View More
View Less
System Message
An unknown error has occurred and your request could not be completed. Please contact support.
Wait Listed
Personal Calendar
Conference Event
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
On-demand Library
Cisco Live Session Videos and Presentations Listing
Online Events
Upcoming Cisco Live events
Social Networking
Connect with Cisco Live
Solutions Center
Cisco Live Conference Exhibitors
Cisco Live Survey
In-person Events
Cisco Live Milan 2014
Event Details
Social Media
Cisco Live Melbourne 2014
Cisco Live San Francisco 2014
Event Details
Scheduler (Live Jan 13)
Social Media
Cisco Live Cancun
Log in to access thousands of sessions on cloud, BYOD, data center, and more!
Join now to access free content from global Cisco Live conferences.
Add to My Interests
Add to My File Queue
Remove From My Interests
Remove from my File Queue
Incomplete Account Information
You have not yet completed your account information. Would you like to do so now?
Edit Account Now
You already have an account in the system. Please click here to login

If you don't remember your username and password, please use the forgot password utility.
  File Download Queue
Search Catalog

BRKRST-2309 - Introduction to WAN MACSec - Aligning Encryption Technologies with WAN Transport (2015 San Diego) WAN based MACSec is a new Cisco innovation that is helping customers achieve business outcomes by providing High Speed Line rate encryption over the WAN. Whether you are doing Data Center Interconnect, Point to Point Ethernet Circuits, EVPN or dark fiber; customers are challenged with choosing the WAN encryption solution to meet their business and technical requirements. As WAN transport options evolve so have number of WAN Encryption options customers must choose from. This session will cover the various WAN encryption technologies from Optical to IPSec including MACSec while comparing and aligning them to the different WAN transport options available. Upon completion of this session, customers will be able to better evaluate and select the encryption solution that best aligns with their WAN transport and business needs.
BRKEWN-2022 - Converged Access Mobility Design & Feature Update (2015 San Diego) This session focuses on design and deployment concepts for enterprise and branch office using the Unified Access, i.e. the core technologies that drive and enable one wired and wireless access policy and one management platform. Topics covered include protocol details like deep-dives into new converged architecture, mobility protocols, mobility tunnel termination, and mobility design recommendations. We will also look into use cases for AVC, Service Discovery Gateway, Local Profiling and Policy Classification, TrustSec, 802.11ac and High Availability(AP-SSO) and how to deploy those features in the Converged Access mode.
BRKEWN-2010 - Design and Deployment of Enterprise WLANs (2015 San Diego) This session focuses on design and deployment concepts for enterprise and branch office WLAN deployments, i.e. the core technologies that drive and enable mobility services. Topics covered include protocol details like CAPWAP, deep-dives into new controller features, mobility protocols and design recommendations, and the latest in design and deployment recommendations for new WLAN controllers, including centralized and distributed models. We will also look into use cases for IPv6 clients deployments for wireless networks using latest software releases 8.1
BRKSDN-2118 - Simulating Networks Using Cisco Modelling Labs (2015 Melbourne) Do you spend more time maintaining your lab environment compared to performing your testing?  Are you frustrated with aging equipment, missing cables, and dwindling rack space?  Would you like a lab that you can design, build, and run from your desktop? Cisco Modelling Labs can help your resolve these and many other network lab problems. In this presentation we will discover how Cisco Modelling Labs provides the same IOS code running on your hardware, but built to run in a simulated environment. Using images such as IOS, IOS XR, IOS XE, NX-OS, and L2 switching, we will design, build, visualise, and launch a network simulation in a matter of minutes rather than days. We will take a look under the covers to understand the technologies used to run the technology, how to deploy it in your environment. the steps to rapidly build a simulation of your production network, and what to do once the simulation is running.
BRKDCT-1456 - Extending the Cisco UCS Director with Orchestrator, APIs and the Open Automation Framework (2015 San Diego) This session will introduce and demonstrate various ways in which the Cisco UCS Director can be extended to achieve a fully customized management and automation solution. Session starts with an overview of Cisco UCS Director and its extensibility features. Next, the session picks few real-world customization scenarios and explores into each of the extensibility capabilities, beginning with the Orchestration, which allows designing custom workflows to achieve complex operations that span across an entire data center stack. Next, session will show how to build powerful custom tasks with CloupiaScript, to adapt to customer's environment. Furthermore, the session will show the XML REST API and Microsoft PowerShell cmdlets, which allow UCS Director integration with ITSM systems. The session ends with a brief intro of UCS Director's unique and innovative Open Automation Framework that allows customers and ISV partners to extend UCS Director to support 3rd party devices.
