UCS-4792 - UCS Security Engineering Overview (2012 San Diego)We will outline key security features and best practices for UCS. This is a session broken into two key areas between the UCS control plane (processes, open ports, organizational boundaries, access methods, etc.) and the UCS data plane (VLAN groups, FEX isolation, DisJoint L2 operations, VM-FEX for isolation to the VM, etc.) and finish up with certification status.
ATE-CL326 - Architecting a Modern Approach to Real Time Business with Vblock Specialized System for SAP HANA (2013 Orlando)Learn how VCE’s new Specialized System is enabling customers to get SAP HANA software up and running in production more smoothly, quickly, and reliably in order to capitalize on the benefits of real-time insights to help address fleeting business opportunities faster.Takeaways:
* Identifying transformational opportunities
* Planning an SAP HANA installation
* Advantages of Vblock Specialized System
For More Information
Visit the VCE virtual resource center to get additional information, download product and solution material, and more.
GENSSN-1616 - Super Session – Intelligent Cybersecurity for the Real World (2014 Melbourne)Driven by market trends in cloud, mobile and the Internet of Everything, technological change is accelerating at lightning speed with the network at the core. Security is no different. Attackers are innovating faster than the industry, finding new attack vectors to exploit their targets and creating significant new security challenges. Join Christopher Young for a discussion on how these phenomena have driven defenders to challenge today’s security assumptions and how Cisco’s new security model and offerings can address our customers’ biggest security problems.
CP-1006 - Network Models and the Network ArchitectOne of the very first things any aspiring network engineer learns is the OSI seven layer model -- but once it's learned, it's often left in the background, another trivia item that doesn't seem to be much use in the real world. Leaving models in the background is, however, a mistake; these are some of the most useful tools the network engineer has to classify and understand protocols and network operation. This session will discuss the history behind the popular seven layer model, and then move into some other models network engineers might find useful, including some you may never have seen before.
Cisco Press book: The Art of Network Architecture: Business-Driven Design by Russ White and Denise Donohue
ATE-CL346 - Build Your Own Innovative Support Applications leveraging Cisco Support APIs (2014 San Francisco)How are APIs delivering both a competitive and support edge to a growing number of companies and IT professionals? A recent survey by Venture Beat found that more than 85% of large companies will have API programs in the next 5 years. Join Alok Patel and colleagues from the Cisco Smart Web Technology Group to explore how –
1. The market landscape of APIs for Enterprise Customers and Channel Partners is changing
2. APIs enable you to pull vital Cisco support data into your own systems on demand
3. Companies are using APIs to unlock business innovation and boost their bottom lines
This session covers the “what,” “why” and “how” of Cisco APIs now available to you. We will spotlight lessons learned, best practices, and exemplary API strategies adopted by Cisco partners and customers.This session also features live demonstrations of Cisco Support APIs, and illustrates how companies are using APIs today to both innovate support solutions and advance business priorities.
For More Information
Visit the Cisco Services Solutions Center to get additional information, download product and solution material, and more.
ATE-CL327 - Security Defined Networks: Deploying Security Defined Networks in the Real World (2013 Orlando)Today’s advanced network security threats are growing in complexity, scale and scope. Highly co-ordinated resources and activities are being leveraged to assault today’s networks with unprecedented speed and agility—a new paradigm in network security monitoring is required in order for organizations to adapt and respond to these threats.
In this presentation, Net Optics VP of Technology & Solutions Sharon Besser defines the next generation approach to security utilizing security-centric SDN, and provides concrete steps organizations must take with their network security and monitoring.
For More Information
Visit the Net Optics virtual resource center to get additional information, download product and solution material, and more.
BRKGEN-2999 - Autonomic Networking (2014 Milan)Autonomic Networking is an emerging, fundamentally new way to operate networks: Network elements configure themselves, and operate largely independently. There is minimal dependency on operators and NMS systems. This session introduces the fundamental concepts of Autonomic Networking, and explains the current development status.
CIN-WS205 - Activate—Identity Services Engine 1.2Learn about the Cisco Identity Services Engine and the new enhancements available with its most recent release—ISE 1.2. The Identity Services Engine provides a comprehensive, all-in-one solution to manage and maintain network access and policies—ensuring consistent enforcement across wired, wireless, and VPN networks. During this online event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors. Join Cisco experts Sanjay Raja and David D’Aprile for a closer look at ISE 1.2, and all the advantages it can bring your business.
