to support the changing traffic patterns of cloud? Can your WAN support an optimal application experience? How will you secure your business in the cloud? Never before has the network been more relevant for enabling your business. If you are rethinking your network strategy as your business moves to cloud services, join this event and learn about new breakthrough innovations that help you: Gain greater visibility to the cloud traffic Increase the performance of your cloud applications Secure user access to the cloud Scale cloud deployments
BRKUCC-2006 - SIP Trunk design and deployment in Enterprise UC networks (2012 San Diego) The Session Initiation Protocol (SIP) has emerged as the dominant rich media communications protocol on IP networks and the Cisco Unified Communications product portfolio leverages SIP extensively for inter-connectivity. This session covers design considerations for SIP trunking within the Enterprise (i.e. between call agents) and at the Enterprise edge (i.e. for IP PSTN services). Updated for Unified Communications 8.5 release which adds significant new trunking functionality, this session covers the design aspects that need to be considered for a successful deployment of SIP Trunks with Unified CM. These considerations include redundancy, availability, load-balancing, security, addressing, interoperability etc. The session will also cover the usage of SIP for interconnecting Cisco Unified Communications Manager clusters (using Intercluster Trunks), connecting to Cisco Unified Border Element and Gateways. At the end of the session you will be able to evaluate the benefits and trade-offs of using SIP with respect to other protocols for Unified Communications. This session is intended to provide an in depth update to an audience with a working knowledge of CUCM and SIP Trunking.
4.8/5.0
GENSP-1292 - Service Provider Keynote (2013 Orlando) This session will share how Cisco is delivering value to Service Providers with the Next Generation Internet and supporting the Internet of Everything. Learn about Cisco's vision for Service Providers and how they can transform their infrastructures and business models using intelligence and innovative solutions to solve their most pressing challenges.
3.7/5.0
GENSS-1298 - Partner Super Session (2013 Orlando) Join John Graham, Vice President for Systems Engineering in the Americas Geographic Region at Cisco and key Cisco partners in a unique fireside chat session focusing on emerging industry trends, the related technology challenges, and the potential solutions. This session will help you put your week of learning in the context and provide fresh insight into the changes in store for the industry and your career.
4.5/5.0
BRKDCT-2081 - Cisco FabricPath Technology and Design (2013 Orlando) This session provides an introduction to Cisco's FabricPath technology, which enables simplified high-performance L2 switching fabrics. Topics include a review of FabricPath technology and implementation details, use-case/design considerations including interaction with Classic Ethernet environments, and a brief discussion of how Cisco FabricPath relates to the IETF TRILL (Transparent Interconnect of Lots of Links) standard.
4.9/5.0
GENSK-1109 - Fast Track to Fast IT: Cisco’s Application Centric Infrastructure (2014 San Francisco) What if you could deploy enterprise applications in hours, not weeks? What if you could manage and roll out enterprise applications that incorporate network and security policies in real time? What if you had visibility and control across your entire enterprise infrastructure – to provision, deploy, monitor, optimize and troubleshoot easier, faster, and more securely?   With Cisco ACI, you can have all this – and more.  Find out how by joining Soni Jiandani, SVP Insieme Business Group, Rob Soderbery, SVP/GM Enterprise Networking Group, and Scott Clark, VP of Cisco Services, as they provide an overview on Cisco’s ACI strategy, roadmap and solutions.  Hear directly from customers deploying these solutions. See how Cisco ACI deploys application-centric policies to simplify infrastructure operations by mapping enterprise business logic and automating network provisioning across data center, access, and WAN. The result?  A simple, smart, secure solution that delivers on the promise of Fast IT.
4.8/5.0
GENKEY-2001 - Solutions Keynote (2013 London) New to Cisco Live 2013, the second Cisco keynote is an innovative format that will demonstrate how Cisco is addressing the opportunities presented to your business by the worldwide trends described by Padmasree in her keynote now and in the immediate future with the architecture platforms of Borderless Networks, Collaboration, Data Center and Cloud and Security. Four of Cisco's leading architecture experts will share an integrated Cisco story that demonstrates the business value of Cisco's innovation and solutions while showing how they are underpinned by technological excellence in network and communication.
2.0/5.0
GENSK-4356 - Solutions Keynote: The Future of the Enterprise Network in the Post-PC Era (2012 San Diego) By the year 2020 it is estimated that 56 billion devices will be connected to the Internet. Your organization will serve an increasing variety of cloud-based applications to users tethered to the network using a broad range of mobile devices. In addition to your employees, every touch point with a customer, partner or the infrastructure that runs your business will be enabled by the network. Industrial, transportation, process control, manufacturing and other industries will have migrated to the Internet of Things. What is Cisco doing to help you deal with the implications of these trends on your network? Join Rob Soderbery, SVP for Cisco’s Enterprise Networking Group, for a discussion about how Cisco is driving innovation across its core portfolio of Catalyst switching, access routing and wireless networking technologies that will help you navigate these transitions. Soderbery will demonstrate how Cisco solutions come together so you can deliver a secure and uncompromised user experience to your customers, partners and employees.
4.8/5.0
GENSK-1106 - Technology Trend Keynote: Exceptional Collaboration Experiences in the Age of the Connected User (2014 San Francisco) Today’s connected user assumes that they can work anytime from anywhere. Whether they are on-the-go, at a home office, or in a conference room, people, now more than ever, collaborate in real-time. Flawless experiences are also expected, which means seamless, secure and easy-to-use technology solutions must be in place. Join Rowan Trollope and Hans Hwang as they introduce new Cisco solutions, and discuss why creating exceptional collaboration experiences are the lynch pin in driving measurable business outcomes. Not just in today’s marketplace, but for many years to come as the workforce continues to shape-shift with new generations.
4.7/5.0
GENKEY-2300 - Cisco Live Technology Business Vision (2014 San Francisco) Join Cisco’s technology and business leadership for a deeper dive into what is happening both at Cisco and with our customers as the Internet of Everything becomes a reality. Find out what Cisco is doing today, what we’re planning in the future, and what others are doing to tap into the power of the Internet of Everything.
4.0/5.0
PCS-SF - Partner Case Studies (2014 San Francisco) NetApp -- View VideoIntel -- View VideoNetscout - View VideoF5 -- View VideoEMC -- View Video
4.0/5.0
BRKMPL-2100 - Deploying MPLS Traffic Engineering (2014 Milan) This session covers the deployment of Traffic Engineering in MPLS networks through different use cases. The material presents a brief technology overview and then focuses on three deployment scenarios: bandwidth optimization, traffic protection, and enhanced QoS. In the latter part, the session discusses inter-domain traffic engineering (multiple Interior Gateway Protocol areas and autonomous systems) and general deployment recommendations. The attendee can expect to see numerous sample configurations including IOS, IOS XR and NX-OS. This is an intermediate-level course that requires familiarity with MPLS and link-state routing protocols (OSPF or IS-IS). Previous attendance of session BRKMPL-1101, "Introduction to MPLS," is highly recommended. This session is intended for service providers and enterprise customers deploying their own MPLS traffic engineering network.
