No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
Participant
Conference Event
Meeting
Interest
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
On-demand Library
Cisco Live Session Videos and Presentations Listing
Online Events
Upcoming Cisco Live events
Social Networking
Connect with Cisco Live
Solutions Center
Cisco Live Conference Exhibitors
Prizes
Cisco Live Survey
In-person Events
http://www.ciscolive.com/global/?zid=CLO-global
Cisco Live Milan 2014
http://www.ciscolive.com/emea/?cid=CLO-EU
Event Details
http://www.ciscolive.com/emea/details/?cid=CLO-EU
Scheduler
https://www.ciscolivemilan.com/connect/publicDashboard.ww?cid=CLO-EU
Social Media
http://www.ciscolive.com/emea/social-networking/?cid=CLO-EU
Cisco Live Melbourne 2014
http://www.cisco.com/web/ANZ/cisco-live/index.html
Cisco Live San Francisco 2014
http://www.ciscolive.com/us?cid=CLO-US
Event Details
http://www.ciscolive.com/us/details/?cid=CLO-US
Scheduler (Live Jan 13)
https://www.ciscolive2014.com/connect/publicDashboard.ww?cid=CLO-US
Social Media
http://www.ciscolive.com/us/attendees/social-networking/?cid=CLO-US
Cisco Live Cancun
http://www.cisco.com/web/MX/ciscolive2013/
Log in to access thousands of sessions on cloud, BYOD, data center, and more!
Join now to access free content from global Cisco Live conferences.
Add to My Interests
Add to My File Queue
Remove From My Interests
Remove from my File Queue
Incomplete Account Information
You have not yet completed your account information. Would you like to do so now?
Edit Account Now
Ignore
You already have an account in the system. Please click here to login

If you don't remember your username and password, please use the forgot password utility.
  File Download Queue
Search Catalog
 

BRKNMS-1032 - Network Management KPI's (2012 San Diego) An introduction to Network Management KPI's ( Key Performance Indicators) and best practices on what they mean and how they should be implemented. This session is intended for Technical leads and Managers that work in Operations, or with Operation teams. Understanding KPI's is important and how to use them to present information to your customer as well as how to use the data to improve internally. Session will also include an overview of ITIL with a focus on Incident, Change, and Problem Management. It will cover QA checks what they are some key points on what to do and not to do. Sample of where the data comes from and what the process is to generate the final KPi’s and graphs etc. The session is not technology specific and does not dive deeply into any technology specific KPI’s. It does cover generic Operational KPI’s based around the ITIL process guidelines in detail.
5.0/5.0
BRKSEC-3005 - Advanced IEEE 802.1X (2012 San Diego) This session builds focuses on design optimization and troubleshooting IEEE 802.1X. Drawing on real-world examples, we examine complex system interactions that can occur when deploying IEEE 802.1X and how to prepare for those situations. We briefly review three deployment models (Monitor Mode, Low Impact Mode, and High Security Mode), focusing on best practices, benefits, limitations, and advanced features such as NEAT. The session will also address how to troubleshoot common problems in each model, including authentication failures, authorization failures, IP telephony failures, and other complex system interactions. A basic understanding of IEEE 802.1X is required.
5.0/5.0
BRKCRS-2031 - Multilayer Campus Architectures and Design Principles (2012 San Diego) This session features best practices for deploying the Cisco Multilayer Campus Model with an emphasis on high availability. It focuses on the technology alternatives related to an enterprise campus network. The session contains design and implementation guidance on technology and protocol alternatives like NSF/SSO, HSRP, GLBP, Spanning Tree (PVSTP+), and Rapid Spanning Tree (Rapid PVST+). Software features and design principles for each layer of the hierarchical network model are covered. Detailed examples are presented of failure analysis scenarios and LAN and Interior Gateway Protocol (IGP) tuning related to enterprise networks. Finally the session treats common pitfalls such as asymmetrical routing, unicast flooding, and routing black holes and provides best practices for optimizing an enterprise campus network to support today's business applications. This session is for attendees responsible for the design, deployment, operations, and management of enterprise campus networks. Introductory knowledge of Spanning Tree, routing protocols, and LAN switching is recommended.
4.5/5.0
BRKUCC-2785 - Integrating Cisco Unified Presence including Intra-Domain Federations (2012 Melbourne) Enterprises are looking towards eXtensible Messaging Presence Protocol (XMPP) for presence, instant messaging, and application integration to enhance the collaboration and productivity of employees. They desire to understand how presence and instant messaging are utilised in an integrated unified communications deployment, and how best to integrate with standard open application interfaces via inter-domain and intra-domain federations. This session will focus on Cisco Unified Presence 8.x, with its incorporation of the Jabber eXtensible Communications Platform. The new feature functionality introduced allows for integration through a number of different interfaces, and the design impacts and deployment considerations will be explored. The session will also include how the developer community can be enabled to use the standard open application programming interfaces, as well as how to design an enterprise presence and instant messaging solution. This session is intended for network administrators, network architects, network designers, system integrators, application developers. A basic understanding of Unified Communications is a prerequisite.