BRKRST-2045 - L3 VPN over IP Transport, Design and Solutions in the WAN (2015 Melbourne) The desire for segmentation in the network is increasing at a rapid pace. Network segmentation over the WAN using L3 Virtual Route Forwarding (VRF) instances maximises network hardware, by separating organisations logically, on the same physical hardware, greatly reducing cost and operational complexity. Multi-tenant compute environments in the Data Center Management, traffic separation for security purposes and/or internal organisational separation are some of the key drivers for extending logical network separation over the campus and the WAN. This session will address WAN virtualisation from a network view at Layer 3.  We will focus on basic concepts, available IP and Ethernet transport options available from service providers, challenges when implementing IP network virtualisation over the LAN, and recent WAN virtualisation innovations for branch aggregation that will simplify these deployments.This session will quickly review the various VRF-lite options over Ethernet and IP transport options.  In-depth topics include extending various VRF solutions and MPLS BGP VPNs over IP transport, leveraging GRE, multipoint GRE, over the various IP transport options offered by service providers.    Technologies discussed include MPLS over IP innovations leveraging multi-point GRE tunnels, QoS recommendations over sub-rate services in MPLS over IP deployments, MTU challenges,  QoS deployment models in a virtualised LAN/WAN, as well as options for large-scale Layer 3 MPLS VPN services over GRE/IPSec.   This session will also introduce some of the new innovations for Layer 3 including MPLS VPN over mGRE and LISP for L3 segmentation, and will introduce Software Defined Networking (SDN) and how it can apply to the WAN. Understanding Data Center Management Interconnection (DCI) and L2 segmentation solutions is an important application that utilises WAN virtualisation infrastructures, DCI will not be discussed in great detail in this session.  However, there are several related sessions to consider, in combination with this session that may be useful to understanding the broader LAN/WAN virtualisation framework for L2 and L3 within the Cisco portfolio.
BRKCOL-1111 - Building the Bridge: How Cisco Solutions connect Line Of Business and IT Buyers (2015 Cancun) This session is a bridge between the traditional world of IT driven tech buying, and the emerging reality that the LOB has a seat at the table and the requisite funding for IT projects that are integral to the organizations success.. Our internal marketing team tracks these buying habits very closely. LOB spending now accounts for almost half of our Total Addressable Market. This session will deliver uncommon knowledge and demonstrate how to leverage the fastest growing software portfolio at Cisco to supercharge your customer's most important business processes, with the goal of impacting their key outcomes in times of significant change. Attendees of this session will learn: New ways to drive Line Of Business relevancy in partnership with IT How to create a direct connection between your customer's business outcomes and Cisco's solutions How Cisco Business Offers accelerate innovation and reduce risk Deep dive into innovations in both Customer and Workforce Experience Solutions! The session will include case studies that show measurable impact to our customer's business outcomes.
DEVNET-1080 - Coding class - Introduction to Git (2016 Las Vegas) **The presentation PDF for this session will not be available.** In this interactive session, learn the basics of using Git to share and collaborate on code. � Taking place at the DevNet Zone�
PSOSEC-2008 - Secure Design with Threat Modeling (2015 San Diego) Developing products with security in mind from concept to completion is critical to delivering a highly secure offering. Come see how Cisco uses Threat Modeling as an integral part of its Secure Design Lifecycle process to strengthen overall product security.
BRKSEC-1020 - Cisco Firewall Basics (2016 Las Vegas) This session is an introduction to one of the most popular network security devices; the Firewall. The session will introduce Cisco Firewall products and discuss where they are commonly deployed in a network and how they are used. Participants will be introduced to the Cisco IOS, ASA, and Meraki Firewall products. The goal is that participants will learn how they are similar products that can be used to implement network security policies at different places in the network.
