SOLGEN-1000 - See More, Know More and Do More with Cisco IT Insights (2017 Las Vegas)Today, across every industry, applications are not only important to your business – they are core and inseparable from your business. As a result, new IT intelligence from the code, all the way to the consumer is critical to supporting the digital customer and the digital enterprise. Cisco’s Insight offerings provide real-time visibility, end-to-end visibility from the code to the customer, predictive and prescriptive insights, and automation to help you manage today’s complex IT environments. Join us to learn how you can unlock new insights to improve the customer experience, ensure security everywhere and deliver operational efficiencies.
SOLEWN-2000 - CLUS Network Topology (2017 Las Vegas)Learn how the Cisco Live NOC team supports over 50k devices across 3 MGM Resorts Properties during Cisco Live 2017. Review the event topology and have a chance to ask your questions to one of Cisco's engineers.
SOLEWN-1001 - Indoor Location Based Analytics (2017 Las Vegas)This session will discuss how indoor location is calculated with methods from WIFI to BLE. The level of precision of different indoor location methods, from AP presence to HyperLocation will be explored. Finally, different use cases, including how indoor location is used at Cisco Live will be discussed
PSODGT-1359 - Public Safety Architecture for Safer Communities and Countries in the Digital Era (2017 Las Vegas)Cisco helps government, public safety and justice organizations to accomplish their mission and deliver capabilities based on public safety architecture, ecosystem partners, and security to achieve strategic goals to improve citizen satisfaction, reduce costs, and mitigate public safety and security risks. This session will highlight trends and challenges driving the need for the public safety architecture showcasing best practices with Cisco and ecosystem partner solutions.
SOLCLD-2010 - Smart Manufacturing Enables Guaranteed Business Outcomes (2017 Las Vegas)Enabling a manufacturing environment with an IoT end to end solutions provides a great deal of benefits to a business. Many manufacturing companies struggle with maximizing the return on invested capital, unplanned machine downtime, quality issues, as well as supply chain efficiencies on the factory floor. A "connected factory" allows for real time visibility as to what is occurring on the factory floor. Applying analytics to the data the sensors capture off the machines creates the ability to predict equipment failures, before they occur. This significantly reduces unplanned machine downtime, increases the life of the asset, as well as streamline the flow of raw materials, making the supply chain operate much smoother. Because an end to end IoT solution provides objective data gathered by sensors and analyzed through analytics software rather than being gathered and analyzed by humans, guaranteed business outcomes are now being offered. This guarantee mitigates the risk companies might perceive when deciding whether or not to invest in a "connected factory" initiative.
TNKIOT-1001 - 5G Unleashing the full potential in IoT (2017 Las Vegas)There are 7.5 Billion mobile subscriptions in the world today and 4.1 Billion smart phones. 101% mobile penetration. Who would have thought that would happen when we introduced the first generation mobile telephony 40 years ago? 2G brought mobile voice to the people around the globe, with 3G we brought mobile Internet to the people and with 4G we changed the world again and made broadband mobile. Now we are in the midst of the next big shift in the history by connecting Things to the Internet. Enabling the Networked Society where any thing that can be connected will be connected, smart and interactive. With 5G we will really unleash IoT. Welcome to join us in this industry revolution!
TNKCLD-2000 - Automated Dependency Mapping in the Data Center (2017 Las Vegas)If you’re responsible for IT service assurance, you know it’s no longer sufficient to monitor the performance of individual network and data center components. Today’s data centers are all about the applications, and these applications rely on a complex web of technologies that must come together to deliver a seamless experience for customers. This session focuses on some of the newest Cisco technologies in the data center, including HyperFlex, Cloud Services Platform 2100, UCS Director, UCS Central, and CloudCenter. See how automated dependency mapping provides a complete view of these technologies, how they relate to each other, and how they relate to successful application delivery. This session is hosted by ScienceLogic, the leader in Hybrid IT Service Assurance. See how ScienceLogic affords their customers incredibly broad and deep coverage of Cisco technologies.
SOLCLD-1001 - Containers and Microservices to Accelerate Your Digital Business - WoS Session (2017 Las Vegas)Enterprise IT is getting stretched due to the need for speed to deliver disruptive business applications. Containers enable several key tenants of digital transformation. Portability across different platforms by standardizing packaging of applications reduces friction in deployments. Containers and Microservices accelerate adoption of DevOps, which is key in delivering applications faster. In this session, you will learn what Cisco has to offer from Datacenter and Cloud product portfolio for Containers and Microservices. We will cover products and solutions such as Docker on UCS, Contiv, and Cisco Analytics for Containers.