5.0/5.0
ITMGEN-2621 - Social Networking - Business Tool or Personal Space (2012 Melbourne) Social media is not a fad. It's here to stay and changing everything along the way. Social media is transforming how people communicate and collaborate, and in the process, is giving everyone a voice and the ability to change the world with a single tweet. People now have the power to voice their opinions or to organise millions to rally against causes or injustices. We have much to learn, teach and share with each other. I hope to share with you my stories and knowledge at Cisco Live so that we can truly be social!
BRKUCC-2058 - Understanding Cisco MediaNet and Rich Media Collaboration (2012 Melbourne) Are you stressed out about how to monitor your Cisco TelePresence Video deployment? Collaboration is having an increasing impact to the network, user work style, network applications as well as expectations from the network. Application and network operators are challenged with providing a reliable collaboration service that works every time. However, issues do occur and in this session we will cover strategies for quantifying video conferencing demands, fault identification , isolation as well as expedited resolution. We will cover architectural strategies for both the endpoint and the network as well as the day to day tools that provide much improved visibility into application health and performance to asses measure and accelerate troubleshooting of voice/video/data applications. Standard MIBs and alerting mechanisms as well as new management tools, new monitoring features like IOS and MSI performance monitoring, mediatrace and IPSLA VO will be covered. Live demonstrations of the tools and technology will be used to provide tangible context. Join this session, learn about the latest tools and strategies and get back the enjoyment from your TelePresence deployment! Are you stressed out about how to monitor your Cisco TelePresence Video deployment? Collaboration is having an increasing impact to the network, user work style, network applications as well as expectations from the network. Application and network operators are challenged with providing a reliable collaboration service that works every time. However, issues do occur and in this session we will cover strategies for quantifying video conferencing demands, fault identification , isolation as well as expedited resolution. We will cover architectural strategies for both the endpoint and the network as well as the day to day tools that provide much improved visibility into application health and performance to asses measure and accelerate troubleshooting of voice/video/data applications. Standard MIBs and alerting mechanisms as well as new management tools, new monitoring features like IOS and MSI performance monitoring, mediatrace and IPSLA VO will be covered. Live demonstrations of the tools and technology will be used to provide tangible context. Join this session, learn about the latest tools and strategies and get back the enjoyment from your TelePresence deployment!
ITMGEN-2010 - Coping with the Explosion of Mobile Devices (2012 Melbourne) When your CEO implements drastic changes on new devices you need to support, how do you handle the impact on the network? How do you control your data when it's accessible almost anywhere by a demanding workforces? What security measures are scalable to prepare for the future? How can you plan for the next big push? Share your experiences - good and bad - with your peers. Does your organisation struggle with the idea that the boundaries between work and play are blurred? Are you seeing an increase in productivity with the use of social tools? Session Summary: - Learn the history behind Cisco IT's transformation from a completely restricted, corporate provided mobility strategy to an open, Any Device strategy - Hear about the borderless security architecture Cisco built to quickly enable devices from all major manufacturers - Understand the unique liability model Cisco implemented and how it enabled device choice and reduced cos Questions: - What was the single biggest challenge in moving to an Any Device model? - Do you have thoughts on how 4G networks change usage patterns? - How well is community support working for you? - Can I have a free iPhone? (no)
BRKUCC-2041 - Unified Communications Security: Design and Best Practices (2012 San Diego) As the feature and functionality available within Unified Communication systems advance, maintaining security, reliability and confidentiality of the voice and video traffic traversing over IP networks becomes a growing challenge. This session explores the different vulnerabilities that an Enterprise Unified Communication system can be exposed to and the mechanisms available to address them and mitigate possible attacks. This intermediate session discusses design options available for securing the Cisco Unified Communication system. It also presents the best practices recommended for implementing the various security tools and technologies available within the UC product family.
4.8/5.0
ITMCOC-2577 - Inside Cisco IT: Pervasive Video Strategy (2012 London) You've decided to expand from five video endpoints to 500, but where to start? Planning for pervasive video is tougher than supporting voice or data, but it doesn�t have to be overwhelming. Learn from Cisco IT's four-year journey integrating thousands of endpoints and gain valuable insight for your own deployment. Just as vital as technology are the process and culture changes required for holistic video management. Not only will you learn about the deployment of video, but also how to align to your business values and increase user adoption. Beyond the technology itself, it�s important to understand the implementation processes involved and how to drive culture change throughout the organization.
ITMCOC-2570 - Inside Cisco IT: Making The Leap To IPv6 (2012 London) A session focused on the technical/business drivers, successes/challenges and lessons learned (so far) around Cisco IT's implementation of IPv6 on internal and customer-facing networks.