BRKRST-2616 - Addressing Networking challenges with latest Innovations in IPv6 (2016 Las Vegas) With large content providers, such as Google, Facebook, LinkedIn and Akamai, all reporting record growth and double-digit percentages of IPv6 traffic and utilization from Residential and Mobile in the US and around the world. Some leading edge enterprises and Platforms have been looking at leveraging IPv6 in ways that enable Service differentiation, higher performance , more flexibility and speed, dramatic scale increase and even higher performance. It is time for the industry to 1) plan for sunsetting IPv4 (or at least provide it as a Service on top of IPv6, 2) investigate new value and innovation that will leverage the properties of an IPv6 Centric approach to Network and Infrastructures. There have been numerous IETF standards and open source software contribution from Cisco and the Industry to address the opportunities of IPv6 Centric infrastructures, and corollary IPv4 as a Service technologies. Intended audience for this session is Network Designers and Architects from Enterprise and Service Provider. Prerequisite for this session is a basic understanding of IPv4 and IPv6 Technologies, and interest in networking innovation .
BRKDCT-2049 - Data Center Management Interconnect with Overlay Transport Virtualisation (2015 Melbourne) This session features a detailed analysis of the architectural aspects, implementation details and deployment benefits behind Cisco’s Overlay Transport Virtualisation (OTV) technology. The attendees will learn how OTV significantly simplifies Data Center Management Interconnect (DCI) deployments by extending Ethernet LANs between multiple sites over any network, making multiple Data Center Managements look like one logical Data Center Management. The attendees will learn how OTV is aimed at providing Layer 2 connectivity beyond the Layer 3 boundary while maintaining the scalability, failure containment and operational simplicity that the Layer 3 boundary provides. The OTV architecture is discussed, giving the attendee a clear understanding of the technical aspects of the technology.  In addition, this session will briefly explore new emerging technologies such as BGP-EVPN and the evolution of OTV technology into the future.  This session does NOT cover the technical aspects of other traditional Layer 2 VPN technologies such as EoMPLS or VPLS etc. Target Audience: Those responsible for the Design, Deployment, Operations, and Management of Enterprise and Data Center Management Networks.  
CISSOL-2002 - IOx and Fog Applications: New Use Cases (2016 Las Vegas) Learn how customers and ecosystem partners are using IOx and fog applications to deliver breakthrough business outcomes associated with their IoT initiatives.
PSOGEN-2901 - What Talent You Need and Why (2015 San Diego) Today's technical leaders will increasingly have need of a new breed of talent in this Internet of Everything economy, where tech skills are pervasively a requirement, but not enough. Harbrinder Kang will talk about Cisco strategies and insights for enhancing people's tech skills with vital entrepreneurial, innovation and creative problem solving skills to help companies remain competitive and win in the fast-changing Internet of Everything economy. Cisco is educating the individuals whom you, Cisco customers, will need in order to be prepared for and capitalize on all the IoE world opportunities. These people are the architects of IoE, the world's future global problem solvers.
PSOGEN-1106 - New Approach to Middleware with Cisco Integration & Development Foundations (2015 San Diego) As today's enterprises embrace social, mobile, and cloud computing, applications and infrastructure are becoming increasingly disaggregated and distributed. Cisco's Integration & Development Foundations middleware provides architects, application developers and integration professionals with the essential capabilities to integrate these new age applications, data and things. Join this session to learn how you can accelerate business outcomes by quickly connecting and automating processes that span on-premise and cloud-based applications, data, and infrastructure.
BRKEWN-3010 - Improve enterprise WLAN spectrum quality with Cisco's advanced RF capacities (RRM, CleanAir, ClientLink, etc) (2016 Las Vegas) The RF Landscape continues to change...With 802.11ac now begining to mature in the market , understanding the tools and strategies that Cisco offers to manage this dynamic change is important. This session will cover updates to RRM, CleanAir, ClientLink and other tools, explaining how they work, and how to use them effectively to optimize your network. This use-case-driven session promises to help you put these tools into perspective, and solve and prevent issues related to changing network demographics like coverage vs capacity, 802.11ac and the Overlapping BSS. This is anadvanced session, so a solid understanding of 802.11PHYbasics, exposure to the 802.11AC specification and a basic familiarity of RRM are advised.
CISSOL-1069 - Promote More Enterprise Business by Defining Your WANs with Software (2016 Las Vegas) Cloud has become accepted by small, medium, and large businesses as their delivery and consumption model for IT services. Meanwhile, their expectations have been considerably raised. Important to them are self-servicing, networking on demand, autoprovisioning, and security, especially important for their branch services to lower their overall costs. It is an opportunity ripe for you, service providers, who can step up to the challenge and deliver branch services that meet all these needs and have a platform upon which to build future profitable services. In this session we will visit the needs of the enterprise branch, show how the emerging technologies of software-defined networking (SDN) and network functions virtualization (NFV) are now necessary to meeting those needs, and briefly explain what Cisco is doing about helping service providers through our new platforms and solutions.