ATE-CL412 - Application Centric Infrastructure (ACI) (2014 Milan)Learn how Application Centric Infrastructure is ushering in a new era of simplicity and automation, and driving the next generation of data center infrastructure.
For More Information
Visit the Cisco Switching Solutions Center to get additional information, download product and solution material, and more.
ATE-CL408 - Cisco Unified Fabric: Delivering Architectural Flexibility (2013 London)The confluence of a number of trends, including cloud computing, video, virtualization / workload mobility, the data deluge brought on by the “Internet of things,” is driving significant change in the data center. Customers are looking for flexible data center architectures that will adapt to these changes as their business evolve to take advantage of these trends. Cisco’s Unified Fabric and Nexus portfolio deliver this flexibility and continue to lead the industry with a number of leading innovations that enable architectural flexibility for general, virtualized and cloud deployments.
What are these leading innovations and how they enable architectural flexibility that extends from the server to the cloud will be discussed.
Visit the Cisco Switching virtual resource center to get additional information, download product and solution material, and more.
ATE-CL401 - Delivering a Future Proof Service Orientated Infrastructure to Your Business (2013 London)The consumption model for IT is changing rapidly to include many services delivered by the Cloud. To remain competitive the challenges facing organisations today include time to market for services and products, adaptability and flexibility. The key to evolving a resilient IT strategy is to provide an infrastructure that delivers, non-disruptive operations, immense capability to scale, workload independence, efficiency and automation. In this session Cisco and NetApp will discuss how their industry leading joint FlexPod solution is enabling their customers and cloud service providers to make this move to a future proofed, service orientated infrastructure. Using the Cisco Validated Design (CVD) framework to de-risk implementations and accelerate solution delivery, this session will cover technology areas including utilising pooled computing assets, creating virtualised resource pools at scale, managing elasticity on demand, introducing automation for policy, application awareness and mobility, secure multi tenancy architecture and metered billing.
Visit the NetApp virtual resource center to get additional information, download product and solution material, and more.
UCS-4797 - Cisco Intelligent Automation for Cloud (UCS) (2012 San Diego)Cisco Intelligent Automation for Cloud is a self-service provisioning and orchestration software solution for cloud computing and data center automation. This session will provide a detailed product overview, followed by an instructor led demonstration of the software suite. We will build off the UCS Manager capabilities describing how this solution automates key data center functions and actions.
ATE-CL338 - Scale your Network Security and Monitoring infrastructure to Keep up with Advanced Targeted Attacks and Big Data Flows (2014 San Francisco)Even as network data has exploded in volume, velocity and variety, network security and monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale, and accommodate continuous monitoring in consolidated physical, virtual and cloud based datacenters. The network’s increasing speed and rapidly growing complexity (e.g. virtualization, and tunneling with encryption), pose challenges for IT network and security professionals trying to manage and secure network infrastructure. How does one architect a scalable security & monitoring architecture to withstand the test of time while ensuring adaptability to evolving business needs? The IT organization as a whole needs to ensure end-to-end visibility and data access to meet and exceed business, network and application performance SLAs while keeping their infrastructure and data secure against continually evolving advanced and targeted attacks.
Join Tony Zirnoon, CISSP – Sr. Director Security Strategy VSS Monitoring, as he discusses:
1. Monitoring gaps and security vulnerabilities in today’s traditional network security and monitoring architecture
2. How to address those gaps and vulnerabilities without defaulting to a rip and replace approach
3. Proven best practices in architecting a future-proofed physical or virtual DC monitoring fabric for total network visibility
4. Learn how you can architect a defense-in-depth network security model that scales across converged networks (with real production deployment examples)
5. Future proofing your security infrastructure design and investments against the ongoing barrage of advanced security threats while maintaining high availability and agility to keep up with Big Data flows.
ATE-CL334 - Realize Faster Resolutions with Smart Call Home (2014 San Francisco)Start using the technology embedded in your Cisco devices to proactively monitor their health. Receive notification of events based on internal diagnostics with recommendations from Cisco's deep pool of Intellectual property. Realize faster resolution through automated TAC case creation for the most critical events. Topics will include supported devices and faults, deployment scenarios in and out of the datacenter, and configuration examples including UCS blades and rack servers.