ITMCOC-2568 - Inside Cisco IT: Elastic Infrastructure Services (2012 London) The Private Cloud is one of the fastest growing solutions today and the significance of the secure multi-tenant data center on business goals is increasing. Cisco IT is building the infrastructure foundation for Cloud Computing, but true virtualization of the data center environment requires a holistic approach in managing and orchestrating network, server and storage resources within a data center and across multiple data centers. Cisco IT has been a fundamental driver in building and adapting the suite of management tools needed today to orchestrate virtual data center infrastructure to deliver business services. Attendees will learn how Cisco IT is architecting, designing and implementing these next-generation virtual data center orchestration solutions, and possible directions for cloud computing management. Cisco IT is migrating most of their traditional data center applications to a radically simplified virtual compute platform. This has significantly reduced the number of network and server devices and the cable overhead within the data center, while also speeding deployment time and overall application deployment agility. We have aggressively deployed Cisco Unified Computing System servers and Nexus physical and virtual switches to provide the infrastructure foundation for cloud computing inside Cisco. CITEIS Gen2 Program Delivering Multi-Tenant IaaS Cloud Solution. It�s an End-to-End, fully integrated CIAC based Cloud Solution. Attendees will learn about the difficulties involved in migrating a heterogeneous set of data center platforms and applications to a virtualized platform. Attendees will also hear Cisco IT�s initial results of this server platform migration in terms of cost savings and power reduction as well as enabling more reliable data center architectures at an acceptable cost. Additionally we can share our early experience in creating and expanding the cloud computing platform within the enterprise. Session highlights include: � Multi-tenant Data Center Design � Infrastructure as a Service (IaaS) � Reducing data center operating costs � Driving higher utilization of existing servers and storage devices � Business continuity � Organization Alignment � Application transformation
BRKCRS-2301 - Enterprise IPv6 Deployment (2012 London) **The video for this session is unavailable.** This session focuses on IPv6 deployment options for the enterprise and commercial network manager, with in-depth information about IPv6 configuration and transition methods. IPv6 deployment considerations for specific areas of the network such as Campus, Data Center, Internet Edge, and WAN/branch are discussed. The session features best practices for deploying IPv6 with a variety of associated technologies.
5.0/5.0
BRKMPL-2104 - Deploying MPLS Traffic Engineering (2012 London) This session covers the deployment of Traffic Engineering in MPLS networks. The material presents a brief technology overview and then focuses on three deployment scenarios: bandwidth optimization, traffic protection, and enhanced QoS. In the latter part, the session discusses inter-domain traffic engineering (multiple Interior Gateway Protocol areas and autonomous systems) and general deployment recommendations. The attendee can expect to see numerous sample configurations. This is an intermediate-level course that requires familiarity with MPLS and link-state routing protocols (OSPF or IS-IS). Previous attendance of session BRKRST-1101, "Introduction to MPLS," is highly recommended. This session is intended for service providers and enterprise customers deploying their own MPLS traffic engineering network.
5.0/5.0
BRKSEC-2003 - IPv6 Security Threats and Mitigations (2012 Melbourne) This technical session is about the security of IPv6 protocol and leverages the attendee's knowledge of network security. The session starts with threats common to IPv4 and IPv6 networks with topics like neighbour discovery, IP spoofing, and scanning by worms, ICMP security policy. It then addresses some specific IPv6 issues like transition mechanisms (especially tunnelling techniques and dual-stack network), extension headers, use of IPsec. Finally, the session covers how to enforce an IPv6 security policy and how to securely transport IPv6 on a public Internet (being IPv4 or IPv6). The session is mainly for enterprise networks, session BRKSPG-2603 is the SP version. Basic knowledge of IPv6 and a broad understanding of security in an IPv4 network are prerequisites.
5.0/5.0
BRKIPM-2262 - Multicast Security (2012 London) This session shows how the Cisco IOS set of command-line tools can be used to provide access and admission control to the network or router (for protocol security and prevention of attacks), as well as to multicast applications, and shows how to control their intended usage. Explicit examples for common cases are presented. The session also gives an overview of the current and upcoming functions available for IP Multicast with IP Security, discusses ways to dynamically provision or control multicast application usage, and reviews multicast and firewalls. This session covers requirements in both enterprise and service provider networks when using IP Multicast.
BRKNMS-2847 - Ethernet OAM - Technical Overview and Deployment Scenarios (2012 London) This breakout covers the latest advances and the value proposition of Ethernet Operations, Administration and Maintenance (E-OAM) protocols to Enterprise and Service Provider market. With the increased adoption of Ethernet services, Ethernet OAM is a key requirement for their success and continued growth. The session provides a technical overview of the work at various standard development organizations, such as: IEEE, ITU-T and MEF. The following protocols will be covered: Connectivity Fault Management (CFM IEEE 802.1ag), Ethernet Link OAM (IEEE 802.3ah), ITU-T Y.1731, Ethernet Local Management Interface (E-LMI - MEF 16) as well as OAM interworking functions. Deployment scenarios and best practices will be presented covering fault management (detection, verification, isolation, notification) and performance management (delay, loss) of Ethernet services.