PSOGEN-1100 - Next Generation Security Services (2017 Las Vegas)With the market rapidly evolving toward digitization, Cisco is capturing extraordinary insights into the next generation of security. Even though security is the foundation for innovation and growth in the new digital environment, organizations are struggling to anticipate and respond to new threats due to complex and fragmented networks, and lack the ability to adapt with agility to changing business models. As the #1 cybersecurity company, Cisco Services is a digital partner by your side, and we position you to anticipate change and move forward quickly. In this session, we will cover the trends as seen, end-to-end, by Cisco security experts, examine real examples of the current threat landscape, and the impact to security operations.
PSOCOL-2003 - Overview of Unified Communications on Cisco ISR 4000 (2017 Las Vegas)IISR4000 architecture allows consolidation of branch UC (unified communications) infrastructure and services with guaranteed performance and flexible deployment options. This session will provide architectural deep dive regarding UC features, capabilities including voice modules on Cisco ISR4000 series routers. This session starts with an overview of traditional telephony (digital/analog voice) and new DSP architecture in ISR4000. Session participants will learn about high density analog voice gateways series (VG3XO) as well as new capabilities offered by high density DSPs (digital signal processor). This session will cover UC scale enhancements and features introduced in CME (Call Manager Express) / SRST (Survivable remote site telephony) as well as CUBE (Cisco Unified Border Element). Attendees will leave the session with • Understanding of existing UC capability on ISRs and role of virtualization in evolution of Cisco UC applications on branch routers.
TNKCLD-1000 - Cloud Value Remains Cloudy (2017 Las Vegas)Uncover how to make the Cloud work for you. Through the cloud, new digital-centric businesses are emerging that are more agile and innovative than anything seen before. Enterprises are worrying about these new, agile competitors, while dealing with upheaval on a massive scale. The challenge: disrupt or be disrupted. There is an extremely important and compelling reason to incorporate agility and continuous development and deployment into your business strategy. There is a pressing need to digitally transform your company in order to keep pace with the market, innovate and win new customers. There is also an easy way to do all of the above wrong. This session will ask the CXO: will the system you are running today work the same when you move it into the cloud? Will it cost the same? Scale the same? In the end, every CXO will need to think about management. You will need to think about measurement and metrics and choose an approach that will work in both your existing and future environments and be able to maintain the constants you expect to rely upon.
PNLSPM-2121 - Evolution to 5G and Cisco's Strategy (2017 Las Vegas)Mobile industry saw major inflection point in 2008 when Long Term Evolution (LTE) was introduced. LTE served the needs for radio and core harmonization using an IP architecture. In the next generation of wireless, another inflection occurs when 5G technology specification are released. Unlike LTE, 5G specifications are developed with Internet of Things (IoT) in mind. Different standards bodies are working aggressively to propose a standard architecture and framework, which will lay foundation for 5G. This panel session will provide an engaging discussion around 5G evolution. Learn how Cisco is developing the integration of 5G into Cloud and Infrastructure strategy. As the 5G evolution continues to be active into the next decade, Operators will adopt new enhancements and provide new services and business models as new players will emerge. Our panelists are leading Cisco’s strategy and engaged with customers in forward-thinking models.
PSOCLD-1225 - Containers and Microservices to Accelerate your Digital Business (2017 Las Vegas) Enterprise IT is getting stretched due to the need for speed to deliver disruptive business applications. Containers enable several key tenants of digital transformation. Portability across different platforms by standardizing packaging of applications, reduces friction in deployments. Containers and Microservices accelerate adoption of DevOps, which is key in delivering applications faster.
In this session, you will learn offers from Cisco’s Datacenter and Cloud product portfolio for Containers and Microservices and Modernizing Traditional Applications (MTA) program.
MTA program allows IT ops teams to dramatically streamline the operational tasks like application provisioning, deployment and updates. Learn everything about this collaborative program from Cisco and Docker and how MTA can help accelerate container adoption in your organization.
PSOSEC-1905 - Protection against ransomware for medium sized businesses (2017 Berlin)Cyber crime is on the rise worldwide and criminals are increasingly targeting midsized companies. A January 2016 New York Times article reported that 60% of all online attacks are aimed at small and midsize businesses. A 2016 Ponemon global study found that in any two-year period, there is a 26% chance that your business will be breached and the average cost to deal with that breach is $4M. These statistics are shocking, and should give every CEO pause. Even more shocking is that 25% of midsized organizations have no in-house information security resource dedicated to combat cyber crime. Ransomware is an indiscriminant threat that doesn't prejudice. Attackers will use ransomware to make a profit from any size organization so long as they can find a vulnerability to exploit. By taking a multi-layer approach to security, smaller organizations can protect themselves from ransomware as they grow their businesses in the new digital economy.