CISSOL-1048 - A New Way Forward in the Digital Era with Distributed Analytics (2016 Las Vegas) **The presentation PDF for this session will not be available.** Discover a new approach to data and analytics that helps organizations conquer the complexity of today�s hyperconnected world. Cisco is using the capabilities of the modern network to - Uncover insights from data that is now everywhere, from the data center to the cloud to the edge - Easily exchange relevant information and integrate applications and processes - Use contextual information to enable real-time engagement and action
ITMGEN-4226 - Autonomic Networking (2015 San Diego) Intelligent devices can automatically form a network, and make themselves available to a controller over a secure, “indestructible” control plane. Hear directly from the lead Cisco AN architect how Autonomic Networking allows for simpler, yet secure network management.
INTGEN-4812 - Innovation Talk: Enabling Digitization with Next Generation Cloud from the Data Centre to the Edge (2016 Berlin) Enterprise customers are shifting to the digital era and new applications and data are moving to the edge of the network. This means that IT, line of business users, and developers need a radically different way of creating, deploying, and managing secure enterprise applications in the cloud. Nick Earle and Charles Stucki will overview and demonstrate how Cisco’s cloud solutions portfolio will enable customers and partners to take advantage of the significant new opportunities that this evolution presents. Topics will include: Cisco Metapod, containers, microservices, PaaS, analytics and multi-cloud management.
BRKACI-3001 - ACI Troubleshooting Tools and Best Practices (2015 Melbourne) The ACI solution has introduced a number of innovations and is a paradigm shift especially for engineers operating DC network infrastructure. This new operational model demands new troubleshooting techniques and methodologies, as well as new best practices.
BRKACI-2006 - Integration of Hypervisors and L4-7 Services into an ACI Fabric (2015 Melbourne) This session provides a technical introduction to how the ACI fabric handles single and multi-hypervisor environments, how the ACI controller provides integration into different VMMs for a single point of management for virtual network management as well as how the fabric integrates and automates both virtual and physical L4-L7 services.   Today's modern Data Center Managements are seeing an increased interest in adopting a multi-hypervisor strategy however management of these multiple virtual environments has largely been achieved through disparate tools, requiring manual co-ordination to physical infrastructure and/or intensive programmatic tooling. The Application Centric Infrastructure (ACI) is adopting an innovative approach to addressing these challenges, through normalisation of different hypervisor encapsulations together with tight integration of the Virtual Machine Manager (VMM) of choice, providing a single point of management for both physical and virtual network infrastructure.  Additionally the ACI Fabric is taking an improved approach to integrating L4 -L7 services. By providing both NFV service insertion based on fabric policy as well as creating an open ecosystem automation framework the configuration and use of multi-vendor physical and virtual services within the ACI is greatly simplified.   This session provides a technical introduction to ACI's support for multi-vendor services (F5, Citrix, Cisco, …) and hypervisors (ESX/DVS, HyperV, KVM/OVS). This session assumes the attendees have a basic understanding of Virtual Machine, L4-L7 services and networking environments.
PSOSP-2455 - Targeting SMB/SME Market with seamless, on-demand networking solution - Cloud VPN (2015 Milan) **The presentation is not available for this session.** CloudVPN is a secure cloud services networking solution that delivers virtual services seamlessly, cost-effectively and on-demand to remote sites, users and businesses. By providing automated, fully user-driven connectivity coupled with cloud services, Service Providers can address the Small to Medium Business/Enterprise (SMB/SME) market, at scale, with significant revenue uplift opportunity.