4.7/5.0
BRKNMS-2466 - 13 Smart Automations to Troubleshoot Your Cisco IOS Network (2014 Milan) Is there too much manual troubleshooting in your network? Have you ever wasted hours to capture evidence of a transient network issue? Want to enable your first line peers to deliver precise problem descriptions? Do you know which part of your network is likely to fail next? And how to prevent it? Your Cisco IOS Network provides a wealth of advanced device manageability instrumentation (DMI) and Embedded Automation Systems (EASy) to design and implement your own Network Automations. Learn how Network Automation allows you to automate manual tasks, better operate existing network services and even enable new and innovative networking solutions. This Breakout Session uncovers embedded Network Automation capabilities you can use not only to interact with your network elements during troubleshooting and optimization activities, but also to implement proactive and preventive maintenance in a more effective, efficient and robust way. Network Automation fundamentals as well as the choice and use of appropriate practices are illustrated through a combination of presentation and best practice examples. The topic is relevant for network planners and administrators, engineers and system integrators for both enterprises and service providers.
5.0/5.0
BRKSPV-1919 - Video Transport Architectures (2014 Milan) This intermediate level session covers the requirements and challenges of transporting broadcast grade Video over IP networks. These linkages are technologies that enable the IP network to be Video-aware encompassing IP/MPLS Multicast, QoS, Security, High-availability and Admission control mechanisms. Network resiliency/availability mechanisms enabling minimal disruption of Video services are covered in detail. These include Unicast & Multicast Fast convergence, advanced traffic engineering, Multicast-only Fast Reroute (MoFRR), Video Source redundancy among others. Lossless transport is introduced using Live/Live with packet merge capabilities for uncompressed video. An overview of the application-level techniques that minimize packet losses such as Forward Error correction (FEC) and dynamic packet error repair using Cisco Visual Quality of Experience (VQE) are also covered. New developments in the Video monitoring space such as In-line monitoring are briefly covered as well as network management tools. It is expected that the attendee is familiar with IP/MPLS, Multicast and QoS concepts.
5.0/5.0
PSOCRS-2444 - Cisco campus access switching architectures (2014 Milan)   In less than one year, architectural options have been made available to customers for campus switching designs. While traditional access, requiring individual management of devices, stacks or clusters keeps offering a flexible and highly robust and manageable solution for any deployment, other solutions have been designed to meet operation simplicity and mobility requirements. The first alternative to traditional access is to shift to a cloud managed access network with Cisco Meraki devices. With these Cisco Meraki switches and access points one can simply plug them in any network and manage them throuhg a web portal available on the Internet. Another path to simplicty is to opt for Instant Access solution introduced on catalyst 6500/6800, in which the access switches (or stacks of switches) are seen as line cards of the distribution devices and do not need to be managed anymore as separate pieces of equipment. The third option is Converged Access, driven this time by the drastic increase of mobility and the 802.11ac new standard offering now Gigabit wireless access. Converged access architecture consists in distributing the wifi traffic processing (ie. CAPWAP termination) directly on access switches. This session will introduce the 4 aforementionned campus switching architectures: Cloud managed, Traditional Access, Instant Access and Converged Access with impacts on the choice of switching platforms. Positionning will be presented through concrete examples and case studies, and combination options of these solutions will also be discussed during the session. This session will offer another way to consider Cisco switching portfolio in addition to the usual platforms design, scale, performance and supported features.  
BRKRST-2044 - Enterprise Multi-Homed Internet Edge Architectures (2014 Milan) As Internet bandwidth becomes more affordable, redundancy and load distribution toward multiple Internet Service Providers (ISPs) are now basic requirements for many enterprises. Selecting the appropriate toolset for a specific policy is often an arduous task given the many services and technologies deployed at the enterprise Internet Edge. These challenges present a high degree of operational complexity when implementing and maintaining this type of environment. This session will help participants understand the available technologies and how they can be applied while minimizing operational complexity. The session will highlight key areas including a review of commonly used and emerging technologies (i.e., BGP, PfR, and LISP), common scenarios that illustrate how each technology operates, best practice designs, and an overview of advanced case studies involving multiple technologies/products (i.e., Multiple Firewalls, Multiple Data Centers, NAT/PAT, and IPv6). The session will focus mainly on dynamic and reliable technologies (i.e., BGP, HSRP) and various policy instruments (i.e., prefix length, metric/preference/path/attribute manipulation, and filtering). This session is intended for network architects, designers, and operators who work for enterprises; systems integrators; and small or large service providers. Practical experience with BGP is a prerequisite for attendance. Highly Available Wide Area Network Design (BRKRST-2042) is a recommended prerequisites to this session. This session is related to Routing and Switching Technologies within the Network Infrastructure and Systems track.
5.0/5.0
BRKRST-2362 - Deploying Performance Routing (2014 Milan) This session explains Cisco Performance Routing (PfR) technology as well as the latest enhancements and includes case studies. PfR allows network administrators to minimize bandwidth costs, enable intelligent load distribution, improve application performance, and deploy dynamic failure detection at the WAN access edge. Whereas other routing mechanisms can provide both load sharing and failure mitigation, Cisco IOS PfR makes real-time routing adjustments based on criteria other than static routing metrics such as response time, packet loss, jitter, path availability, traffic load distribution, and cost minimization. This session is for anyone who wants to understand and deploy Cisco IOS Performance Routing. For in depth understanding, LTRRST-2360 covers PfR hands-on lab session.
5.0/5.0
BRKSPV-1261 - Designing an Online Video Service (2014 Milan) Streaming Video has been around for many years but with the advent of tablets & high speed broadband it has come into its own. This workshop will focus on the new wave of video delivery technologies used in “Over-the-Top” environments & explore the best practice designs used when building such a streaming video service. The session will start by looking at what we are setting out to achieve, and methodically set out the system architecture and each of the various elements that will contribute to the solution, and conclude with a typical example use case.
BRKSPG-3864 - Advanced - Cloud and NFV Services delivery with Cisco Virtual Packet Edge (2014 Milan) Service provider cloud based offerings gain more popularity with an ever increasing set of possible applications. The recent trend to Network Function Virtualization enriches the possible services portfolio to be delivered out of a  Service provider datacenter . A scalable and automated way of delivering such cloud services is paramount for service providers who want to be successful in such a service environment.  This session will focus on Cisco's new datacenter overlay solution (Virtual Packet Edge) and explain how Service Provider NFV and Virtual Private Cloud services can be easily and effortlessly managed by means of the VPE solution. It will detail the solution's control and data plane components and the service orchestration steps. We will dive into its use of SDN and RESTful APIs, and how virtualized services are spawned, managed throughout their lifecycle and automatically integrated with pre-existing network based VPN offerings (MPLS VPN).