BRKRST-2337 - OSPF Deployment in Modern Networks (2017 Berlin)This session covers the OSPF topics relevant for modern networks. How can scalability be achieved with intra-area and inter-area routing? What techniques, or best practices, should you use when it comes to dealing with external routes. What are the design issues with full meshed and Hub and spoke networks. We will discuss how and when to use OSPF resiliency and fast convergence techniques. The challenges of OSPFv3 IPv6 deployments and design consideration when OSPF is used as a MPLS PE CE protocol. The OSPF solutions in the session will be applicable to both Enterprise and SP environments. Basic routing and OSPFv2 knowledge is a per-requisite for this session.
BRKRST-2041 - WAN Architectures and Design Principles (2017 Berlin)The WAN Architectures and Design Principles session offers an end-to-end design approach featuring the Smart Business Architecture with key areas of focus including resilient IP forwarding, QoS, application optimisation, and data privacy and security. The cornerstones of the session are real-world use cases and WAN design best practices. The WAN Architectures and Design Principles session includes a detailed discussion of the head-end WAN aggregation and remote site design options for branch locations. These options include the use of layer 2 and layer 3 WAN transport models, usage of single and dual WAN links, as well as single/dual router edge topologies. Additionally, Internet VPN as both a backup and primary transport option is discussed. Design guidance will include routing protocol best practices, QoS for the WAN edge, IP multicast enablement, and interconnection with other network modules as well as access to the Data Centre. Other key WAN technologies which are integral to the design are DMVPN and GETVPN for data privacy as well as Wide Area Application Services (WAAS) and WCCP for bandwidth optimisation.
BRKUCC-1600 - Introduction to Cisco Mobile Collaboration (2013 Orlando)This introductory session describes how Cisco's collaboration enterprise mobility solutions provide fixed mobile convergence (FMC) and fixed mobile substitution (FMS) features and functionality to enable mobile workers both inside and outside of the enterprise. The session covers the following Cisco unified communications mobility solutions:
1. FMC with Cisco Unified Communications Manager Unified Mobility feature set which includes features like single number reach, mobile voicemail avoidance and enterprise 2-stage dialing
2. FMS with Cisco mobile clients and solutions for smartphones and tablets including Cisco Jabber
These solutions provide a comprehensive set of mobility features and functions for enterprise mobile workers. Individually or in concert these FMC and FMS solutions provide access to enterprise collaboration applications and services to mobile users including voice and in some cases video over IP calling, presence, messaging, and directory integration. These solutions also provide productivity improvements both for the mobile user as well as users inside the enterprise that the mobile user may communicate with. Further these solutions provide a good return on investment by allowing enterprises to reduce the use of cellular minutes for business calls
At the end of the session it is expected that attendees will have a good understanding of the various Cisco unified communication mobility solutions for enabling mobile workers including a clear picture of the features and functions available with each, solutions and component requirements, and the basic design considerations for deploying the solutions. To maximize the material learned, ideally the attendee should have some familiarity with Cisco Unified Communications Manager including associated devices, services, and principles as well as enterprise collaboration generally.
BRKSPV-1126 - Deploying IP Video over DOCSIS (2013 Orlando)This session will offer attendees an overview of the features and capabilities that the Cisco CMTS has for delivery of IP video over DOCSIS. Attendees will learn how the DOCSIS network can be optimally used for such services. The tools and technologies that will be covered include: - DOCSIS 3.0 multicast - RF spanning - QoS and admission control - Dynamic bandwidth sharing - Adaptive Bit Rate video - Variable Bit Rate video This session will also cover interaction of these features and how they can be combined together to achieve different goals such as spectrum optimization, cost optimization, service separation, and efficient cable modem migration.
BRKSPM-2008 - LTE Roaming Design and Deployment (2013 Orlando)Long Term Evolutions (LTE) is newest technology for mobile operators. Most of existing 2G, 3G mobile networks are migrating to LTE. Compared with 3G, LTE provides high throughput, much better QoS control and low latency. Subscribers have same expectation whether in home network or roaming. This is intermediate level session covering LTE along with 2G/3G roaming design and deployment. The session will focus on LTE roaming using IP exchange (IPX) network and how to inter-operate GRX and IPX simultaneously. I will also cover in depth about policy, QoS implementation, and different local breakout options during roaming. LTE security for home and roaming subscribers will be covered in detail. The participants are expected to learn LTE roaming and security design using best practices and case studies. The content of session will be based speakers hands on experience with tier-1/2 mobile networks.