PSOCRS-1234 - Discover New Opportunities with Recent Campus Switching Innovations (2015 Milan)  This session provides an overview of the most recent campus switching innovations that you will want to know about:- Innovative Multigigabit Ethernet NBASE-T technology that delivers 2.5 G and 5 G Ethernet speeds over existing cabling infrastructure for high bandwidth wireless with 802.11ac wave 2
BRKUCC-2006 - SIP Trunk Design and Deployment in Enterprise UC Networks (2015 San Diego) **The video for this session is unavailable.** The Session Initiation Protocol (SIP) has emerged as the dominant rich media communications protocol on IP networks and the Cisco Unified Communications product portfolio leverages SIP extensively for inter-connectivity. This deep dive session provides in depth coverage of the SIP protocol and how CUCM uses SIP to provide its SIP Trunk features. Updated for Unified Communications 10.5 release this session : Discusses SIP protocol functionality in depth and describes how voice and video calls are set up and negotiated over SIP trunks. Topics covered include : Basic SIP overview, SIP Headers in detail, SIP Identity Headers, SDP In detail for voice and video calls, SIP messages and call flows for CUCM feature invocation At the end of the session you will have a good understanding of SIP Messages and Responses, the Offer/ Answer model, Session Description Protocol attributes for voice and video calls, and feature operation over SIP Trunks. This session is intended to provide an in depth update to an audience with a working knowledge of CUCM and SIP Trunking.
ATE-CL013 - Securing Your WAN Infrastructure As more organizations adopt hybrid WAN architectures to take advantage of lower bandwidth costs, many IT professionals are rightly concerned about the security risks associated with public Internet connections. Discover how you can easily protect traffic passing over lower cost Internet connections and eliminate the need to backhaul it to a central location by turning on the security features already built into your Cisco Integrated Services Routers (ISRs). Learn about the benefits of: • Dynamic Multipoint VPN (DMVPN) • Cisco Cloud Web Security (CWS) • Advanced Malware Protection (AMP) • The Zone-Based Firewall with Sourcefire Intrusion Detection System and Prevention System (IDS/IPS) or Snort IPS.
Student Day - Student Day (2015 San Diego) Cisco Live is Cisco’s premier education and training destination for IT professionals worldwide. We have set aside a full day of activities designed especially for students to increase their knowledge on how best to prepare for a career in IT.
BRKSPM-2124 - Cisco TelcoCloud and VoLTE Solution (2015 San Diego) As a market leading vendor in core, cloud and datacentre solutions, Cisco brings together leading core technology in a virtualized network architecture providing an operational model that allows for rapid and cost effective introduction of new services. We have created a virtualized/orchestrated framework combining functional elements of our partners as well as functional elements developed by Cisco to offer resiliency and elasticity necessary to deliver the promise of efficiency with the mobile cloud operating model. This session provides details about Cisco's Telco Cloud system and shows how this operational model can be applied to introduce services like Voice over LTE. We will introduce the concept of Network Function Virtualization (NFV) and how this Telco cloud solution provides the basis for virtualizing other network functions within the operators' network, while using the same underlying infrastructure and orchestration suite.
BRKSPG-2202 - Deploying Carrier Ethernet Services on ASR 9000 (2015 San Diego) The session will cover: - What is Carrier Ethernet and why to implement it? - How to implement and deploy Carrier Ethernet features on ASR 9000? - This includes features like EFP, L2VPNs, IRB, EOAM and other related features - Implementation details and IOS XR configurations - Verification commands for the same. - Case studies, best practices and special features on Cisco ASR 9000 associated with the end-to-end deployment of Carrier Ethernet.
BRKSPG-2000 - Getting the most out of your IOS-XE router before and after deployment (2015 San Diego) Routers have evolved from CPU-based systems to specialized architectures, deploying multi-core technologies on linux based kernels, to scale for today's networks. More features are deployed in SP networks to enable and operate new services (e.g. NAT, DPI). Both trends increase the deployment complexity. This session focuses on understanding the performance of today's router architectures, either to evaluate them for a particular deployment, or for the operational understanding. Typically, router performance is a function of the hardware and software architecture and the feature set in-use in a particular deployment. We provide an overview of commonly used centralized and distributed router architectures and discuss their pros and cons. The system performance of features (e.g. utilization) during a steady state and during network events (e.g. link flaps) is examined. We also discuss case studies of operational do's and don'ts that have contributed to operational impacts.
BRKSEC-2135 - The Importance of Threat-Centric Security (2015 San Diego) Today’s sophisticated attacks have grown in frequency, severity and complexity. Evolving technologies are paving the way for new attack techniques we couldn’t have anticipated a few years ago. To truly protect against all possible attack vectors, IT professionals must accept the nature of modern networked environments and devices and start thinking like an attacker. Crucial to accomplishing this is first understanding the modern threat landscape and how a threat-centric approach can increase the effectiveness of threat prevention. This session will offer a detailed review of today’s dynamic threats and an overview of how open source technologies such as Snort and ClamAV play a role in enabling effective, coordinated protection for enterprise environments. Enterprise security administrators and architects, CISOs and even CIOs will learn about threat-centric security approaches that protect their environments across the attack continuum - before, during and after an attack.