5.0/5.0
BRKCCT-2051 - Making the Move to Cisco Outbound Option - A Look from the Avaya Predictive Dialer Perspective (2013 Orlando) This intermediate session will provide participants with a comparative perspective between a legacy standalone Time Division Multiplexed (TDM) outbound dialing platform versus a fully distributed Internet Protocol (IP) based outbound solution. The session will provide a component by component and functionality breakdown through a comparison of the Cisco Outbound Option in contrast to the Avaya Predictive dialing platform. Participants will gain an understanding of the advantages of a distributed IP solution versus a standalone TDM platform and learn what to expect should they make the move to the Cisco Outbound Option. The comparative in this session focuses on the component and functional differences between the Cisco solution and the Avaya dialer. Existing users of solutions other than the Avaya as well as existing Cisco contact center customers who have not deployed outbound are welcome to participate so as to learn what to expect if considering the move to Cisco Outbound.
5.0/5.0
BSAARC-1011 - Borderless Networks (2013 Orlando) This session reviews the Borderless Network Architecture in depth. With the explosion of devices, video, cloud, BYOD, and other market trends, the capabilities that Borderless Networks provides brings tremendous value to the enterprise. This session will review the main architecture pillars and the requisite services provided by the Borderless Network: Cloud Intelligent Network SecureX Unified Access Connected Industries
BRKUCC-3420 - Advance Identity Services for Cisco Collaboration Solution (2013 Orlando) In this session we will cover the user directories integrations. We will also explore Cisco architecture on how to populate cloud services with user directory We will also explore SSO subject. We will explorer the different federation protocols and how to use them to achieve SSO We will explore federate user information between components inside an organization and with outside services. We will go through a step by step exercise on how to use OpenAM to deliver Single Sign-on services.
BRKCRT-9344 - IPv6 for Cert Nuts (2013 Orlando) There is a lot of fear regarding IPv6, particularly with regards to certifications at all levels. We will take the fear out of the protocol, and cover the information based on extrapolation from what is already known (e.g. you are half-way there, the differences are small!). Addressing formats, neighbor discovery, routing and security are the main sections to be highlighted. In this session, the basics will not only be covered, but demonstrated on live equipment. After a mere two hour session, students are guaranteed to no longer have anxiety about IPv6 on exams. Any aspirations for smoke cessation or weight loss will not be addressed.
5.0/5.0
BRKPCS-2028 - Unified, Flexible and Affordable Network Management (2013 Orlando) Network management technology should be designed to make managing IT environments and delivering services to users less complicated – without sacrificing adaptability or draining budgets. In this session, a solutions expert from Ipswitch (WhatsUp Gold)  will share proven best practices to help you simplify IT operations by unifying network management, log management, and application performance monitoring with a solution that makes both your tasks and your network easier to manage. Our experts will dig deep into systems, networks, services, applications – and those who rely upon them to do their jobs – to uncover common challenges and considerations when addressing a comprehensive approach to IT management. In tandem, you’ll hear from a peer (aka, one of our customers) who will share real-world experiences and tangible results that will help you further identify how our solutions can provide tangible benefits to your network environment.
CCSDCT-2014 - Cisco DC Network Deployment at IBM DCs including FabricPath (2013 Orlando) IBM and AT&T have been building Data Center Networks with the Nexus architecture (Nexus 2200/5500/7000), and has utilized FabricPath instead of vPC or Spanning-Tree in some countries. This session will focus on the quantifiable OPEX and CAPEX savings of adopting the Nexus-based architecture and other benefits IBM has achieved. It will also cover lessons learned - technical and non-technical - and overall experience with Nexus and FabricPath. The target audience for this session is any Cisco customers who is considering Nexus and FabricPath and want to hear the real world experience of customers (IBM and AT&T) who has deployed those technologies, and will share the reasons why those technologies were adopted, how they were implemented, deployment considerations, convergence time and lessons learned.
5.0/5.0
BRKSEC-1050 - Are You Choosing The Right VPN Technology For Your Network? (2013 Orlando) Today there are numerous IPsec/VPN technologies available to customers for their network security implementations. Customers have many IPsec technologies available to choose from such as classic IPsec, GRE/IPsec, Easy VPN, DMVPN, VTI ,GetVPN, Flex VPN, etc. Since confusion may arise with the many different available design options, this session strives to educate customers by examining each technology and detailing which solution is most appropriate to deploy given design requirements and constraints. It will also delve into the benefits and risks each solution introduces and the value each solution provides. This session will assist customers in making the correct decisions in order to avoid frustration. This presentation is for network administrators, network designers and network engineers who are responsible for configuring, designing and/or maintaining IPsec VPN technologies in their network.
4.7/5.0
BRKRST-2336 - EIGRP Deployment in Modern Networks (2013 Orlando) EIGRP is widely used in very large scale enterprise networks. What are the methods network designers use to deploy EIGRP in these environments to produce a stable, elegant network design? This session covers various topics that help network engineers build flexible, robust fast converging networks using EIGRP, including load sharing, hierarchy, and aggregation. We will review routing design considerations for campus, data center, and WAN solutions. What techniques, or best practices, should you use when dealing with high speed links (*Wide Metrics), hub and spoke (DMVPN) networks, or MPLS PE/CE solutions (PE/CE, OTP) What resiliency and fast convergence techniques are available and how and when to use those techniques. We will also look at how to leverage your IPv4 design knowledge for IPv6, and the the unique deployments consideration. A solid understanding of routing, and a basic understanding of EIGRP is a pre-requisite for this session.
5.0/5.0
PNLRST-4006 - Get More from Your Network with an Intelligent WAN (2014 Milan) Today’s WAN environments face growing pressure with the adoption of cloud, mobility and rich media applications. Yet, three out of four organizations report no growth in WAN budget. Many organizations are expected to deploy new services like BYOD, guest access, software-as-a-service, and need to determine how to meet the demands of the business without additional resources. In this session, you will learn how to improve WAN performance, reliability and security while lowering costs and simplifying operations. You’ll hear real-world examples how others like you are leveraging the services of Cisco IWAN to deploy consistent security across a hybrid WAN, increasing their WAN utilization with up to five-nines reliability, and improving user experience with business continuity. Join our expert panel of customers from Qualcomm, Genworth and SFR, and learn how Cisco Intelligent WAN (IWAN) can help you more efficiently utilize your WAN to meet your business requirements, quickly pay for an infrastructure upgrade and free up IT resources for strategic projects. 