BRKEVT-2802 - Deploying TelePresence and Video Endpoints on Unified Communications Manager (2013 Orlando)This 90 minute session is aimed at video architects and administrators who are considering, or planning to deploy TelePresence and Video endpoints on Unified Communications Manager
The first section reviews the deployment models, provisioning methods and features available today on Video Communications Server (VCS), TelePresence Management Suite (TMS) and Unified Communications Manager (UC Manager); and provides best practice recommendations on which models and methods to use for various endpoint models and network connectivity scenarios
The second section is for customers who plan to deploy their endpoints on UC Manager and want to understand in more detail how the TelePresence endpoints work on UC Manager, which features they support, and best practices for deploying them
BRKEWN-3021 - Troubleshooting Converged Access Wireless Deployments (2013 Orlando)This session discusses troubleshooting techniques and best practices for the Cisco Converged Access Mobility Architecture. We will cover how to troubleshoot mobility issues under the various deployment models, including Mobility Agents (MA), Mobility Controllers (MC), and Mobility Oracles (MO). We will cover common information, tools, and debugs used by TAC to resolve issues. We will also review key issues to watch out for.
ITMGEN-3250 - The Innovation of Everything (2013 Orlando)As the industry begins enabling the Internet of Things, the way we work and do business will change at lightning speed. How do you use innovation to drive creativity? How can you optimize technology to free up other resources? Hear from Carlos Dominguez, a leader in innovation, as he shares his eye-opening ideas about how to prepare for the future.
BRKSEC-3007 - Advanced Cisco IOS Security Features (2013 Orlando)This session mainly covers design and deployment for the Zone-based Policy Firewall (from the foundations to advanced policy construction) and Identity-based features ( Downloadable ACLs, User-based Zone Firewall and the brand new SGT Firewall). Throughout the session, typical troubleshooting tools are largely employed to provide insight about feature operations and interactions, thus establishing the linkages between theory and practice. The session also discusses IOS advanced filtering resources such as specialized ACLs and Flexible Packet Matching and brings information about IPv6 Security features already available on IOS. This Session is targeted at network security specialists who want to learn about important security features in the Cisco IOS Router platform and Network engineers who need a better understanding of the Firewall and Identity functionalities available on IOS Routers. It is important to emphasize that this breakout does not cover VPN, L2 Security, IOS IPS or even IOS hardening techniques. This breakout is a natural follow-on to BRKSEC-2017.
BRKSEC-3020 - Troubleshooting Firewalls (2013 Orlando)This presentation focuses on preemptive measures and reactive techniques that can be used to troubleshoot, secure, and maintain the Cisco Adaptive Security Appliance Products and the Cisco Firewall Services Module (FWSM). Providing an in-depth understanding of the packet flow through the firewall device, as well as how to effectively utilize the available commands and on-board tools to troubleshoot connectivity problems are the main goals of this presentation. Knowledge is assumed of security fundamentals and firewall technology at the level presented in the Cisco Networkers Online Introduction to Firewalls and Deploying Firewalls.
BRKSEC-2900 - Cloud Managed Security with Meraki MX (2013 Orlando)Meraki's cloud managed networking portfolio includes out-of-the-box capabilities to help administrators secure their network environments. This session will provide an introduction to the Meraki architecture and a deep-dive into the Meraki MX security appliance product line. Presenter will feature a live demo of key features such as Auto VPN, client fingerprinting, identity-based policies, intrusion detection, and more.
BRKOPT-2102 - Software and Control Plane Evolution for IP+Optical Architectures (2013 Orlando)IP+Optical is a emerging architecture for Service Providers and large corporations that require transport of massive amounts of data at very high speeds. In this session, we'll look at the software components that enable this architecture, from agile DWDM networks to novel advanced restoration technologies, multi-layer control plane and path computation and network optimization solutions. These software innovations will be reviewed in the context of Software Defined Networks (SDN) and how they can bring a new level of efficiency to the network. The session will also explore the role of these software innovations in the future of Service Provider networks.
BRKUCC-2021 - Understanding, Integrating, and Troubleshooting Fax Communications in Today's Enterprise Networks (2013 Orlando)Comprehensive VoIP solutions must address the transport of fax communications in addition to traditional voice communications. However, unlike traditional voice communications, fax transmissions have unique characteristics that require alternative integration and implementation methods. This session examines the various real-time fax transport methods, including passthrough, T.38 fax relay, and Cisco fax relay and helps one determine the correct fax transport method based on network capabilities and other design considerations. Additional focus will be given to T.38 fax relay as this is the de facto standard that is widely deployed for fax communications today and is a Cisco recommended best practice. Best practices dealing with product and protocol interoperability, Quality of Service (QoS) considerations, and SIP trunking will be provided for integrating fax communications with Cisco voice gateways, CUCM, and T.38 fax servers. T.38 fax servers are becoming increasingly prevalent in Unified Communications solutions and this session addresses the common fax server deployment models. Key troubleshooting tips will also be highlighted throughout this session. Pertinent configurations, common mistakes, and the important troubleshooting commands, debugs, and traces will be provided to ensure that any fax issue that arises can be quickly resolved.