CCSSEC-2500 - TrustSec – a network security journey (2015 Milan) "The evolution of network security and segmentation at Mondi, a global manufacturing company; what they did in the past, how and why they implemented TrustSec, their challenges and plans for the future."
BRKCRS-3011 - APIC-EM (Application Policy Infrastructure Controller - Enterprise Module) - SDN in the Enterprise (2015 Cancun) After all the recent industry trends like Cloud Computing, Open Flow Networking, Software Defined Datacenter and Open Network and Compute Environment the idea of Software Defined Networks is still prevalent.   1) World of Controllers: In the first chapter of the breakout session we start with an overview of the different SDN controllers and techniques, available on the market and outline on the strategy Cisco pursues.   2) APIC-DC: During the second part we explain what Cisco is doing with Application Policy Infrastructure Controllers (APIC) in the Datacenter and then build the bridge to what is happening with SDN controllers in the Enterprise.   3) APIC-EM: In the third chapter we focus on Enterprise SDN. We introduce the APIC Enterprise Module and explain how we reduce network complexity, amplify network intelligence and how we pave the way for heavy networking in the Next Generation of IT agility at the speed of business. We drill down on the controller design, architecture principles and explain how we do network abstraction and automation with policy intent.   4) APIC-EM Apps: During the fourth chapter we touch on use cases like topology discovery, device inventory, path trace, policies, QoS, ACL and Zero Touch Deployment.   5) Summary: We close with a few conclusions and an open discussion on our plans and are looking forward for a lot of feedback from the audience.
BRKSAN-3101 - Troubleshooting Cisco MDS 9000 Fibre Channel Fabrics (2015 San Diego) Provide guidance for troubleshooting issues that may appear when deploying a fibre channel storage area network (SAN) using the Cisco MDS 9000 Family of switches. This Session introduces tools and methodologies to recognize a problem, determine its cause, and find possible solutions.
ITMPCS-1083 - NetApp: Mission Critical Hybrid Cloud Part 1 - Proven success with FlexPod Converged Infrastructure (2015 Melbourne) Hear how customers use FlexPod converged infrastructure today to accelerate business outcomes. This panel presentation showcases customers who have reached the first stage of hybrid cloud by using FlexPod to lay the foundation for business- and mission-critical operations. These customers in particular deployed FlexPod converged infrastructure giving them the ability to extend their on-premise IT to take advantage of public cloud. 
PSOCCT-1008 - Digital Customer Care - How IT Can Prepare for Customer Care 2 (2016 Las Vegas) This high-level introductory session will examine how the access to digital information is changing the way customer care is delivered. It is intended for those interested in an update on the latest trends in customer care. Participants will learn about the effect of customer journeys on customer care and the increasing preference of customers who choose self-service. We will focus on pillars for reducing customer effort and an overview of the Cisco Contact Center technologies that can enable the transition to digital customer care. At Cisco Live US 2016, we bring you four sessions on omnichannel customer care; BRKCCT-1006 "Deliver Omnichannel Customer Care With Cisco Contact Center Enterprise" PSOCCT-1008 "Digital Customer Care - Preparing for Customer Care 2.0" BRKCCT-1005 "Context Service: cloud-based omnichannel solution for Contact Center Enterprise and Express" BRKCCT-2080 "Deliver Omnichannel Customer Experience with Mobile/Digital channels - Remote Expert Mobile" Join the Cisco Spark Room for this session. Questions? Visit the Cisco Spark Demo within the Collaboration Booth in World of Solutions.
PSOACI-2100 - Cisco Tetration Analytics: Real-time application visibility and policy management (2016 Las Vegas) Using modern big data technology, Cisco has designed a powerful analytics platform. This platform, called Cisco Tetration Analytics, addresses critical datacenter operational issues in ways not possible before. Tetration provides complete visibility in data center and applications, and uses unsupervised machine learning techniques to generate application behavior insights and automated white-list policies for granular segmentation. This is the one session you should not miss at Cisco Live Vegas.