5.0/5.0
BRKCDN-1005 - Better Network Management Through Network Programmability (2014 Milan) As we enter the age of network programmability the data models, protocols, and tools provided by a programmable network can greatly improve and simplify network management tasks. Configuration and operational data can be read and set regardless of the underlying device. Errors are properly reported to ensure reliable delivery of data. Connections are secure and robust. Data is more intelligently extracted. This session will explore how tools like NETCONF, YANG, as well as Cisco's Embedded Event Manager, onePK APIs, and embedded Python scripting can radically improve network management applications by offering visibility and provisioning power throughout the network stack. We will also provide an overview of the Cisco Process Orchestrator solution which provides an excellent way to interface disparate systems and achieve robust automation in your environment. Operational state checks and assisted troubleshooting are enabled through automation and orchestration.
4.0/5.0
BRKCRS-3143 - Troubleshooting Cisco Catalyst 6500 Series Switches (2013 Orlando) This session covers platform specific troubleshooting methods and commands for the Cisco Catalyst 6500 Series Switches, with Sup2T engines running Native IOS. The session starts with an introduction to basic architecture of Sup2T/PFC4. This session details the commands and methods required in Sup2T to troubleshoot Layer 2/Layer 3 IPv4 unicast packet forwarding, high CPU utilization (including NetDR, Flexible NetFlow and Control-plane Policing) and Virtual Switching System (VSS) dual-active scenarios. Reference troubleshooting materials on Sup720 QOS and IPv4 Multicast forwarding are available in the appendices of the presentation, but will not be presented in the session. Target audience is engineers and technicians who work with the Cisco Catalyst 6500 Series or who would like to gain familiarity with advanced troubleshooting of the platform. First-hand experience with Catalyst 6500 platform is expected.
5.0/5.0
COCEVT-3466 - Inside Cisco IT: Making Video the new Voice - a Cisco IT Cookbook (2014 Milan) In the next 5 years most enterprises are going to expect video capabilities to be broadly available to their employees as a standard collaboration capability. If you haven't started yet; It is time to get your infrastructure video ready! Join the Service Manager and lead Design Engineer for Cisco IT UC & Video Platforms to learn how Cisco IT has served up pervasive video to its multinational enterprise and is enabling video to be the default real-time communication tool. In this session you will learn about Cisco IT's video service journey; discover some of the key ingredients and overview some of technical recipes that have been used by Cisco IT to deliver its menu of video services.
BRKSPG-2016 - Architectures for new services over Cable (2014 Milan) The session describes the key aspects of CCAP (Converged Cable Access Platform ) and will describe how Cable operators will migrate multiple silos of technology to a converged architecture whilst maintaining backward compatibility with current DOCSIS and Video deployments. The session will also describe the emerging standard for “Advance MAC /PHY” (AMP) in DOCSIS 3.1 and how this plays a pivotal technical development role in the future of an MSO’s architecture. A focus on some of the service-driven architectures enabled by DOCSIS will also be covered in this session.
5.0/5.0
BRKGS-2526 - Driving UC Adoption across all platforms, mobile, desktop and meeting room. (2014 Milan)  Despite data suggesting increased investment and deployment, the past decade has seen much lower true adoption of Unified Communications (UC) than expected.  This is in part due to end-user barriers, including difficulty installing and using devices, as well as a lack of true understanding of the benefits of UC.  This partner session will tackle these challenges and help businesses move to higher adoption rates and more productive use of the Cisco Collobration tools in which they have already invested.  This presentation will include both hardware and software elements, as well as best practices for driving adoption at the end user level. Please note that the session length is 20 minutes.
BRKDCT-2255 - Cisco's Cloud Ready Infastructure - VMDC (2014 Milan) Cisco Virtualized Multi-tenant Data Center solution (VMDC) is an architectural approach to IT which delivers a Cloud Ready Infrastructure. The architecture encompasses multiple systems and functions defining a standard framework for an IT organization. Standardization allows the organization to achieve operational efficiencies, reduce risk and achieve cost reductions while offering a consistent platform for business. This session will address the physical and logical construction of Cisco's VMDC system which provides a validated approach to both enterprise and service provider cloud deployments. Particular attention will be paid to the controlled consumption of cloud resources and isolation of workloads on a shared infrastructure consisting of the Cisco Nexus 7000, 5000 and UCS platforms. In addition, enhanced security providing isolation, visibility, access controls and policy enforcement using Cisco's ASA technologies, Virtual Security Gateway, and Prime NAM will be detailed.
BRKMPL-2333 - E-VPN & PBB-EVPN: the Next Generation of MPLS-based L2VPN (2014 Milan) This session presents a technical deep dive of Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN). These emerging solutions address the requirements of Carrier Ethernet and Data Center Interconnect market segments. Currently under standardization in the IETF, these technologies introduce advanced multi-homing options, support for multi-pathing and user-defined BGP policy capabilities to Ethernet L2VPNs. They also provide enhanced auto-discovery capabilities with low-touch provisioning and support for optimal unicast and multicast delivery. This session will cover the detailed operation of E-VPN / PBB-EVPN including forwarding, multi-homing, aliasing, multicast and fast convergence. The session is intended for service providers or enterprises looking to deploy next generation L2VPN solutions for Carrier Ethernet or Data Center Interconnect services. This is a session that assumes familiarity with MPLS-based L2VPNs and BGP.
5.0/5.0
BRKARC-3438 - Cisco Catalyst 3850 Series Switching Architecture (2013 Orlando) This session will cover the platform architecture on the Cisco Catalyst 3850 that enabled Converged Access. Visit the software and hardware components within the system - Spend some time in knowing the paths that packets traverse, as they ingress and egress the various ASIC blocks. Learn how does the Catalyst 3850 switch wired and wireless packets by taking a walk with packets ingressing and egressing via the two media. Get a glimpse of how the Catalyst 3850 actually enables seamless integration of wired/wireless clients via a cool innovation. Last but not the least, examine how the High Availability on the 3850 is enhanced by IOS XE
4.2/5.0
BRKAPP-2030 - Application Visibility and Control in Enterprise WAN (2014 Milan) Data center consolidation and cloud has changed how applications are delivered to the end users. Network now has critical role in delivering optimal experience to the users, while providing tools for network admin to better monitor, troubleshoot, and control application performance. Traditional port-based network does not have granularity to control today applications. This session focuses on how Application Visibility and Control (AVC) which consists of NBAR2, FNF, PA, QoS and PfR available with ISR G2, ASR1K can enable application awareness in enterprise WAN. We will go through each technology and their use cases, how to incorporate AVC into your network, and how AVC provides visibility into application traffic and network and simplifies troubleshooting. We will explain how to use various control technologies including QoS and PfR in AVC, and design consideration when WAAS is present.