For More Information
Visit the Cisco Services Solutions Center to get additional information, download product and solution material, and more.
BRKPCS-2059 - ACI Impact on Physical Infrastructure Design and Deployment (2014 San Francisco)Adoption of Cisco’s new Application Centric Infrastructure (ACI) will require some changes to the way data center physical infrastructures are designed and deployed. Depending on the scalability, performance, and applications requirements, customers will need to determine the best physical infrastructure to accommodate a variety of spine/leaf network topologies options including ToR, EoR, and MoR leaf switches. In this session, Panduit examines the physical implementation requirements of an ACI deployment including how to design ToR, EoR and MoR network architectures for ACI, and strategies to simplify the deployment of this next generation architecture in order to help customers accelerate their path to ACI.In addition an overview of available services and product sets that help customers manage risk within the physical infrastructure by intelligently converging physical and logical systems to simplify the deployment will be presented.
GENKEY-1626 - Decoding Connectivity: Leading & Thriving in an “Internet of Everything” WorldThe benefits of connectivity have already changed our world and this is only the beginning. Carlos Dominguez, Senior Vice President of Cisco, brings the Internet of Everything to life in his fascinating keynote during Cisco Live 2013 Melbourne. Learn about what's coming and find your place in this exciting new world. Discover:
• What is the Internet of Everything? • How will it influence and change business – today and in the future? • What is the personal impact each of us will experience?
BRKPCS-2056 - See. Point. Click. Fix. Simplify Your Network with LiveAction (2014 San Francisco)Networks can be complex and difficult to manage, but with LiveAction they don’t have to be. In this session, you will learn how LiveAction simplifies network management. LiveAction is a network performance management tool with deep, rich visualization capabilities, QoS control, analytics, and automation. Attend this session to see how LiveAction can help you get the most ROI from your Cisco products and why it is available through the Cisco Global Price List. See. Point. Click. Fix.
BRKPCS-2058 - Forensically Uncovering Cyber Threats By Monitoring Behaviors (2014 San Francisco)Learn how Security Operation Centers are uncovering internal hosts communicating with botnets, machines participating in DDoS attacks and end systems performing unwanted data exfiltration. Since signature matching is ineffective at detecting many forms of malware, participants will learn how to leverage NetFlow and IPFIX to baseline behaviors and bring visibility to the active threats on the internal network. This session explains how to gain threat landscape clarity and how to avoid a sea of false positives. Learn best practices for leveraging Cisco ISE and Cisco AVC exports to provide richer contextual details surrounding a contagion.
BRKSEC-2042 - Web Filtering and Content Control in the Enterprise (2016 Melbourne)The adage 'HTTP is the new TCP' grows truer each day. With so many different applications and new services now running overtop common protocols like HTTP and HTTPS, filtering and inspecting web traffic becomes an ever increasing requirement for compliance and peace of mind. Cisco provides a wide array of different filtering technologies and products, but each has their own pros and cons, implementation success and pitfalls, strengths and weaknesses. Understanding what solution best fits your environment is tough balance between ease of use, scalability, troubleshooting and features. This class will cover Cisco's three primary Web filtering technologies (IronPort WSA, FirePower Appliances and Services and Cisco Cloud Web Security). Topics will include deployment strategies, scenarios, best practices and troubleshooting techniques.
BRKSPG-3630 - Service Driven Network Automation - Powered by Tail-f (2016 Melbourne)Today’s network infrastructure is complex comprising of multiple fragmented domains. Each domain consists of multi-vendor network-elements with vendor specific interfaces and CLIs. Consuming the infrastructure to achieve an outcome is slow and complicated involving multiple EMS/NMS, ad-hoc scripting, complex functional device adapters, error-prone box-by-box manual configuration which are all best-effort and fire-and-forget approaches. Cisco NSO enabled by Tail-f removes this bottleneck by providing a horizontal platform sitting across the network infrastructure decoupling the Services from the infrastructure. NSO manages the infrastructure complexity and exposes the network intelligence via standards based YANG device models. Services, also modelled in YANG, leverage the well-defined device models to consume the infrastructure. This allows for surgical precision, automated and API driven services, transactional guarantees and instant activation of end-to-end Services. With NSO horizontal platform in place bringing new cross-domain and NFV services to the market is achieved in days/weeks.