BRKRST-2021 - Comprehensive analysis on Service Provider offerings for Enterprise WAN (2015 San Diego) This session is designed for Decision makers such as Enterprise and Network Architects and Network Designers working on Enterprise WAN and Metro networks who would like to understand availability of the Service Providers offerings, and how these services can be leveraged in Enterprise network design. With the evolution of technology and enhancements in Service Provider offerings, they offer a multitude of services based on MPLS, Optical, Ethernet and Mobile technologies. The service portfolio is wide and offers different options for Enterprise WAN and Metro networks. This session explores different Service Provider offerings through relevant use cases which include technologies such as Layer 2 and Layer 3 MPLS VPN, Hub and Spoke VPNs, Metro Ethernet services, Mobile Backup and Internet demonstrating the different ways these technologies can be integrated to a complete solution by the Enterprise customers.
BRKNMS-2518 - Secrets to Achieving High Availability (2015 San Diego) Many Cisco Advanced Services customers operate with this level of availability or higher. What separates these companies from the companies that have ongoing stability and business disruption due to network instability? The answer is that these companies have a well defined, full lifecycle approach that is is fine tuned to the needs of their business and they follow it! Many other customers manage their network 'reactively' by responding to problems as they arise. This is expensive and also sets the stage for large network failure events as the 'fixes' fail to take a holistic view of the network. Most large network outages are found to be a culmination of many small problems accumulated over time. This session will provides the strategies and methodologies utilized by Cisco Advanced Services and developed from over a decade of experience delivering Optimization Services to our customers. The strategies revolve around Design, Hardware, Software, Change Management and Network Management to address the full lifecycle of a technology from introduction to removal from the network. Where other sessions will focus on the design of a highly available and resilient network, this session focuses on what must happen after this design is created. Of course, understanding this will also influence the design process.
BRKUCC-3662 - Troubleshooting SIP (2015 Melbourne) In this session we will look into how to troubleshoot complex SIP call paths. We will have a brief overview of the SIP standard, necessary for troubleshooting and also touch on some troubleshooting tools. Then se will look at some real-world case studies and step through methods to troubleshooting and find the root cause. Familiarity and experience with SIP will be beneficial but is not required.
BRKUCC-1660 - An Introduction to Cisco Collaboration for Voice and Video (2015 Melbourne) **The video for this session is unavailable.** Video has been the new Voice in Unified Communications for a few years – and many organisations are using video enabled devices every day. Cisco Unified Call Manager makes Video telephony as simple as Voice. Video enabled devices integrate into existing IP telephony networks seamlessly; this provides users with a majority of the familiar telephony functionalities they are used to, providing key benefits for Enterprises. This session provides an overview of all components of Cisco Unified Communications and explains its components and capabilities for both Voice and Video. This entry-level session discusses broadly the new Cisco endpoints and their deployment. It includes key topics such as QoS, common protocols, & how to integrate existing videoconferencing equipment with other applications. Attendees will be given an introduction to the best practices for Voice, Video communications and how to Design and deploy IP Video enabled telephony in their Organisation. Subsequent breakout sessions will cover specific components of the TelePresence solution and architecture in depth.
PCSSOL-1052 - Does Your Data Center Operations Keep Pace With the Cloud Technology? (2016 Las Vegas) In the Networked Society, enterprises will need 10 times their current IT capacity � but without 10 times the budget. Leading cloud service providers have already changed the game when they developed a new cloud and data center operations standard. In this session we will discuss how you can become on par with them by: Making service and end-user experience the operational priority By moving from a silo-based service view to one based on integrated horizontal business and service control combining: Application Operations Physical IT Infrastructure Operations Virtualization, OS and middleware operations Data Center Facilities Management Bringing you scale and keep you in pace with the latest cloud technology to deliver optimal service performance at lowest possible TCO. In the session you will get a glance of the way we run business and service control centers.
PCSSOL-1049 - Laird RF Knowledge and Technology Solutions Make the EIoT Work (2016 Las Vegas) Laird�s vision is to create a world where smart technology enables virtually everything � to sense, think and communicate. Transforming our way of life and empowering us to do more than we can imagine. We live in a connected world � one that is moving ever closer towards total connectivity. Learn how Laird uses its RF knowledge and technology to make EIoT happen, enabling mission and life-critical devices in our five key markets: Connected Industry, Connected Transport, Connected Medical, Mobile Devices and Telecom / Computing.