BRKSEC-3770 - Advanced Email Security with ESA (2013 Orlando) This technical session will tackle several advanced topics of e-mail security with a focus on Cisco's solution. We shall begin by describing the level of IPv6 support in newer versions of AsyncOS, and what changes this brings to traditional e-mail processing. Second part of the session will talk about recent trends of migrating towards the Cloud or Hybrid Cloud e-mail security solution, and what are the challenges and migration consideration. This will be followed by a section on Message Filters, a powerful mechanism of mail flow filtering which was deliberately neglected out of caution. Several Anti-phishing techniques will be laid out in the remainder of the session, outlining Cisco's Outbreak Filters, and providing insight into DKIM and SPF deployment considerations. Prerequisites for this session are acquaintance with SMTP and e-mail security technologies; experience with Cisco E-mail Security products is desirable. The target audience are security and email administrators of the enterprise email gateway. The audience will also benefit from following the session BRKSEC-3771 ';Advanced Web Security Deployment with WSA'; and BRKSEC-2695 ';Embrace Cloud Web Security with your Cisco Network';
5.0/5.0
BRKPCS-2015 - Cloud Case Study: How Verizon's Cisco Powered services enable Warner Brothers in the cloud (2013 Orlando) Many businesses and organizations evaluating cloud technology are concerned about how they can migrate from existing premise-based infrastructure to hybrid architectures comprised of premise-, managed-, and cloud-based services. This session will describe how one of Verizon�s customers has successfully completed the transition to cloud and how they implemented a solution that aligns with their business needs and scale. You will learn best practices for evaluating various cloud services, including how to verify that services will provide the performance and reliability you have come to expect from your own enterprise network, how to accelerate return on investment, and how to be able to leverage ongoing innovation in cloud technology without having to make further capital investment or disrupt day-to-day operations.
BRKEWN-3014 - Best Practices to Deploy High-Availability in Wireless LAN Architectures (2013 Orlando) The proliferation of Wi-Fi enabled devices creates a significant challenge for IT organizations to create the same level of service and support on the wireless network as there is on the wired network. The primary goal of this session is to provide design guidance and share best practices around building reliable and highly available Wireless LAN networks. The discussion will focus primarily on how to achieve wireless network survivability and stateful switchover of these wireless packets. All components of the Cisco Wireless LAN network: Prime Infrastructure, WLC, APs and MSE will be covered. This session is applicable for attendees responsible for the design, deployment, operations, and management of highly available Wireless LAN Networks
4.9/5.0
PSOCOL-1001 - Cisco Collaboration Applications (2013 Orlando) Collaboration Applications help improve productivity with presence, IM, voice, video, conferencing and social software capabilities and they provide a more flexible collaboration environment by making these capabilities available on tablets, smartphones and laptops. Cisco Collaboration Applications consist of WebEx Meetings, for web conferencing, that lets you see, hear, and share content and applications in real-time with others; Jabber, a unified communications application, that helps you find people, see if and how they are available, and instantly collaborate with chat, voice and video; WebEx Social, for social collaboration, that lets you create and securely share content, find experts and resources and more Attendees will learn how: the applications help improve productivity and transform business processes; users can to access these applications from anywhere on their device of choice; the solutions are designed to meet the needs of enterprise IT organizations
4.0/5.0
BRKSEC-3050 - Troubleshooting Remote Access SSL VPN in BYOD Scenarios (2013 Orlando) Cisco remote access VPN solutions provide users secure and flexible channels to an organization's network and sensitive applications. Cisco SSL VPN and Secure Mobility solutions provide a flexible and secure way to extend networking resources to virtually any remote user with any device with access to the Internet. This session provides techniques for troubleshooting on Cisco 5500 Series Adaptive Security Appliance (ASA) and Cisco AnyConnect Secure Mobility Client. The Cisco AnyConnect Secure Mobility client is the next-generation VPN client, providing remote users with secure IPsec (IKEv2) or SSL VPN connections to the Cisco ASA. AnyConnect provides end users with a connectivity experience that is intelligent, seamless and always-on, with secure mobility across today's proliferating managed and unmanaged mobile devices. In this session, you will learn numerous tips and best practices when troubleshooting problems related to SSL VPN and Secure Mobility. This session is designed for networking and security professionals who have deployed or are planning to deploy remote access SSL VPN solutions.
5.0/5.0
BRKEWN-2027 - Design and Deployment of Outdoor Mesh Wireless Networks (2013 Orlando) This intermediate session will describe the Outdoor wireless products involved in delivering outdoor broadband wireless services for Service Providers, Municipalities, Transportation and other end user customers. The Cisco Outdoor Wireless Bridging and MESH Technologies will be discussed in detail. The session is intended for wireless network architects, network designers, network planners working in Service Providers, Systems Integrators, small providers and enterprise customers. Attendees should have some base knowledge in configuration of IP routers, Wi-Fi access points, and policy management. Basic understanding of Controller Architecture and Service Provider networks and services is required.
5.0/5.0
BRKRST-3310 - Troubleshooting OSPF (2013 Orlando) Troubleshooting Open Shortest Path First (OSPF) can be sometimes complex, but with a few key techniques the troubleshooting life can be made simple. This session discusses those techniques in detail and provides some real examples along with troubleshooting steps. This session includes a review of the Link State Advertisement (LSA) types and troubleshooting commands. Common issues, such as failure to build adjacencies, adjacencies stuck in various states, and SPF running constantly, are also discussed.
5.0/5.0
BRKARC-2007 - IOS Strategy and Evolution (2013 Orlando) Cisco IOS is the foundational software that is pervasive across the majority of our products. Today, with the melding of various market requirements, we have evolved our software to address these transformative needs with IOS XE, NXOS and IOS XR. The goal of this session is to explain Cisco's overall OS strategy and the shift in networking software development to drive greater consistency, flexibility, and time to market via modularity, componentization and use of an abstraction layer. Our OS infrastructure evolution includes support for a broader set of services providing a lower cost of ownership. We will also discuss the new Release 15 strategy, including the relationship between IOS and IOS XE, explaining how it allows for (delivery of new features and) feature parity across IOS, IOS XE, NXOS, and IOS XR in the future.
4.7/5.0
BRKNMS-2695 - Administration and monitoring of the Cisco DataCenter with Cisco Prime DCNM (2013 Orlando) Cisco Prime DCNM is the global solution for the management of the Cisco DataCenter, including both LAN, SAN and unified networks. DCNM provides a comprehensive set of management features across the whole range of NX-OS platforms, and down to the Virtual Machines. These features include the discovery, inventory, configuration and change management, NX-OS software management, template-based provisioning, proactive monitoring, performance monitoring and capacity planning, topology views and troubleshooting tools. This session will explore those features and highlight some best practice methodology to get the most out of DCNM. A basic understanding of the underlying technologies is needed, together with some network management skills.