BRKSEC-2664 - Cisco Sourcefire Advanced Malware Protection and ThreatGrid (2016 Melbourne)Today, the weapon of choice for attackers is malware. Targeted and cunning, advanced malware compromises environments from an array of attack vectors, takes endless form factors, launches attacks over time and can obfuscate the exfiltration of data. The Cisco Sourcefire Advanced Malware Protection (AMP) solution spans extended networks and devices to focus on threats across the full attack continuum - before, during and after - an attack.This session will provide the audience an overview of Cisco Sourcefire Advanced Malware Protection (AMP) solution - Advanced Malware Protection for Networks, and Advanced Malware Protection for Endpoints.
BRKSEC-1205 - Introduction to DC Security (2016 Melbourne)With IT departments increasingly centralising and virtualising all of their resources into the Data Centre Management and the Cloud, the security of those resources is becoming increasingly important. Security must permeate throughout applications, the virtualisation layer, compute, storage and network. Unfortunately, security is often left to a limited number of specialists, and understanding of the technologies used is often limited to those same experts. This session will outline how security can be propagated throughout the Data Centre Management and define how these technologies can work together to build a secure Data Centre Management and Cloud strategy for the enterprise. Topics covered will include Current Threats, Security Hardware and Software, Network Segmentation, Cloud Connectivity, Software Defined Networks, Data Centre Management Interconnects, Security Architectures and more. This session will provide an overview to anyone interested in how Security can be inserted in their Data Centre.
DEVNET-1071 - Introduction to Tropo (2016 Melbourne)What is Tropo, how do you use it and what can you use it for? In this session, you'll learn how Tropo works, see some real-life examples, and learn how to create your own voice and SMS applications in minutes.
BRKSPG-2619 - Cisco Evolved Programmable Networks (2016 Melbourne)As competition in Carrier services market intensifies Service providers are challenged to make services more agile, simplify networks and reduce operational costs while growing the capacity.
Cisco Evolved Programmable Network (EPN) provides an open programmable network architecture covering both physical and virtual network resources. In EPN architecture SDN controllers and consecutively applications are able to orchestrate network resources and facilitate network telemetry analytics in real time to optimise operations, ensure high availability & avoid brownouts. Open APIs used in the Architecture bring the full automation and on-demand programmability to enable flexible resource & service allocation.
The session will provide an overview of use cases/applications to leverage EPN in Internet Infrastructure, Carrier Ethernet & Mobile Backhaul layers. It will also review a set of Open APIs available on Carrier routing platforms and guide on relevant SDN controllers/orchestration middleware to build flexible automated network. Lastly the session will include demonstration of the Opendaylight (ODL)-based application which is using the EPN.
BRKSEC-2693 - ELK for Enterprise IR Visibility (2016 Melbourne)Cyber Security presents an ever changing and increasing challenge to individuals, corporations and nation states. It is no longer a case of "If' or "whether" an organisation will be subjected to a cyber attack of one kind or another. Today's reality is that it has probably already occurred. Cisco uses the concept of an "Attack Continuum" to highlight that if an organisation is to respond effectively to this reality, it needs to be prepared in advance and know what to do Before, During, and After an attack.
BRKEWN-2007 - High Density WiFi Networks for Stadiums and Large Public Venues (2016 Melbourne)This session will cover the details required to successfully deploy high density WiFi within sporting and other large public venues. Many of the concepts, challenges, and strategies discussed in this session can be applied to high density networks in general, however this session has a focus on the sports and entertainment market. The attendee will get detailed information on the use of various required features such as RF profiles and how they are used to address common challenges within these environments. Other topics will include WiFi network consolidation, interference (detecting and finding, as well as commonly seen interference sources), client issues, and much more.