BRKNMS-2841 - Enterprise Network Device Administration with TACACS+ (2012 London) Network device administration based on TACACS+ is one of the key functionalities of network management. Whether for compliance or regulatory reasons or for auditing, knowing who did what and when on which device is mandatory in every network infrastructure. In this session we discuss basic AAA for device administration, showing the pitfalls of different methods for different access technologies (Console, SSH, ...) up to differentiated CLI command authorization. We show the difference in functionality between using TACACS+ and RADIUS for device administration. We also show granular access rights based on policies setup on CiscoSecure ACS 5 policy rules to allow different rights on different device groups and / or locations allowing complete control of CLI access. And we will blend in third party OTP servers into the mix.
4.3/5.0
BRKNMS-2464 - 13 Smart Automations to Configure Your Cisco IOS Network (2012 London) Is there too much manual configuration going on in your network? Have you ever accidentally locked yourself out of a remote device? Need to deploy a few hundred branch routers across the globe? Want to quickly apply maintenance config updates to a handful of devices running various different IOS releases? Your Cisco IOS Network provides a wealth of advanced device manageability instrumentation (DMI) and Embedded Automation Systems (EASy) to design and implement your own Network Automations. Learn how Network Automation allows you to automate manual tasks, better operate existing network services and even enable new and innovative networking solutions. This Breakout Session uncovers embedded Network Automation capabilities you can use to interact with your network elements for the purpose of (re-)configuring them in a more effective, efficient and robust way. Network Automation fundamentals as well as the choice and use of appropriate practices are illustrated through a combination of presentation and best practice examples. The topic is relevant for network planners and administrators, engineers and system integrators for both enterprises and service providers.
BRKNMS-2031 - SYSLOG Design, Methodology and Best Practices (2012 London) This session will help define the design and methodology for implementing a robust syslog solution using open source tools on Linux platforms. It provides leading practices for deployment of a set of tools and applications to support effective collection, storage, and analysis of syslog messages. This session provides examples using messages from Cisco IOS Software, but is applicable to all other syslog message types and general event management.
5.0/5.0
BRKCRS-3449 - Desktop Virtualisation Ready Enterprise Network (2012 Melbourne) Many large enterprises are transitioning from traditional compute model to a virtual compute model in order to minimise their TCO. This session will discuss the impact that virtual compute deployments have on the design of the campus network. Campus design best practices such as high availability, control plane policing, QoS and identity will be discussed in the context of a virtual desktop environment. Key new architectural requirements for desktop virtualisation such as next generation power over Ethernet, per VDI session bandwidth policing, location services and operational manageability will also be discussed. The discussion will also focus on building next generation green campus workspace. This intermediate level session is intended for enterprise network design and operation engineers as well as network managers looking to evolve their campus networks in readiness for the next wave of desktop solutions.
5.0/5.0
BRKSEC-2145 - MPLS VPN Security (2012 London) This session discusses the security properties of MPLS VPNs, both from the SP and the VPN customer perspective. First, we explain the fundamentals of MPLS VPN security, followed by design rules for MPLS providers to keep the service secure. We then discuss the security of advanced MPLS concepts and architectures, such as Multicast VPN, the various Inter-AS cases, and Carrier's Carrier. Target audience for this session are network designers, operators and security officers of both SPs and enterprises.
3.0/5.0
BRKSPG-2069 - Next Generation Optical Networks and Architectures (2012 Melbourne) Today's Transmission, Carrier Packet and Data Centre networks allow greater flexibility in design and service delivery but demand more from the underlying transport network to enable these dynamic multiprotocol services and how they integrate. In this session we will explore the evolution of Dense Wavelength Division Multiplexing (DWDM) networks and the ongoing migration from Fixed Optical Add/Drop Multiplexing (OADM or F-OADM) to utilise dynamic Reconfigurable Optical Add/Drop Multiplexing (ROADM) technologies to gain greater efficiencies and benefits as well as how this evolution will continue towards a dynamic zero-touch architecture based on Omnidirectional and Colourless optical routing technologies to deliver Wavelength Switched Optical Networking (WSON).
BRKSPG-2051 - Evolution of Service Provider Edge Architectures (2012 Melbourne) Transformation of the IPNGN Service Edge is driven by the evolution of broadband, mobile, business and cloud services. Service Provider Edge architecture evolution is motivated by the trends in Cloud Computing, multimedia applications or device-independent mobile access to services. This session focuses on the converged IPNGN Service Edge architecture and design options as well as emerging technologies in these areas. Centralized and distributed multiservice network edge architectures are briefly presented and the more recent topics of Evolved Programmable Networks (EPN) and Network Function Virtulisation (NfV) are then discussed showing the advantages of these technologies and some of the challenges they introduce. Finally, NfV orchestration is discussed.
