No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
Participant
Conference Event
Meeting
Interest
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
On-demand Library
Cisco Live Session Videos and Presentations Listing
Online Events
Upcoming Cisco Live events
Social Networking
Connect with Cisco Live
Solutions Center
Cisco Live Conference Exhibitors
Prizes
Cisco Live Survey
In-person Events
http://www.ciscolive.com/global/?zid=CLO-global
Cisco Live Milan 2014
http://www.ciscolive.com/emea/?cid=CLO-EU
Event Details
http://www.ciscolive.com/emea/details/?cid=CLO-EU
Scheduler
https://www.ciscolivemilan.com/connect/publicDashboard.ww?cid=CLO-EU
Social Media
http://www.ciscolive.com/emea/social-networking/?cid=CLO-EU
Cisco Live Melbourne 2014
http://www.cisco.com/web/ANZ/cisco-live/index.html
Cisco Live San Francisco 2014
http://www.ciscolive.com/us?cid=CLO-US
Event Details
http://www.ciscolive.com/us/details/?cid=CLO-US
Scheduler (Live Jan 13)
https://www.ciscolive2014.com/connect/publicDashboard.ww?cid=CLO-US
Social Media
http://www.ciscolive.com/us/attendees/social-networking/?cid=CLO-US
Cisco Live Cancun
http://www.cisco.com/web/MX/ciscolive2013/
Log in to access thousands of sessions on cloud, BYOD, data center, and more!
Join now to access free content from global Cisco Live conferences.
Add to My Interests
Add to My File Queue
Remove From My Interests
Remove from my File Queue
Incomplete Account Information
You have not yet completed your account information. Would you like to do so now?
Edit Account Now
Ignore
You already have an account in the system. Please click here to login

If you don't remember your username and password, please use the forgot password utility.
  File Download Queue
Search Catalog
 

BRKSEC-1011 - Written to Realized Security Policy (2014 San Francisco) Organizations today are faced with dynamic changes to Infrastructure, Devices and Policy. These changes challenge the status quo of network security and require IT organizations to introduce technology adaptable to enforce new policy. This session will show how written security policy can be enforced using Cisco Security architecture. Whether your organization is preparing for BYOD, Cloud based services or just trying to lock things down to meet your security or compliance requirements, understanding how to leverage the devices to meet new business needs is critical. Learn from real world example security policies and the implementation of controls to prepare your organization for the next big thing.
BRKRST-3047 - Troubleshooting LISP (2014 San Francisco) Starting with a very short refresher on LISP the speaker will show the typical LISP use cases and the basic configs. For each use case the presenter will discuss the troubleshooting strategy in case of problems with the setup. He will talk about the needed show and debug commands and how to start backwards with the troubleshooting. Tips and tricks will be shown to do the LISP troubleshooting effective and purposeful. Additional sources of information and mailing lists will be mentioned. The troubleshooting session will be technical and requires IOS and LISP configuration knowledge.
5.0/5.0
BRKPCS-2047 - Maximizing UCS Server Efficiency with Memory and SSDs (2014 San Francisco) With the Internet of Everything gaining momentum and the cloud exploding in importance, Samsung will examine how Green Memory and enterprise SSDs (solid state drives) will help your UCS-based infrastructure obtain the best TCO results. This presentation will take a close look at why advanced memory and SSDs are able to accelerate the speed of Cisco UCS servers, improve scalability, enhance the efficiency of cloud operations and reduce power consumption. Presenters will highlight the impact of Samsung’s DDR3/DDR4 memory and its SAS/SATA SSDs on UCS servers in cloud and virtualized environments with SAP and other database applications. Samsung will underscore the performance-enhancing and power-saving efficiency of the most advanced Green Memory. It will also help you to understand how best to capitalize on the use of new and next-generation (V-NAND) SSDs, within your B460 or other UCS server. In addition, presenters will suggest how data center and Internet managers can use SSDs to make the most of Cisco’s upcoming multi-tenant Intercloud infrastructure. A senior Cisco executive will co-present here, to emphasize the importance of memory and storage, together with UCS Manager and the Cisco Virtual Interface Card, in attaining the highest levels of UCS performance and quality.
BRKUCC-2346 - UC on UCS Overview (2014 San Francisco) For baseline prior to BRKUCC-2225 (design) or BRKUCC-1903 (migration). This session covers the Cisco UC on UCS solution at business / technical / product levels. This would include overall Cisco Collaboration direction for virtualization, solution overview, Cisco UCS and virtualization benefits, product / platform / virtualization feature support, differences between Tested Reference Configuration and Specs-based support, how to purchase Cisco UCS and virtualization software and highlights of design and physical to virtual migration considerations.
BRKSEC-2664 - Cisco Sourcefire Advanced Malware Protection (AMP) (2014 Melbourne) Today, the weapon of choice for attackers is malware. Targeted and cunning, advanced malware compromises environments from an array of attack vectors, takes endless form factors, launches attacks over time and can obfuscate the exfiltration of data. The Cisco Sourcefire Advanced Malware Protection (AMP) solution spans extended networks and devices to focus on threats across the full attack continuum – before, during and after™ an attack.This session will provide the audience an overview of Cisco Sourcefire Advanced Malware Protection (AMP) solution - Advanced Malware Protection for Networks, and Advanced Malware Protection for Endpoints.