5.0/5.0
BRKIPM-2008 - Advanced Topics in IP Multicast Deployment (2013 Orlando) This session covers tools and techniques that will assist with deploying IP Multicast. We begin with some configuration examples which discuss PIM modes and Rendezvous Point Deployment models for PIM SM domains Examples are then given for ways of interconnecting separate PIM domains is provided A description of a technology called Automatic Multicast Tunnels (for extending multicast content between sites which are not homogeneously connected) is provided We discuss the integration of multicast with MPLS (Label Switched Multicast). We discuss ways of delivering a highly available multicast service. We briefly discuss the deployment of IP Multicast in a wireless environment. This session is primarily for network engineers in enterprise and service provider network environment. Attendees should have a basic understanding of IP Multicast
5.0/5.0
BRKCOM-2009 - Deploying Applications in Today's Compute, Storage and Network Infrastructure (2013 Orlando) This session prepares networking engineers for the fundamentals of deploying applications in today�s virtualized server infrastructure. The objectives for this session are to share Cisco Services best practices and tips and tricks implementing Cisco technology such as the Unified Computing System (UCS) and Nexus 1000v with any virtualization stack. During this session we will examine multiple server virtualization use cases and deployments that I have recently architected and implemented. Use cases consist of a multi-tenant private cloud, SAP Hana, Oracle Enterprise Linux �OEL� with Oracle RAC, and a Virtual Desktop Infrastructure �VDI� scaled for thousands of users. This session will show how to utilize a pod concept using Cisco methodologies such as Domain Ten to replicate and scale any server virtualization project that will support today�s enterprise applications. Additional in-depth technical topics covered during this session look at maximizing performance, capacity planning, and Cisco UCS concepts such as template updating, booting bare-metal or hypervisors, and requirements gathering for LAN and SAN virtual interfaces.
5.0/5.0
BRKEVT-2810 - Deploying Jabber Video for Telepresence(Movi) (2013 Orlando) Jabber Video for Telepresence (Movi) is one client from the Jabber family that provides a desktop class video experience. This session will focus on planning and design specific to this client. Key points for a successful implementation will be considered: - Software prerequisites for TMS, VCS, and host client OS - Example VCS dial plan considerations - Client computer software deployment, client configuration and phone book/directory provisioning - Characteristics of the client bandwidth usage - Call control Scalability and redundancy considerations for Jabber Video for Telepresence deployments - Authentication methods/strategies for clients - Considerations for clients outside the corporate network ( VCS expressways)
5.0/5.0
BRKCCT-2019 - Cisco Unified Contact Center Express Planning and Design (2014 San Francisco) **The video for this session is unavailable.** This session covers the fundamentals of planning and designing a Cisco Multimedia Unified Contact Center Express deployment. Topics include how to gather customer requirements, deployment model capacity planning, sizing voice/email/chat/reporting features, server virtualization, CAD to new Finesse Migration, New Remote Agent, 'Live Data' in CUIC, and estimating bandwidth for the contact center.
3.0/5.0
BRKSEC-8638 - Troubleshooting Secure Sockets Layer (SSL) VPN on Cisco 5500 Series Adaptive Security Appliance (ASA) This session provides an overview of the techniques for configuring and troubleshooting SSL VPN on the Cisco 5500 Series Adaptive Security Appliance (ASA) and Cisco AnyConnect Secure Mobility Client with Cisco expert Jazib Frahim. The Cisco AnyConnect Secure Mobility Client is the next-generation VPN client, providing remote users with secure IPsec (IKEv2) or SSL VPN connections to the Cisco ASA. AnyConnect provides end users with a connectivity experience that is intelligent, transparent, and always on, with secure mobility across today's proliferating managed and unmanaged mobile devices. In this session, you will learn numerous tips and best practices for troubleshooting problems related to SSL VPN and secure mobility. This session is designed for networking and security professionals who have deployed or are planning to deploy remote access SSL VPN solutions. Speaker Bio: Jazib Frahim is a technical leader in the Security Services practice of Cisco's Advanced Services. He is responsible for guiding customers in the design and implementation of their networks with a focus in network security. He was previously a technical leader for Cisco's TAC Security team, leading engineers in resolving complicated security and VPN technologies. He has presented at many industry events, including the Cisco Support Community and Cisco Live on multiple occasions. He has also written numerous technical documents and books, including Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (1st and 2nd editions); Cisco Network Admission Control, Volume II; and Cisco SSL VPN Solutions. Frahim holds CCIE (number 5459) certifications in routing and switching and security, a bachelor’s degree in computer engineering from the Illinois Institute of Technology, and a master of business administration (MBA) degree from North Carolina State University.
4.2/5.0
CIN-WS141 - Enabling the New Mobility Experience Users are demanding seamless access no matter which device they are using or from where they are connecting. IT is being challenged to bring together more solutions elements than ever before while meeting performance expectations both on and off the corporate network and to be able to quickly troubleshoot problems and proactively manage user experience end to end. Join us and our customer – Bowdoin College to learn more about the industry’s first 4x43 access point delivering up to 30% faster performance with the most reliable connection for mobile devices including tablets and smartphones. The Aironet 3600 Series Access Points is a key component of the total Cisco solution to address the end-to-end mobility challenge posed by the explosion of mobile devices. Only Cisco has all the pieces needed to enable customers turn the explosion of mobile devices from chaos into business opportunity and deliver a new mobility experience.
4.0/5.0
BRKAPP-8627 - Troubleshooting Cisco Wide Area Application Services During the live event, Cisco subject matter expert Bhavin Yadav will be presenting on how to troubleshoot Wide Area Application Services (WAAS) application optimization (AO) effectively. He will focus more on individual AO troubleshooting, and he will explain about the different ways to work around AO issues with minimum effects on the traffic. Bhavin Yadav is a technical support engineer in the San Jose campus focusing on Technical Assistance Center (TAC) cases raised by customers for the Cisco WAAS solution and Web Cache Communication Protocol (WCCP) deployments. Yadav has five years of experience with WAN optimization products, which include Cisco WAAS as well as solutions from Riverbed and Blue Coat. He holds a bachelor's degree in computer science and CCNA certification. To view additional related content such as the Q&A from the session, as well as the Ask the Expert Forum Event that followed the webcast, visit the Cisco Support Community Webcasts
BRKCRS-2663 - Hot Topics and Capabilities for the Campus in 2014 and Beyond (2014 Melbourne) This session discusses the Next Generation Campus Architectures as described by Cisco in published Solution Reference Network Designs (SRND). It focuses on the technologies involved in building such an enterprise campus network, including design and implementation guidance on protocol alternatives like VSS, HSRP, GLBP, Spanning Tree (PVSTP+), and Rapid Spanning Tree (Rapid PVST+). Software features and design principles for each layer of the hierarchical core/distribution/access network model are covered. Detailed examples are presented of failure analysis scenarios and LAN and Interior Gateway Protocol (IGP) tuning related to enterprise networks to minimise network outage times. Finally the session treats common pitfalls such as asymmetrical routing, unicast flooding, and routing black holes and provides best practices for optimising an enterprise campus network to support today's business applications. This session is for attendees responsible for the design, deployment, operations, and management of enterprise campus networks. Introductory knowledge of Spanning Tree, routing protocols, and LAN switching is recommended.