ITMCCS-2580 - Hybrid Cloud Networking (2012 London) "In a Cloud Computing environment a customer (enterprise or tenant) may acquire resources in (one or more) Public Cloud operated / owned by a Cloud SP to satisfy occasional peak demands (Cloud Burst) or acquire resources permanently for certain applications (such as backup or permanent workload outsourcing to Cloud). A tenant may decide to move certain components of distributed or parallel or multi-tiered applications to (off-premises) Cloud and keep others on tenant premises (on-premises). For example, DB tier remaining on-premises, whereas web and app tiers moving to Public Cloud or a set of slave nodes of a distributed/parallel application moving to Public Cloud. In this case a number of issues should be addressed, such as on-premises resources should be able to work seamlessly with off-premises Cloud resident resources, where firewall and other enterprise policies between tiers or components remaining intact. In addition a tenant may want to manage seamlessly on-premises and off-premises resources together (as if they are on the tenant intranet). We call a Cloud that facilitates seamless access to, execution of applications on, and management of on-premises and off-premises resources, a Seamless Hybrid Cloud (SHC). An SHC, first and foremost, will be facilitated by seamless and secure connectivity between on-premises and off-premises resources. While a typical (L2/L3) VPN can be used for seamless connectivity, it may not be suitable for a number of reasons. In a typical VPN, the end-points (EP) land on tenant premises. But in the case of a Hybrid Cloud there are EPs that are on the tenant side and the others on the Cloud side (EPs landing on public Cloud DCs), which is further complicated by a number of issues : 1) Public Cloud DCs host multiple tenants, 2) virtual Cloud resources of a particular tenant may be distributed over multiple physical resources (in one or more Cloud DCs), 3) multiple tenants sharing the same physical resources. These issues make it challenging to decide where to position the EPs on the Cloud side. In this case study, we discuss how PPVPN (Provider Provided VPN) can be extended to support SHC. "
BRKUCC-2725 - Deploying Cisco Unity Connection Unified Messaging or Single Inbox Messaging with On-Premise or Cloud Applications (2012 Melbourne) Current trends in business have IT professionals demanding the flexibility to deploy different types of voice messaging capabilities, on-premise or in the cloud, to their segmented employee populations for various reasons, including compliance. For example, you need to deliver the messaging solution that best fits the way your employees work by deploying unified messaging to your mobile employees, integrated messaging to your general employee population, and voice mail only to a subset of your employees or executives. This intermediate session will describe Cisco Unity Connection's new architecture and technologies when deploying unified messaging or "single-inbox" access to voice mails, faxes, and emails, in addition to integrated messaging and voice mail only access. Cisco Unity Connection's new architecture of synchronising messages and directory information with the existing corporate email and directory infrastructure for both on-premise and cloud solutions will be covered. The session will focus on Microsoft Exchange for on-premise integrations and Microsoft Office 365 (formerly BPOS) for cloud integrations. Plans for integrations with Lotus Domino and Google Mail will be discussed. In addition, migrations from Cisco Unity to Cisco Unity Connection will also be discussed briefly.
5.0/5.0
BRKSPG-3611 - Troubleshooting IOS-XE (2012 Melbourne) This session provides an overview of both the hardware and software architectures specific to the ASR1000 Series Router and IOS-XE, and will include troubleshooting methods and techniques to monitor overall system health and platform-specific troubleshooting techniques. It will also cover guidelines for deploying ASR1000 Series Routers into your organisation. This presentation is intended for network engineers, network managers and network administrators who are responsible for configuring, troubleshooting and/or maintaining ASR1000 Series Routers in their network. It is assumed that attendees will have a general understanding and knowledge of Cisco IOS technologies and routers.
5.0/5.0
BRKSPV-2201 - Watching Video over the Web: Internet Video and Adaptive Streaming Technologies (2012 Melbourne) We describe existing and emerging video service models reliant upon Internet video: N-screen, over-the-top, digital-sell-through and mobile. We then begin a deeper dive by addressing challenges of Internet video delivery, and move to a detailed technical discussion of key technologies and architectures in adaptive streaming. We also provide an overview of the developing standards in this area including the Moving Picture Experts Group (MPEG) Dynamic Adaptive Streaming over HTTP (DASH) standard.
BRKGS-2012 - Passive Thermal Management in the Data Centre (2012 London) Partner Presentation Today's digital networking users continue to ask for better processing performance, improved access and lower latency, while dealing with increased cost pressure from shrinking IT budgets. Ortronics, a Group brand Legrand, will address these needs by presenting a new look at the ISO/OSI model - a seven layer reference model that standardizes communication networks. Ortronics will introduce the concept of Layer Zero -- the infrastructure layer(TM) -- as the new cornerstone of a network. In this session, participants will learn how Ortronics can help implement a well designed Layer Zero foundation of pathways and physical support to optimize the performance of network applications and reduce energy and cable management challenges.