CCSUCC-2375 - How to manage the transition and evolution of your contact center - the customer point of view:McKesson (2013 Orlando)How to manage the transition and evolution of your contact center - the customer point of view: Is your company ahead of what your customers are saying about you in social media? Are you thinking of how your customer contact can differentiate you in the marketplace? Are you simply in need of a technology refresh? With the right investment, your contact center can be on the forefront of the strategic differentiation for your company. Learn first hand from McKesson how they are managing through their technology transition and managing for business success and differentiation. From architecture, to training, to process, to partnership, learn the key points directly from the end user.
BRKSPG-2204 - Building Carrier Ethernet Services Using Cisco Ethernet Virtual Circuit Framework (2013 Orlando)This session provides an overview of Cisco Ethernet Virtual Circuit (EVC) framework. A Cisco innovation that provides consistency, service awareness, flexibility and increased scalability for Carrier Ethernet and Layer 2 Virtual Private Network (VPN) deployments. Fundamentals of Cisco EVC operation and configuration are covered in detail. The session also illustrates how the framework aligns with the Metro Ethernet Forum (MEF) service attributes and definitions. Finally, Data Center Interconnect (DCI) and business services deployment use cases are covered. Target audience for the session are Service Providers who plan to build or currently operate a Carrier Ethernet network servicing residential and business customers, and Enterprises considering data center interconnection using Carrier Ethernet services.
BRKCOL-2060 - Ignite Your Business! Smart Services for Business Collaboration (2013 Orlando)Collaboration has emerged as an important tool that empowers people to work together in new ways to transform business, accelerate innovation, and do more with less. It's the next-generation of business interaction, where everyone � everywhere -- can be more productive through closer working relationships. But getting there can be painful for organizations that aren�t prepared. Collaboration questions you need to ask include: 1. Is my network ready? 2. Do I have in-house expertise to plan, design ,implement, optimize and maintain a complex solution? 3. Can we monitor and manage collaboration applications and devices? Learn the answers in this introductory session. You�ll have a unique opportunity to learn about Cisco lifecycle collaboration services and tools, and how they enable you to successfully plan, build, and run your network as a powerful business collaboration platform. The session will discuss in detail the Cisco options customers have for Readiness Assessment, PDI, Optimization and Ongoing Management.
BRKSEC-2044 - Building an Enterprise Access Control Architecture with ISE (2013 Orlando)This session covers the building blocks for a policy-based access control architecture for wired, wireless, and VPN networks using Identity Services Engine. Starting with basic user and device authentication and authorization using technologies like 802.1X, MAB, Web Authentication, and certificates/PKI, the session will show you how to expand policy decisions to include contextual information gathered from profiling, posture assessment, location, and external data stores such as AD and LDAP. The architecture will be expanded further to address key use cases such as Guest access and management, BYOD (device registration and supplicant provisioning), MDM policy integration, and 802.1AE (MacSec). Visibility and pervasive policy enforcement through VLANs, ACLs, and Security Group Access (SGA) will also be discussed. This session is intended for Network, Security and Systems Administrators, Engineers, and Managers that need to implement the next generation Unified Access Network.
BRKRST-2509 - Mastering Data Center QoS (2013 Orlando)All you need to know about Nexus QoS: capabilities, implementation, design and best practices for optimization of applications. From Data (FCoE, NFS, iSCSI, CIFS) to Video and Voice. The hardware capabilities will be explained. The focus is to understand QoS, how to design and configure end-to-end QoS in the Data Centre. Configuration templates and best practices will be provided. The session is targeting Network Engineers and Architects involved in Data Centre designs and implementation. Various Cisco NX-OS series platforms are covered.
BRKSEC-2073 - Threat Defense using NetFlow and ISE (2013 Orlando)Trends such as BYOD and the rise of the Advanced Persistent Threat (APT) are leading to the erosion of the security perimeter and increasingly attackers are gaining operational footprints on the network interior. Participants of this session will learn how to leverage NetFlow and the Lancope StealthWatch System in concert with the Cisco ISE and ASA to gain contextual awareness of network activity in order to identify insidious threats and accelerate incident response. This session will cover how to leverage these technologies to gain visibility throughout the kill chain to accomplish tasks such as identifying command and control channels, detecting network reconnaissance, tracking malware propagation and detecting data loss. The target audience for this session are security administrators and analysts interested in learning how to best leverage NetFlow and other telemetry sources as part of their security toolkit.