BRKAPP-2033 - Big Data Architecture and Deployment (2016 Melbourne)This session is an intermediate technical mix of application, compute, and networking topics concerning the deployment of Big Data clusters. This session will cover the application and infrastructure architecture components of Big Data clusters with a specific focus on Hadoop deployments. We will begin with a brief look at why organisations are deploying Big Data and Hadoop clusters, and how these applications differ from traditional architectures from both a software and hardware perspective. We will then look at the application behavior in the context of building a network and compute infrastructure and its design considerations. The session goes into detail on network and compute architecture regarding UCS and Nexus 9000; specifically buffer usage and network bandwidth characterisation, cluster design, best practices, cluster management, sizing, and scaling. The goal of the session is provide the attendee a better understanding of Big Data cluster architecture and application behavior, to be better equipped for Big Data infrastructure discussions and design exercises in your data centre environment.
BRKDCT-3640 - Nexus 9000 Architecture (2016 Melbourne)This intermediate level session will describe the Cisco Nexus 9000 architecture and innovations in terms of hardware, software, mechanical design, optical advantages in the 40 GE environment and power budget. The unique combination of Merchant silicon combined with Cisco internally developed ASICs make this platform a leader in the Data Centre switch market. This session will also approach the Data Centre design aspect and describe the Spine-Leaf architecture advantages.
BRKCOL-2020 - Cisco Unified Communications and Microsoft Integrations (2016 Melbourne)This intermediate-level session provides attendees with a detailed understanding of the Cisco Unified Communications solution when integrating and interoperating with Microsoft. It includes a review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products, a detailed explanation of migration and deployment scenarios, and things to keep in mind before deployment. Related technologies are treated, including call control, presence, unified communications security, TelePresence, and rich media applications. This session is for people involved with the planning and implementation of unified communications solutions and those involved in strategic decision making for selecting unified communications solutions. Attendees should have a good understanding of the Cisco Unified Communications high-level architecture and a basic understanding of the Microsoft product set. Content: Review of Cisco Unified Communications products and how they're related and/or interfaced with Microsoft products. Detailed explanation of migration and deployment scenarios. Things to keep in mind before you deploy... Related technologies: call control, presence, unified communications security, telepresence, rich media applications Audience: People who are involved with the planning and implementation of unified communications solutions. Individuals involved in strategic decision making for selecting unified communications solutions. Pre-requisites: Good understanding of Cisco Unified Communications high level architecture. Basic understanding of Microsoft product set.
PCSZEN-1022 - Reinventing applications FOR REAL - how the co-evolution of hardware and software make it possibleThe last few decades have brought about a dramatic transformation in both hardware and software development. Changes to one drive changes to the other, all with the aim of moving away from monolithic applications deployed on huge custom machines to agile, infinitely scalable services deployed on high-performance, cost-effective, software-defined networks and infrastructure. This talk will share some of the history that has led to this point, and offer insights on how these new systems can help you shape your own IT evolution from traditional data center virtualization to hybrid cloud models, microservices architectures and beyond.
DevNet-1000 - Coding 100: Why Should I Care About APIs? (2016 Berlin)Please Note: DevNet Zone seating is available on a first come first seated basis. What are APIs and why should you care about them? The session is perfect for people who are completely new to working with APIs. We will discuss the possibilities that APIs offer, common types of APIs, and why APIs are important to both developers and infrastructure engineers. We will also show you how to use POSTMAN to start experimenting with REST APIs. Taking place in the DevNet Zone.
DevNet-1093 - APIC EM API Deep Dive (2016 Berlin)Please Note: DevNet Zone seating is available on a first come first seated basis. APIC-EM is an SDN controller is for enterprise campus and WAN devices. This session will cover the API's for inventory, topology, Path Visualization, Network Plug and Play (PnP), Intelligent WAN (IWAN) will be covered. The IWAN API allow policy based modification of application QoS and WAN path selection.
PSOSEC-2003 - Key Security Measures to Enable Next-generation Data Center Transformation (2015 San Diego)Part of the tension between IT and security has been the all-too-often correct perception that security interrupts and slows down business-critical applications and services. Nowhere is this more apparent than in the data center, where complex traffic, customized applications, virtualization, and dynamic resource scalability are essential to the health and success of the organization.
In this presentation we will look at Cisco's next-gen ACI data center solution from a security perspective. This session will focus on key ACI security measures that executives and data center teams need to understand when considering data center innovation and to move the business forward quickly.