BRKEVT-2065 - Designing and Deploying TelePresence on a single call processing platform with Unified Communications Manager 8.6 (2012 Melbourne) Video is the new voice. As organisations realise the benefits of face to face communication, the volume of video endpoints is increasing rapidly within the enterprise. This session will explore the design aspects of deploying Cisco's video endpoint portfolio using Cisco Communications Manager 8.6 as the call control platform. We'll investigate the considerations for large volume personal devices right up to immersive systems and examine the benefits that can be realised with a single call control platform for voice and video, as well as best practise implementation recommendations.
BRKEVT-1300 - Introduction to Enterprise Video Technologies (2012 Melbourne) The use of video communications is increasing significantly within today's corporate networks but also between businesses. TelePresence and all forms of interactive video, including videoconferencing and video telephony, provide significant business value for modern enterprises, but deploying these technologies successfully requires careful network planning and architectural design. This session will provide a technical foundation for those that do not have an audio visual or video conferencing background. It will cover in depth topics such as video protocols and standards, video compression, network requirements and quality of service.
5.0/5.0
BRKGS-2019 - You can't manage what you don't measure. You can't measure what you can't see. (2012 London) Partner Presentation With the dramatic growth in the number of connected devices, the increasing breadth of applications and the explosive growth of the volume of traffic on the network, a new approach is required to ensure that management and monitoring systems have the right visibility to the appropriate network traffic. Although SPAN ports and network TAPs certainly provide some non-invasive visibility, they lack the intelligence that is essential to allow NOC and SOC teams to control and manage the flow of traffic to the management/monitoring systems. This session will explore a new approach " the Visibility Fabric " that addresses the limitations of the current approach and provides a real-world solution to this challenge.
BRKAPP-2025 - What Is Really Going On? - Best Practices in Choosing, Deploying and Using DPI (2012 London) Deep packet inspection (DPI) is a powerful set of tools and technologies for understanding network, traffic patters and user behavior and can be great platform for optimizing network usage, creating and supporting new and exciting services. This session will show you what DPI is and why is it important, will highlight important features of the DPI system and will guide you through a process of successful DPI implementation.
3.0/5.0
GENSK-1295 - Data Center-Solutions Keynote (2013 Orlando) The Data Center is evolving towards the next major architectural transition since Client-Server and the Web:  the Cloud Era.  A converged approach with unified computing, unified management and unified fabric is needed for an open, resilient, secure, and scalable platform in a multi-cloud environment to meet your needs today and address your cloud deployments of tomorrow.
4.7/5.0
GENKEY-1 - Cisco Live Milan Opening Keynote (2014 Milan) Hear from Rob Lloyd on how Cisco and the ecosystem of Cisco's partners are uniquely positioned to connect the unconnected with an open standard and an integrated architecture from the cloud to end devices.   Rob will share his vision of the Internet of Everything and examine the industry trends and technologies that are making that vision a reality.
4.2/5.0
ATE-CL312 - Ask the Expert: Cisco Advanced Services – Anatomy of a Virtual Event (2012 San Diego) Come and learn how collaboration impacts every department in the Enterprise. From Corporate communications, sales and marketing to HR and career fairs. You will learn about the 'anatomy of a virtual event' and discover the components that are leading to huge gains in ROI, cost reductions and improve efficiences.
GENSK-4344 - Solutions Keynote: Security (2012 San Diego) Security threats are growing in number and impact, and becoming increasingly difficult to detect and mitigate. Companies are moving rapidly towards the cloud, and employees are demanding a “work anywhere” environment. Today’s CIO and network administrator are faced with the dilemma of whether to “lock it down” or “free it up”…whether to shackle the business with security policies and practices, or to enable the business to innovate and grow. Join Christopher Young, Senior Vice President of Cisco’s Security and Government Group, as he examines the need for a more transparent and efficient network that enables businesses to open the door to new innovation. The answer is intelligent networks that integrate security and context awareness allowing control over who, what, where, when, and how company data is accessed. With annual revenue of $44 billion and the bulk of transactions conducted over the Internet, Cisco is a prime target for security attack and exploitation. Christopher will reference Cisco to demonstrate how enterprises can increase overall network visibility and application control while delivering secure access for users, devices and applications.
ATE-CL302 - Ask the Expert: Cisco Data Center – Unified Fabric: Delivering Architectural Flexibility (2012 San Diego) The confluence of a number of trends, including cloud computing, video, virtualization / workload mobility, the data deluge brought on by the “Internet of things,” is driving significant change in the data center. Customers are looking for flexible data center architectures that will adapt to these changes as their business evolve to take advantage of these trends. Cisco’s Unified Fabric and Nexus portfolio deliver this flexibility and continue to lead the industry with a number of leading innovations that enable architectural flexibility for general, virtualized and cloud deployments. What are these leading innovations and how they enable architectural flexibility that extends from the server to the cloud will be discussed. Visit the Cisco Campus Switching Virtual Resource Center and Cisco Data Center Resource Center to view additional documents and links.