BSACOL-1005 - Mapping Business Communication Methods & Workflows into an Innovative Architecture (2013 Orlando)This session will provide a proven business alignment technique with a strong focus on innovation. This mapping process links common requirements, communication methods, devices and workplaces to the latest trending collaboration capabilities. It also maps critical business policies and conditions to the required feature sets in the collaboration architecture. 10 of the most trending innovative UC & Collaboration use cases will also be revealed. At the end of the session the attendee should be equipped with a proven technique to align their strategic collaboration needs into an innovative architecture by opening up to newer and more effective ways of communicating.
ITMGEN-3465 - Beyond BYOD: Enterprise Apps and Cloud Services (2013 Orlando)Does your organisation already allow corporate email from personal smartphones? Do your employees want access to more services from more devices? If your company has already launched a BYOD program but is wondering what comes next this session is for you. Join Evan Parthenis as he shares how Cisco's BYOD program evolved from email on iPhones in 2009 to its Any Device strategy today. Understand the importance of workforce segmentation, user driven demand, and an integrated IT storefront. Learn about the role Cloud Services can play in your strategy and see real world examples of how Cisco's EasyApps strategy has increased productivity and transformed the way employees work.
BRKCCT-2052 - UCCE Deployments on Cisco UCS Platforms Best Practices (2013 Orlando)Deployment of UCCE on UCS platforms can be a complex endeavor without proper knowledge, information and methodologies. During this Cisco Live 2013 presentation, best practice design and deployment considerations will be examined to facilitate successful implementations of Cisco Contact Center Enterprise (UCCE) on Cisco UCS Server Virtualized Platforms. Using these best practice processes to realize reductions in both the time and level of effort involved for these deployments will be discussed as well.
This session will provide the attendee information as to the distinct advantages of utilizing Cisco best practice guidelines to enable the deployment of UCCE on UCS consistently and with less opportunity for error.
Participants will learn how the UCCE deployment procedures have changed from those of a traditional hardware model and will be provided insights into how the deployment model can be replicated for repeated use over multiple deployment scenarios.
Session attendees will also receive the latest information regarding Cisco Contact Center Enterprise running on virtualization platforms including recent updates, what's just around the corner, as well as some common design pitfalls and poor practices associated with virtual machine population and upstream network connectivity.
BRKNMS-1040 - Application Visibility and Control: Managing AVC with Cisco Prime infrastructure 2.0 (2013 Orlando)Cloud and Data center consolidation along with BYOD has changed the how enterprise services are delivered by IT. The network plays an important role in providing visibility into users, their devices and their application experience. AVC enables the network administrators gain to get visibility into applications and user experience. This session will focus on planning and deployment of Application Visibility and Control (AVC) which consists of NBAR2, FNF, PA, QoS, PfR and Performance Monitor using Cisco Prime Infrastructure 2.0. We will go though the deployment architectures for AVC and how to incorporate AVC at the various points in the network. This session will also walk though the use cases with respect to voice/video troubleshooting and end user experience and how AVC helps with troubleshooting and remediation.
PSOSPG-1330 - IPv6: Where Do We Go From Here? (2013 Orlando)June 2012 officially brought us the new IPv6 Internet with the World IPv6 Launch led by the Internet Society. Less than six months later IPv6 traffic broke the 1% threshold for the first time, showing that it's moved from experiment to mainstream.
current trend show strong growth of IPv6 content and IPv6 users in certain part of the world.
In this session we'll review some of the key milestones of the IPv6 transition but more importantly review the key areas that must be addressed in the industry to continue to drive the growth of IPv6 on the Internet for enterprises, fixed and mobile users. The Business decision that will lead to broader IPv6 adoption need to be backed-up by data: We will review metrics about IPv6 adoption globally, that should enable better business decisions in adopting IPv6.
We'll also look at the new business opportunities enabled by IPv6 in the Internet of Everything.
BRKCDN-1005 - Better Network Management Through Network Programmability (2013 Orlando)As we enter the age of network programmability the data models, protocols, and tools provided by a programmable network can greatly improve and simplify network management tasks. Configuration and operational data can be read and set regardless of the underlying device. Errors are properly reported to ensure reliable delivery of data. Connections are secure and robust. Data is more intelligently extracted. This session will explore how tools like NETCONF, YANG, and Cisco's Embedded Event Manager and onePK API can radically improve network management applications by offering visibility and provisioning power throughout the network stack. We will also provide an overview of the Cisco Process Orchestrator solution which provides an excellent way to interface disparate systems and achieve robust automation in your environment. Operational state checks and assisted troubleshooting are enabled through automation and orchestration.