4.0/5.0
BRKCRS-2000 - Next Generation Branch Networks: Services, Design and Implementation (2014 Melbourne) Enterprise networks continue to evolve under the pressures of emerging trends: Cloud, Centralisation, Virtualisation, Optimisation. The requirements are for organisations to continue delivering more value from enterprise networks whilst reducing operational expenses, cutting power consumption, and allowing maximum flexibility for the future. Branch users require increasingly more access to rich media collaboration and video technologies, whilst easier access to bandwidth and new technologies such as 4G/LTE are allowing services to reach places never before thought possible. This session will look at how certain technologies are evolving to meet growing demands, how to build some future-proofing into your branch environments, and some of the key implementation strategies being used by organisations across the region. The session introduces the Cisco Intelligent WAN (IWAN) solution for providing highly available Enterprise WAN connectivity using internet circuits and the Cisco ISR features such as Performance Routing (PfR), Dynamic Multipoint VPN (DMVPN) and Application Visibility and Control (AVC) which enable the iWAN capability.  In addition the session will also cover ISR services such as WAAS and the new Akamai capability, UCS-E, Security and One PK as they relate to the changing demands of the branch environment.
5.0/5.0
BRKCRS-3001 - Zeroconf Service Discovery with IOS (2014 San Francisco) Have you ever experienced problems with service discovery on Apple devices when they reside on other subnets? Not seeing your Apple TV or printer? Fear not! Service Discovery Gateway is here to the rescue! With the proliferation of mobile devices, tablets and smartphones (also BYOD) in enterprise networks users might fail to discover services like printers, displays, and media servers among others. This is a major problem faced by many enterprise networks today and is especially acute in education and healthcare networks. Cisco introduced a new solution in IOS and IOS XE for converged wireless and wired access that allows users to discover services overcoming those existing boundaries to unleash the true potential of BYOD. This session will introduce Cisco's new solution for enterprise-wide service discovery enhancing the Zeroconf protocol family that is widely used especially in Apple products.
5.0/5.0
BRKAPP-9001 - Policy Driven Data Centre Design (2014 Melbourne) This session is an intermediate session that provides detailed information on the need for, and methodology of, driving data centre infrastructure design and configuration through policy. The rapid evolution of data centre architecture, driven by increasing application demands, has exposed a gap between the way applications are designed and the way they are deployed. Application connectivity and the performance, security, auditing policies they require must be translated from application development teams to infrastructure architects/engineers without a common language. Moving current methodologies to a policy driven approach provides a natural abstraction between app design, and infrastructure configuration allowing enhanced coordination, fluid deployment, and design reusability.
ITMPCS-1073 - VMware Develops an IT as a Service Strategy for a Leading Australian Bank (2014 Melbourne) The Australian market is highly virtualised with over 60% of workloads running on VMware virtual infrastructure. While virtualisation has driven significant benefits in terms of consolidation and cost reduction, this technology has not yet been fully leveraged to change the way IT is structured and how it provides services to the business. This case study will show how VMware partnered with an Australian financial institution to assist in creating an actionable IT as a Service (ITaaS) strategy to move from a highly virtualised current state (>90%) to an ITaaS target state, fundamentally transforming IT into a service brokerage organisation.
5.0/5.0
BRKSPG-1640 - The Internet of Things: Routing and Related Protocols (2014 Melbourne) Intelligent machines and everyday smart objects such as sensors, light bulbs, power meters, road signs and even garden sprinklers will grow the Internet device population by tens of billions in the next 10 years creating the Internet of Things. These devices will usually operate in a highly constrained environment in terms of physical size, available memory, CPU power and battery life over wireless and wired networks of potentially varying quality. This type of operational environment throws up quite a number of networking challenges in protocol design at various layers.   This presentation starts by explaining the subtle differences between IoT/IoE and M2M and how they are inter-related. It then highlights the various protocols from the link layer up to the messaging layer such as RF Mesh, Power Line Comms and CoAP.   The second half of the presentation concentrates on the development of an emerging IPv6 routing protocol called RPL which has been specifically designed to support IoT networks. IoT networks typically support thousands to millions of sensor nodes (commonly referred to as motes) over connections that are intrinsically are lossy in nature such low power wireless and power line communications. The presentation covers the technologies and innovations that were necessary to allow huge numbers of Smart Objects/IoT devices to route information over IPv6 in the Internet of Things in a scalable manner.
5.0/5.0
BRKRST-2042 - Highly Available Wide Area Network Design (2014 Melbourne) This session will include a detailed discussion of a full range of WAN design options incorporating multiple paths. The primary goal is to provide design guidance and share best practices around building reliable WAN networks. The discussion will focus primarily on network survivability and effective utilisation of all available paths. The session will review IOS routing concepts relevant to route selection and load sharing options as well as proper selection and use of various routing protocols. Various WAN topologies will be analyzed to understand potential failure scenarios. These topologies will include combinations of traditional hub and spoke based networks, Ethernet WAN, Internet VPN options, as well as multiple carrier managed MPLS. The specific technologies discussed include bidirectional forwarding detection (BFD), first hop redundancy protocols (including HSRP & GLBP) as deployed at the WAN edge, IP SLA with object tracking, and path optimization techniques supported through Performance Routing (PfR). Case studies will be analyzed to compare traditional IP routing to PfR for end to end convergence. This session is applicable for attendees responsible for the design, deployment, operations, and management of highly available Wide Area Networks.
5.0/5.0
BRKEWN-2016 - Branch Office Wireless LAN Design (2014 Melbourne) This session focuses on the architecture concepts of the branch office WLAN deployments, emphasising the core technologies that drive and enable mobility in retail, banking, education, enterprise or managed WLAN services. Topics covered include in-depth protocol description of H-Reap/Flex Connect, all deployment options in practice, and are based on customer case studies for their application into the branch environment.