1. Unmatched Agility that enables dynamic security provisioning designed for next-gen data center environments.
2. Integrated Protection that leverages native ACI security combined with ASA NGFW and FirePOWER NGIPS.
3. Dynamic Control that provides transparency, forensics and remediation through Cisco AMP, PCI compliance, and the ability to dynamically audi change
PSOGEN-1105 - Develop Mobile Apps and Interactive Displays with Cisco Connected Experience (2015 San Diego)Delivering engaging mobile and interactive experiences in the world of IoE requires more than a good user interface. It requires aggregation and delivery of the right information, the right capabilities, at the right time, on any device at the point of use. It requires bringing together network information, collaboration capabilities, business applications, and data that is relevant to the user to enable context-aware, personalized, and productive interactions. Cisco Connected Experiences software helps developers deliver rich personalized information to engage people in context. Join this session to learn how we are combining the best technologies from Cisco and our partners to provide powerful mobile and interactive display platforms that help you to address the increasing expectations of your end users.
CCSIOT-2380 - Outdoor Wireless in Harsh Environments such as Mining and Oil & Gas (2015 San Diego)In harsh outdoor industrial environments such as Mining & Oil & Gas, reliable wireless is key to successfully deploying process control and data connectivity solutions. In this session, we will share findings from multiple cases ranging from Oil & Gas to the Mining industry conducted by actual users in a real environment. What are the choices that differentiate successive deployments from the rest? You will never look at outdoor wireless the same way again!
BRKSEC-2695 - Building an Enterprise Access Control Architecture using ISE and TrustSec (2015 San Diego)Tomorrow's requirement to network the Internet of Things requires an access control architecture that contextually regulates who and what is allowed onto the network. Identity Service Engines (ISE) plays a central role in providing network access control for Wired, Wireless and VPN networks. In addition, ISE is the policy control point for TrustSec, which controls access from the network edge to resources. This session will focus on: 1. Emerging business requirements and ISE services such as: Guest, profiling, posture, BYOD and MDM. 2. Secure policy based access control including 802.1X, MAB, Web Authentication, and certificates/PKI. The session will show you how to expand policy decisions to include contextual information gathered from profiling, posture assessment, location, and external data stores such as AD and LDAP. 3. Enforcing network access policy through conventional means such as VLANs and ACLS and emerging technologies such as TrustSec. Cisco TrustSec technology is used to segment the campus and datacenter to increase security and drive down the operational expenses associated with managing complex ACL firewall rule tables and ACLs lists. This session is an introduction to the following advanced sessions: BRKSEC-3699; BRKSEC-3698; BRKSEC-3690; TECSEC-3691
BRKSPG-2525 - Architectural Evolution of Transport Provider Networks (2015 San Diego)Core transport providers are under increasing pressure to reduce cost per bit while satisfying massive traffic needs. The next generation networks demand lower cost, manageable risks, and high capacity growth. To achieve these goals, providers have to address the following areas: adding agility to wavelength layer to allow any to any connectivity, upgrading networks to support 100G and beyond, raising bandwidth fill to increase revenue, converging layers to reduce architectural complexity, and automating tasks with programmability and virtualization. This talk will walk through architectural evolutions in wavelength layer, Optical Transport Network layer, multilayer integration and orchestration. The attendees will walk away with a good understanding of various architectural options and how to design a next generation core network.
PSOCOL-1403 - Video Collaboration from Your Pocket to the Boardroom (2015 San Diego)**The video for this session is unavailable.**
One size definitely does not fit all when it comes to video collaboration. Today, video is part of day-to-day communications - not just for high-powered business interactions, but also for personal connections. In a world of distributed workforces where colleagues are separated by minutes or miles and organizations hire where the talent is located, video has become the standard form of collaboration and communication as a way to keep the pace of innovation and efficiency needed to stay competitive. Unlike before, the equipment now ranges from specialized rooms with high-end, HD equipment to tablets and smartphones that provide the needed level of quality and fidelity required to be useful to the users. The nature of work is changing to be more collaborative and the nature of the workplace is transforming requiring more collaborative workspaces, tools and solutions to bring people together to be more productive. Participate in this session to learn more about our video collaboration strategy - we are focused on delivering delightful experiences from the pocket to the boardroom and everyplace in between and ensuring that it is easy to meet and collaborate . Learn more about our new product offerings and what we are doing to create amazing experiences at the best possible price with no compromises
BRKSPG-2116 - Advances in IP+Optical (2015 San Diego)As Service providers around the world look at expanding their core networks, we will re-examine the advances in IP+Optical integration and architecture. We will review optical consideration factors for IP+Optical design, including G.709, optical impairments, and modulation schemes, including the modulation scheme for coherent 100G. We will cover IP+Optical architectures that include placement of high speed optics in the router or an optical shelf as well as management of IP+Optical networks. New trends in ROADM functionality are discussed that enable a more seamless integration with core routers that includes omnidirectional, contentionless add/drop and flex spectrum. We will conclude with current and future use of multi-layer control plane in converged optical and routing networks along with coordinated protection schemes.