BRKSPM-2005 - LTE Policy and Charging Control Architecture (2013 Orlando)Today's mobile internet is being driven by rapid change across the ecosystem. The challenges that mobile operators face are far more complex than just increasing data traffic. A growing number of connected devices and a growing variety of these devices ("phablets," smart meters, autos, sensors, etc.) are running more and more apps for our productivity and entertainment. Even as LTE promises to bring down the cost per bit through improved efficiencies, an always-on architecture means more concurrent sessions per subscriber on the network, with each new LTE subscriber increasing the number of transactions exponentially. Traditionally, the policy and charging rules function (PCRF) of the network is where operators mounted their defensive approach to network management -- ensuring fair usage, capping and throttling users and/or traffic types. This is what's commonly referred to as Policy 1.0. As more and more operators look to differentiate their service plans, policy control has become a strategic point of network control, not just for cutting costs, but as a way to monetize the traffic. This next level, Policy 2.0, focuses on the subscriber, the application, and how the service provider can deliver a more relevant online experience. If 3G was coverage focused; LTE is capacity focused -- ideally suited to deliver high-bandwidth, latency-intolerant, multi-media services. A scalable policy control solution must harness the capabilities of an LTE architecture to differentiate these services and create new business models based on the dynamic control of QoS at an application and flow level.
COCUCC-2360 - Inside CIsco IT: How Cisco IT introduces new UC and Video Services to its users (2013 Orlando)Advanced Cisco Experience (ACE) network under Cisco IT is used to introduce new Unified Communication and Video Services. These services include new releases of Cisco unified communications, collaboration, video, and mobility technology products that our employees use to work the way they want, across different devices and locations, which drives gains in user productivity. ACE team works with Cisco IT Production network teams to synchronize plans at the network architecture and design level in order to identify risks and roadblocks as well as work through dependencies when a service transitions from testing to production.To ensure the best possible user experience, we integrate the dial plan and user directories across both networks and the engineering-led Alpha networks. This integration means that all of our users, regardless of communication platform, can use the same dialing patterns and click-to-communicate features that are so important for a positive user experience. ACE team also specializes in improving user experience by providing custom solutions like unified portal where users can self manage their devices, sync passwords, change PIN, change Caller-ID etc. ACE Team also solved other challenges like keeping end users programs up-to date and finally capture very useful data analytics which will provide valuable feedback to Cisco Product teams and also overall Cisco IT.
BRKNMS-2443 - One Management for Unified Access (2013 Orlando)Design, Deploy, and Operate a Unified Access wired and wireless network with Cisco Prime Infrastructure. In this session, participants will learn how to use Cisco Prime Infrastructure to inventory, configure, monitor, and troubleshoot Cisco Catalyst 3860 converged access switches, Cisco 5760 Wireless LAN Controllers, and the new mobility architecture introduced by these platforms. We will demonstrate how Cisco Prime Infrastructure can be used to: 1. Configure Cisco Catalyst switches and Cisco 5760 WLCs with plug-and-play simplicity 2. Collect and report detailed network inventory and health information 3. Efficiently manage and visualize the new mobility architecture 4. Troubleshoot end-user connectivity and access policies through integration with the Cisco Identity Services Engine 5. Assure end-user network experience with application visibility, leveraging Application Visibility and Control (AVC), flexible netflow, NBAR2, and other performance technologies built into the Cisco network infrastructure
BRKNMS-2030 - Onboard Automation with Cisco IOS Embedded Event Manager (2013 Orlando)Did you ever wish that your routers and switches could become smarter to monitor its own transient error conditions and conduct automated diagnostics? Did you ever struggle with some repetitive tasks that you hope you could have the devices do them automatically? Did you ever dream that your router could automatically configure itself when a new device is plugged in? Come and join us for the session on an in-depth review of the Cisco IOS Embedded Event Manager (EEM) which allows you to achieve all these things and more that you never thought possible before. This session covers the following topics: - EEM Architecture - Understanding Event Detectors - Understanding EEM Policies - EEM real world use case review - Latest EEM feature update - Introduction to ';Embedded Automation Systems (EASy)';, a program offering EEM-based solutions in the area of onboard diagnostics, deployment simplification, high availability and more - EEM new feature and use case demo This session is for attendees who have worked with Cisco IOS, and who wish to strengthen their skill set to provide improved manageability for their network. If you are interested in this topic, you may also be interested in attending the following session: BRKNMS-3021 - Advanced Cisco IOS Device Instrumentation, which will give you an overview on several embedded automation technologies
BRKCOL-2455 - Fixing SIP Problems with Cisco Unified Communications Manager's SIP Normalization Tools (2013 Orlando)Increasingly, systems and applications use SIP to communicate with each other; unfortunately, not all SIP implementations use compatible message headers or bodies. These SIP compatibility issues can bring projects to a halt while waiting for code fixes, new software versions, or expensive service calls. When faced with these issues, the SIP Transparency & Normalization Feature of Cisco Unified Communications Manager provides a tool for the administrator to deal with incompatibilities in the SIP messages exchanged between systems.