GENPS-1001 - Get Your Network Ready for the Cloud (2012 San Diego) Cloud computing is expected to enable dynamic, flexible, and resilient IT application delivery with operational excellence. By 2014, 50 percent of workloads will be processed in the cloud (Global Cloud Index, December 2011). Is your network ready to support the changing traffic patterns of cloud? Can your WAN support an optimal application experience? How will you secure your business in the cloud? Never before has the network been more relevant for enabling your business. If you are rethinking your network strategy as your business moves to cloud services, join this event and learn about new breakthrough innovations that help you: Gain greater visibility to the cloud traffic Increase the performance of your cloud applications Secure user access to the cloud Scale cloud deployments
BRKUCC-2006 - SIP Trunk design and deployment in Enterprise UC networks (2012 San Diego) The Session Initiation Protocol (SIP) has emerged as the dominant rich media communications protocol on IP networks and the Cisco Unified Communications product portfolio leverages SIP extensively for inter-connectivity. This session covers design considerations for SIP trunking within the Enterprise (i.e. between call agents) and at the Enterprise edge (i.e. for IP PSTN services). Updated for Unified Communications 8.5 release which adds significant new trunking functionality, this session covers the design aspects that need to be considered for a successful deployment of SIP Trunks with Unified CM. These considerations include redundancy, availability, load-balancing, security, addressing, interoperability etc. The session will also cover the usage of SIP for interconnecting Cisco Unified Communications Manager clusters (using Intercluster Trunks), connecting to Cisco Unified Border Element and Gateways. At the end of the session you will be able to evaluate the benefits and trade-offs of using SIP with respect to other protocols for Unified Communications. This session is intended to provide an in depth update to an audience with a working knowledge of CUCM and SIP Trunking.
4.8/5.0
GENSS-1298 - Partner Super Session (2013 Orlando) Join John Graham, Vice President for Systems Engineering in the Americas Geographic Region at Cisco and key Cisco partners in a unique fireside chat session focusing on emerging industry trends, the related technology challenges, and the potential solutions. This session will help you put your week of learning in the context and provide fresh insight into the changes in store for the industry and your career.
4.3/5.0
GENSK-1109 - Fast Track to Fast IT: Cisco’s Application Centric Infrastructure (2014 San Francisco) What if you could deploy enterprise applications in hours, not weeks? What if you could manage and roll out enterprise applications that incorporate network and security policies in real time? What if you had visibility and control across your entire enterprise infrastructure – to provision, deploy, monitor, optimize and troubleshoot easier, faster, and more securely?   With Cisco ACI, you can have all this – and more.  Find out how by joining Soni Jiandani, SVP Insieme Business Group, Rob Soderbery, SVP/GM Enterprise Networking Group, and Scott Clark, VP of Cisco Services, as they provide an overview on Cisco’s ACI strategy, roadmap and solutions.  Hear directly from customers deploying these solutions. See how Cisco ACI deploys application-centric policies to simplify infrastructure operations by mapping enterprise business logic and automating network provisioning across data center, access, and WAN. The result?  A simple, smart, secure solution that delivers on the promise of Fast IT.
4.8/5.0
GENKEY-2001 - Solutions Keynote (2013 London) New to Cisco Live 2013, the second Cisco keynote is an innovative format that will demonstrate how Cisco is addressing the opportunities presented to your business by the worldwide trends described by Padmasree in her keynote now and in the immediate future with the architecture platforms of Borderless Networks, Collaboration, Data Center and Cloud and Security. Four of Cisco's leading architecture experts will share an integrated Cisco story that demonstrates the business value of Cisco's innovation and solutions while showing how they are underpinned by technological excellence in network and communication.
2.0/5.0
GENSK-4356 - Solutions Keynote: The Future of the Enterprise Network in the Post-PC Era (2012 San Diego) By the year 2020 it is estimated that 56 billion devices will be connected to the Internet. Your organization will serve an increasing variety of cloud-based applications to users tethered to the network using a broad range of mobile devices. In addition to your employees, every touch point with a customer, partner or the infrastructure that runs your business will be enabled by the network. Industrial, transportation, process control, manufacturing and other industries will have migrated to the Internet of Things. What is Cisco doing to help you deal with the implications of these trends on your network? Join Rob Soderbery, SVP for Cisco’s Enterprise Networking Group, for a discussion about how Cisco is driving innovation across its core portfolio of Catalyst switching, access routing and wireless networking technologies that will help you navigate these transitions. Soderbery will demonstrate how Cisco solutions come together so you can deliver a secure and uncompromised user experience to your customers, partners and employees.
4.8/5.0
GENSK-1106 - Technology Trend Keynote: Exceptional Collaboration Experiences in the Age of the Connected User (2014 San Francisco) Today’s connected user assumes that they can work anytime from anywhere. Whether they are on-the-go, at a home office, or in a conference room, people, now more than ever, collaborate in real-time. Flawless experiences are also expected, which means seamless, secure and easy-to-use technology solutions must be in place. Join Rowan Trollope and Hans Hwang as they introduce new Cisco solutions, and discuss why creating exceptional collaboration experiences are the lynch pin in driving measurable business outcomes. Not just in today’s marketplace, but for many years to come as the workforce continues to shape-shift with new generations.