BRKOPT-2040 - Converged IP+Optical Architectures and Evolution Towards a Unified ML SDN Platform (2016 Berlin)This session is intended for customers who are building large scale IP and Optical Networks. The session will detail to the audience the trend in Converged IP+Optical Architectures as well as the evolution towards SDN. The session will start with the key building blocks for IP+Opticals convergence and will dive into details such as multi layer restoration and signalling. Key concepts such as GMPLS UNI, WSON, SSON, nLight, MLRO and MLRP will be explained in great details along with the Network evolution to a mult layer multi vendor SDN architecture.
ATE-CL035 - Maximize Agility and Consistency for Applications Deployments – A Technical Deep DiveA Technical Deep Dive on F5 BIG-IQ, BIG-IP and Cisco ACI for Applications Deployment
Learn how F5 BIG-IP and BIG-IQ integrate with Cisco Application Centric Infrastructure (ACI) to deploy applications with agility and consistency. Understand F5 integrations models with Cisco ACI, learn the details of F5 device package and take a look at the latest offerings in F5 ACI solution. Learn how F5 BIG-IQ and iApps enhance L4-L7 services in ACI for a true application centric approach that leverage higher functionality including additional F5 modules.
PSOIOT-2004 - The Next Industrial Transformation with the Internet of Everything (2015 San Diego)Industries will be fundamentally transformed using the Internet of Everything in key areas such as flexible manufacturing, managed machines, security and asset management. IT will play a central role in this transformation but will need to meet the requirements of operational environments and workflows. This session will break down the impact of an IoE solution into five separate categories covering aspects ranging from assets and customers to employee efficiency and safety. The session will conclude with several examples of how the Internet of Everything has driven transformative business outcomes in manufacturing, public sector and transportation.
PSODCT-2171 - Cisco and Microsoft Hybrid Cloud Solutions (2015 San Diego)**The video for this session is unavailable.**
The session will feature how Cisco and Microsoft are delivering together, Service Provider and Enterprise based Cloud Platforms from the perspective of the consultants who deliver them. The architecture will show the additional features, supporting Service Provider model, and ultimately support additional cloud platforms in addition to Microsoft. Initial target customers are large enterprise, Service Provider and government, with subsequent releases to support additional products, and a broader market. This presentation introduces an architecture for a platform to support System Center, Windows Server 2012 R2, Windows Azure Pack in concert with Cisco Hardware and Software solutions. Deployments include the use of the Microsoft Service Provider Reference Architecture (SPRA), and Cisco Validated Design for Microsoft FastTrack v4, which have a proven capability and scale to support a large number of multi-tenant enterprise and service provider workloads./p>
PSODCT-2001 - Scalable Data Center Networks with Nexus 2K, 5K, 7K Product Architectures (2015 San Diego)**The video for this session is unavailable.**
Cisco leads the way in Data Center architectures and has a wide range of DC deployments using the Nexus 2K, 5K and 7K product architectures. The Nexus product line addresses the varied requirements of Data Centers across varied market segments and geographies. The Nexus 2K, 5K and 7K portfolio consists of multiple flavors with leading technologies (including overlay, virtualization and cloud), fabric architectures, ease of deployment and management with solutions like FEX. The product lines being presented in this session continue to be the most deployed DC products in the industry and are evolving into multiple new products to meet the growing needs of modern Data Centers, to inter-work with current architectures and have the ability to meet future demands.