BRKDCT-3060 - Deployment Challenges with Interconnecting Data Centres (2014 Melbourne) This advanced session discusses the challenges and recommended solutions of extending LAN connectivity between geographically dispersed data centres. Innovations in middleware like 'Virtual-Machines' and 'Servers-clustering are revolutionising Virtualisation of Data Centre, while other key IT processes like 'Disaster Recovery Plan' and 'massive servers migration require optimisation and facilitation. Data-centre is now more and more spreading across multiple sites, and one very difficult point to solve is the extension of VLAN in a large scale with respect to Spanning-Tree stability requirement. The different requirements for providing a robust LAN extension solution will be discussed during this session, including end-to-end loop prevention, multi-homing considerations and optimal bandwidth utilisation. Detailed design guidance will be provided around the deployment of Ethernet based technologies, leveraging Multi Chassis EtherChannel functionalities like VSS and vPC, as well as MPLS based technologies (EoMPLS and VPLS) and an innovative IP based technology called Overlay Transport Virtualisation (OTV). Locator Identity Separation Protocol (LISP) will then be introduced as an emerging technology capable of providing both IP Mobility and Path Optimisation functionalities. This advanced session is intended for network design and operation engineers from Enterprises, Service Providers or Enterprise Hosting Service Providers that are willing to solve this difficult and controversial problem of Data-Centre Interconnect. Relevant sessions are: BRKDCT-2011 - Design and Deployment of Data Centre Interconnects using Advanced-VPLS (A-VPLS), BRKDCT-2049 - Overlay Transport Virtualisation and BRKDCT-2131 Mobility and Virtualisation in the Data Centre with LISP and OTV.
4.8/5.0
BRKVIR-2012 - Inside the Nexus 1000v (2014 Melbourne) The recent trend of virtualising servers has a huge impact on the underlying network. Computers are no longer physical, immovable objects that plug nicely into your network switches and remain for a while; they are transient creations that can come and go in the blink of an eye. And it's not stopping there... With a virtual distributed switch we restore network visibility to the boundary of the virtual machine, not just to the boundary of the physical host that runs the hypervisor. Bringing the complete feature set of networking to a massively virtualised Data Centre requires some new design concepts. This session describes the Nexus 1000v from a development point of view. It describes the design challenges and why we made certain implementation decisions. At the end of the session you will have a good understanding of what the Nexus 1000v virtual switch adds to your network and how it is designed. This deep understanding will help you to make the right deployment decisions when you implement the technology in your own environment.
5.0/5.0
BRKUCC-2665 - Communications Manager for Video Call Control (Unified Call Control) (2014 Melbourne) CUCM 10 - a true Call control platform not just for voice but also for video. This session discusses how to create a seamless end user experience across multiple video technologies, such as immersive TelePresence, multipurpose room systems, video telephony, and mobile video systems. We will explore how the Cisco's open standards and architecture, delivers on the vision of true video collaboration everywhere in the organisation. Delving into implementation examples between different TelePresence and video technologies to give the audience a good grounding for their own deployments. We'll examine the values of the Cisco network-centric approach and how to implement a highly interoperable and scalable video collaboration environment for enterprise. This breakout will cover the entire TelePresence solution including CUCM, VCS, TelePresence Server, CTMS, MCU, TMS and endpoints.
BRKUCC-2058 - Utilising Network Intelligence for Collaboration and Real Time Media (2014 Melbourne) Are you stressed out about how to monitor your UC deployment? Collaboration is having an increasing impact to the network, user work style, network applications as well as expectations from the network. Application and network operators are challenged with providing a reliable collaboration service that works every time. However, issues do occur and in this session we will cover strategies for quantifying video conferencing demands, fault identification , isolation as well as expedited resolution. We will cover architectural strategies for both the endpoint and the network as well as the day-to-day tools that provide much improved visibility into application health and performance to assess measure and accelerate troubleshooting of voice/video/data applications. Standard MIBs and alerting mechanisms as well as new management tools, new monitoring features like IOS and MSI performance monitoring, mediatrace and IPSLA VO will be covered. Live demonstrations of the tools and technology will be used to provide tangible context. Join this session, learn about the latest tools and strategies and get back the enjoyment from your UC deployment!
BRKSPG-2641 - BGP Optimising the Foundational SDN Technology (2014 Melbourne) BGP is a protocol existing since 1995, and it can be seen as one of the first technologies to enable SDN network infrastructure. Through control plane activities, BGP allows the management of services and resources within and between network infrastructures. Recent developments have made BGP an even more service aware technology, supporting enhanced and innovative off path traffic manipulation to support resource and service mobility which in turn will allow operators to optimise the capex and opex in a services aware data network. This session will provide insight into the different areas where SDN driven networks can benefit from enhanced BGP capabilities and design architectures to drive mobility, virtualisation, resource and service awareness.
4.5/5.0
BRKSEC-2060 - Cisco Security Management (2014 Melbourne) This session will showcase the different Cisco Security Management solution and how they provide operational benefit to organisations of all size. We'll cover producs such as Cisco Security Manager, Cisco Prime Security Manager, API integrations, etc.   Note:  Due to recording issues in Melbourne, we are offering another recent recording of this session.
3.0/5.0
BRKSPS-2640 - Cloud and DC Architecture Evolution for Service Providers (2014 Melbourne) This session outlines the evolution of Cisco Virtual MultiService Architecture for Data Centre (VMDC) towards Virtual Services Architecture (VSA). It demonstrates how Cisco is leading transition from physical to virtual and how scalable, enterprise grade cloud services can be delivered in a cost-effective manner. The session covers how Cisco innovation around Cloud Services Router, service chaining, hybrid cloud connectors, new DC fabric innovations coupled with orchestration and automation platforms can deliver innovative and scalable next-generation multi-tenant cloud services. It will also cover some practical use cases of how Cisco SDN initiatives, in both SP WAN and SP DC domain, can help Service Providers simplify their operational environment, make it more agile and deliver new services to their customers.
BRKSEC-2663 - Before. During. After. Cisco's Integrated Security Strategy (2014 Melbourne) Increasing user mobility, virtualisation and consumerisation of IT are some of the trends security teams are faced with in their networks today. In this session we look at specific components of the Borderless Networks Security architecture which offers an end-to-end security implementation approach to address security concerns in today's real world corporate networks. We will look at the specific security considerations and details as described in a typical business use case. Security technologies discussed in the session will include Next-Generation Firewalls (ASA/CX), Remote Access VPNs (Anyconnect), Identity Based Access Control (ISE/Trustsec/802.1x), Netflow. We will look at how these different components come together to provide an architectural approach to security.
BRKSEC-2024 - Design and Deployment of SourceFire NGIPS and NGFWL (2014 Melbourne) This presentation covers how customers can deploy the SourceFire Next Generation IPS and Next Generation Firewall solutions to augment their threat protection capabilities - Attendees learn how to deploy the FirePOWER security appliances and FireSIGHT Management Centre to unify the critical security functions of the Sourcefire next-generation network security platform using FireSIGHT real-time awareness and security automation technology.   Note:  Due to recording issues in Melbourne, we are offering another recent recording of this session.
1.0/5.0
Get More Results