GENSSN-1629 - The Reality of Intercloud: What’s Now and What’s Next (2015 Melbourne) The world of many clouds is evolving toward a dynamic, hybrid cloud environment. By connecting private, public, and hybrid clouds in to a global Intercloud, Cisco and its partners are empowering IT to move at the speed and agility required by businesses —with complete confidence and freedom of choice. But with so much buzz around cloud, how do you know what’s real now? Come hear from Cisco executives along with key partners/customers Accenture, Portugal Telecom, Adapt and Tapjoy, who will share real-world examples of the value Intercloud brings for them and their own customers. You’ll also see a demonstration of how Cisco, along with its partners, will bridge the gap between on premise and cloud. Don’t miss this session to learn how your organization can connect to the Intercloud to become more flexible, add revenue, and simplify your business.
DEVNET-1128 - Cisco Intercloud Fabric NB Api's for Business & Providers (2015 San Diego) Get to know the latest Rest API's and their Capabilities for Intercloud Fabric Business & Provider Editions. Understand how these API's can be used to integrate ICF into your Business Applications and provide the advantages of a true Hybrid Cloud to your end-users.Taking place in the DevNet Zone.
BRKSEC-3034 - Sourcefire Network Security Analytics: Finding the Needle in the Haystack (2015 Melbourne) The job of a Network Security Analyst is many faceted, but there are two key analyst functions that effective security solutions need to support. The first involves security data exploration and threat discovery. Identifying individual and related anomalies in a sea of regular network behavior is a constant challenge to network security professionals everywhere. Through both algorithmic techniques and by facilitating human inspection of data, security analytics are the base level tools of the trade. The second aspect is that of story telling. Whether an analyst is quantifying the efficacy of network security solutions protecting assets or identifying attack vectors after a breach, effective security analytics tools that can help build a narrative are key. Attendees will gain exposure to the breadth of security analytics tools provided by the Sourcefire Solution and how to leverage them to focus and streamline their security workflows.
PSOIOT-4004 - Bringing IoT to life with end-to-end architectures and technologies– security, scalability, resiliency, fog computing (2016 Berlin) You know that IoT technologies can help your business to breaking down information siloes, deliver on operational efficiency and gain competitive advantage but  you are not sure where to start and how to prioritize your  investments.  Cisco has developed an IoT architectural approach that makes it simple for you to future-proof your IoT investments.  These architectures are built on the holistic strategy needed for successful IoT implementations that are built on the following technologies: Cisco’s Cloud and  Fog computing, Pervasive security, Unified compute, Field and embedded networks, Industrial switching & routing, Applications & management platforms from the core to the edge. In this session you will learn about Cisco’s products and solutions for different industries such as Manufacturing, Transportation, Oil & Gas, Utilities and Enterprises and how it can be your blueprint for IoT implementations to accelerate your journey to tangible business outcomes. 
PSOEWN-1006 - Cisco - Meraki Design Options and Guidelines (2016 Berlin) Enterprise IT is transforming to accommodate the various business need/challenges and adopt to technology trends - BYOD, Mobility & Secure Guest Access, Cloud Applications, and IoE to name a few. Organizations and IT decision makers are looking for products and solutions that are architected to support the various business challenges, nimble and easy to consume with specific thrust on Simplicity. The objective of this session is to highlight Cisco's strong CNG (Cisco Meraki) product set and offer specific design guidelines on how to integrate Meraki in Cisco Campus and Branch networks. Session participants will be able to understand and take away use cases, best practices and configuration tips on how to deploy and integrate cloud based Meraki product portfolio to their existing and new Enterprise network designs.
DEVNET-1120 - Intercloud Fabric - AWS and Azure Account Setup and Utilization (2015 San Diego) Getting started with Intercloud Fabric requires an account on a cloud provider. The easiest place to get started is Amazon AWS or Microsoft Azure. Find out what account settings you'll need to started with Azure and AWS.Taking place in the DevNet Zone.
DEVNET-1008 - Private or Public or Hybrid ? Which Cloud Should I choose? (2015 San Diego) With the advent of cloud computing, the choices for delivery and consumption of applications have drastically increased. With choices comes complexity. Enterprises often find themselves struggling to decide if public, private or hybrid cloud is the best choice for their needs. This session will talk about the pros and cons of public, private and hybrid cloud. It will also describe how Cisco Intercloud Fabric (ICF) can provide the best of both worlds. Taking place in the DevNet Zone.
Get More Results