This session will review SIP basics and terminology before introducing the SIP Normalization Feature in Unified CM. We'll look at how to configure Unified CM to leverage SIP Normalization, how some simple scripting makes this feature so powerful, discuss the kinds of information you'll need before writing a script, and cover scripting basics. Finally, we'll show real-world examples of SIP Normalization Scripts used to solve interoperability issues.
BRKSEC-4054 - Advanced Concepts of DMVPN (2013 Orlando)This session covers advanced concepts of the Dynamic Multipoint VPN (DMVPN) solution. It starts with an overview of DMVPN functionality; DMVPN hub-and-spoke and dynamic spoke-spoke (Phase 2 and Phase 3) networks. This includes DMVPN network design concepts, choosing a routing protocol and scaling with respect to routing, encryption and redundancy. The talk then continues with an SDN style use case, where the DMVPN Smart-Spoke feature is used to modify the standard DMVPN behavior. This session is for designers and managers of extended corporate DMVPNs and for service providers that are deploying these services for their customers.
BRKCOL-2020 - Cisco Interoperability with Microsoft (2014 Milan)This intermediate-level session provides attendees with a detailed understanding of the Cisco Unified Communications solution when integrating and interoperating with Microsoft. It includes a review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products, a detailed explanation of migration and deployment scenarios, and things to keep in mind before deployment. Related technologies are treated, including call control, presence, unified communications security, telepresence, and rich media applications. This session is for people involved with the planning and implementation of unified communications solutions and those involved in strategic decision making for selecting unified communications solutions. Attendees should have a good understanding of the Cisco Unified Communications high-level architecture and a basic understanding of the Microsoft product set. Content: Review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products. Detailed explanation of migration and deployment scenarios. Things to keep in mind before you deploy... Related technologies: call control, presence, unified communications security, telepresence, rich media applications Audience: People who are involved with the planning and implementation of unified communications solutions. Individuals involved in strategic decision making for selecting unified communications solutions. Pre-requisites: Good understanding of Cisco Unified Communications high level architecture. Basic understanding of Microsoft product set.
BRKDCT-2367 - OpenStack Deployment in the Enterprise / OpenStack - Implementaciòn en las empresas (2013 Cancun)OpenStack is an open source cloud operating system. More and more SP and Enterprise customers are looking for a top-to-bottom cloud stack that is rapidly deployable, open source based and does not break the bank and this is where OpenStack shines. This session will address common questions such as: What is OpenStack? Why should I use OpenStack in the Enterprise? How do I deploy OpenStack? The bulk of the session will focus on deploying OpenStack based on the Cisco OpenStack Edition starting from bare-metal provisioning all the way through the deployment of the controller and compute nodes as well as storage, and networking. A case study will be used to expand on topics such as multi-tenancy, quantum networking and application deployment. The use of open source and commercial tools such as Puppet will also be discussed. This session is very technical with a lot of configuration details.
CEWN-001 - Cisco Empowered Women's Network (2013 Cancun)TOMORROW starts here
Please join us at the Cisco Empowered Women’s Network (Cisco EWN). This network is a global community of highly motivated professional women who connect at Cisco Live! and throughout the year to exchange thought leadership and grow their careers. It was launched at Cisco Live Orlando. An inclusive tomorrow starts here — and it starts with connecting you to successful and motivated women. Attend this exciting event and prepare to:
Get energized with our executive panel of Cisco and customer/partner leaders
Get inspired by “real and raw” role models
Únase a nosotros en la red de Cisco Empowered Women's Network (Cisco EWN). Esta red es una comunidad de mujeres profesionales altamente motivadas que se conectan en Cisco Live! y durante todo el año para el intercambio de liderazgo de pensamiento y hacer crecer su carrera. Se inició en junio en Cisco Live Orlando. Un mañana inclusive comienza aquí - y empieza conectando a mujeres exitosas y motivadas. Asista a este emocionante evento y prepárese para:
Energizarse con nuestro panel de ejecutivas de Cisco
Inspirarse con modelos reales a seguir