4.7/5.0
GENKEY-2300 - Cisco Live Technology Business Vision (2014 San Francisco) Join Cisco’s technology and business leadership for a deeper dive into what is happening both at Cisco and with our customers as the Internet of Everything becomes a reality. Find out what Cisco is doing today, what we’re planning in the future, and what others are doing to tap into the power of the Internet of Everything.
4.0/5.0
PCS-SF - Partner Case Studies (2014 San Francisco) NetApp -- View VideoIntel -- View VideoNetscout - View VideoF5 -- View VideoEMC -- View Video
4.0/5.0
BRKMPL-2100 - Deploying MPLS Traffic Engineering (2014 Milan) This session covers the deployment of Traffic Engineering in MPLS networks through different use cases. The material presents a brief technology overview and then focuses on three deployment scenarios: bandwidth optimization, traffic protection, and enhanced QoS. In the latter part, the session discusses inter-domain traffic engineering (multiple Interior Gateway Protocol areas and autonomous systems) and general deployment recommendations. The attendee can expect to see numerous sample configurations including IOS, IOS XR and NX-OS. This is an intermediate-level course that requires familiarity with MPLS and link-state routing protocols (OSPF or IS-IS). Previous attendance of session BRKMPL-1101, "Introduction to MPLS," is highly recommended. This session is intended for service providers and enterprise customers deploying their own MPLS traffic engineering network.
4.7/5.0
BRKNMS-2466 - 13 Smart Automations to Troubleshoot Your Cisco IOS Network (2014 Milan) Is there too much manual troubleshooting in your network? Have you ever wasted hours to capture evidence of a transient network issue? Want to enable your first line peers to deliver precise problem descriptions? Do you know which part of your network is likely to fail next? And how to prevent it? Your Cisco IOS Network provides a wealth of advanced device manageability instrumentation (DMI) and Embedded Automation Systems (EASy) to design and implement your own Network Automations. Learn how Network Automation allows you to automate manual tasks, better operate existing network services and even enable new and innovative networking solutions. This Breakout Session uncovers embedded Network Automation capabilities you can use not only to interact with your network elements during troubleshooting and optimization activities, but also to implement proactive and preventive maintenance in a more effective, efficient and robust way. Network Automation fundamentals as well as the choice and use of appropriate practices are illustrated through a combination of presentation and best practice examples. The topic is relevant for network planners and administrators, engineers and system integrators for both enterprises and service providers.
5.0/5.0
BRKSPV-1919 - Video Transport Architectures (2014 Milan) This intermediate level session covers the requirements and challenges of transporting broadcast grade Video over IP networks. These linkages are technologies that enable the IP network to be Video-aware encompassing IP/MPLS Multicast, QoS, Security, High-availability and Admission control mechanisms. Network resiliency/availability mechanisms enabling minimal disruption of Video services are covered in detail. These include Unicast & Multicast Fast convergence, advanced traffic engineering, Multicast-only Fast Reroute (MoFRR), Video Source redundancy among others. Lossless transport is introduced using Live/Live with packet merge capabilities for uncompressed video. An overview of the application-level techniques that minimize packet losses such as Forward Error correction (FEC) and dynamic packet error repair using Cisco Visual Quality of Experience (VQE) are also covered. New developments in the Video monitoring space such as In-line monitoring are briefly covered as well as network management tools. It is expected that the attendee is familiar with IP/MPLS, Multicast and QoS concepts.
5.0/5.0
PSOCRS-2444 - Cisco campus access switching architectures (2014 Milan)   In less than one year, architectural options have been made available to customers for campus switching designs. While traditional access, requiring individual management of devices, stacks or clusters keeps offering a flexible and highly robust and manageable solution for any deployment, other solutions have been designed to meet operation simplicity and mobility requirements. The first alternative to traditional access is to shift to a cloud managed access network with Cisco Meraki devices. With these Cisco Meraki switches and access points one can simply plug them in any network and manage them throuhg a web portal available on the Internet. Another path to simplicty is to opt for Instant Access solution introduced on catalyst 6500/6800, in which the access switches (or stacks of switches) are seen as line cards of the distribution devices and do not need to be managed anymore as separate pieces of equipment. The third option is Converged Access, driven this time by the drastic increase of mobility and the 802.11ac new standard offering now Gigabit wireless access. Converged access architecture consists in distributing the wifi traffic processing (ie. CAPWAP termination) directly on access switches. This session will introduce the 4 aforementionned campus switching architectures: Cloud managed, Traditional Access, Instant Access and Converged Access with impacts on the choice of switching platforms. Positionning will be presented through concrete examples and case studies, and combination options of these solutions will also be discussed during the session. This session will offer another way to consider Cisco switching portfolio in addition to the usual platforms design, scale, performance and supported features.  
Get More Results