4.0/5.0
BRKNMS-2700 - BYOD meets DHCP -- Learning To Love Devices You Didn't Have To Provide (2014 San Francisco) Bring your own devices (BYOD) also brings many new challenges for Enterprise device attachment. Creative use of DHCP can make integration of BYOD devices less chaotic and more secure. We will explore how to authenticate the users of BYOD devices using DHCP to restrict the provisioning of IP addresses only to authorized users of these devices. Finally, we will spend some time on how to structure your DHCP deployment so that it is both robust and scalable, with sufficient capacity to meet today's needs and respond easily to tomorrow's growth.
BRKUCC-2059 - Designing and Deploying Cisco Contact Centre Express (2014 Melbourne) This session covers the fundamentals of designing and deploying a Cisco Unified Contact Centre Express solution. The session will begin with an overview and refresher of the Unified Contact Centre Express product portfolio including features and functionality of the latest version. It then moves into design and deployment best practices and covers resources available to design & deployment Engineers. Topics include: Choosing a deployment model, planning for high availability, sizing systems, and estimating bandwidth for the Contact Centre. This is an intermediate to advanced level session intended for network planners, design engineers, administrators and technical staff.
5.0/5.0
ITMGEN-4111 - IT Management Luncheon - Executive Lunch (2014 San Francisco) **The video for this session is unavailable.** Join your colleagues for a lunch just for IT Management delegates. You'll have the opportunity to talk to Cisco executives to get all your questions answered.
BRKSPG-2016 - Architectures for new services over Cable (2014 San Francisco) The session describes the key aspects of CCAP (Converged Cable Access Platform ) and will describe how Cable operators will migrate multiple silos of technology to a converged architecture whilst maintaining backward compatibility with current DOCSIS and Video deployments. The session will also describe the emerging standard for “Advance MAC /PHY” (AMP) in DOCSIS 3.1 and how this plays a pivotal technical development role in the future of an MSO's architecture. A focus on some of the service-driven architectures enabled by DOCSIS will also be covered in this session.
5.0/5.0
BRKDCT-2214 - Ultra Low Latency Data Center Nexu Design - End-to-end design approach (2014 San Francisco) The purpose of this session is to provide the concepts and knowledge around Ultra Low Latency. The network concepts, best practices and design of low latency will be explained for applications demanding ultra low latency. This session focuses on Nexus, UCS, NICs and any other updated ULL topics.
5.0/5.0
BRKEWN-2664 - Secure Wireless LAN Design and Deployment (2014 Melbourne) Wireless Security.  Oxymoron or not?!? Wireless networks were once thought to be inherently insecure, but this is no longer the case.  Attend this session to understand the risks associated with the deployment of 802.11 wireless networks and the mitigation strategies that you can put in place to ensure that your network is kept secure.  We will take an end-to-end view of security all the way from the client device to the corporate network and examine threats and associated mitigations each step of the way.
5.0/5.0
BRKCOM-3010 - UCS: 4+ Years of Lessons Learned by the TAC (2014 San Francisco) Learn valuable lessons gleaned by the TAC during the past 5+ years as we have provided support for real world customers. We will focus on interesting case studies, best practices, and how to best leverage your interactions with the TAC to solve your UCS issues. The session will cover both the UCS B-Series (primarily) and the C-Series Rack Servers
5.0/5.0
BRKCCT-2019 - Cisco Unified Contact Center Express Planning and Design (2014 San Francisco) **The video for this session is unavailable.** This session covers the fundamentals of planning and designing a Cisco Multimedia Unified Contact Center Express deployment. Topics include how to gather customer requirements, deployment model capacity planning, sizing voice/email/chat/reporting features, server virtualization, CAD to new Finesse Migration, New Remote Agent, 'Live Data' in CUIC, and estimating bandwidth for the contact center.
3.0/5.0
CIN-WS141 - Enabling the New Mobility Experience Users are demanding seamless access no matter which device they are using or from where they are connecting. IT is being challenged to bring together more solutions elements than ever before while meeting performance expectations both on and off the corporate network and to be able to quickly troubleshoot problems and proactively manage user experience end to end. Join us and our customer – Bowdoin College to learn more about the industry’s first 4x43 access point delivering up to 30% faster performance with the most reliable connection for mobile devices including tablets and smartphones. The Aironet 3600 Series Access Points is a key component of the total Cisco solution to address the end-to-end mobility challenge posed by the explosion of mobile devices. Only Cisco has all the pieces needed to enable customers turn the explosion of mobile devices from chaos into business opportunity and deliver a new mobility experience.
4.0/5.0
BRKCRS-2663 - Hot Topics and Capabilities for the Campus in 2014 and Beyond (2014 Melbourne) This session discusses the Next Generation Campus Architectures as described by Cisco in published Solution Reference Network Designs (SRND). It focuses on the technologies involved in building such an enterprise campus network, including design and implementation guidance on protocol alternatives like VSS, HSRP, GLBP, Spanning Tree (PVSTP+), and Rapid Spanning Tree (Rapid PVST+). Software features and design principles for each layer of the hierarchical core/distribution/access network model are covered. Detailed examples are presented of failure analysis scenarios and LAN and Interior Gateway Protocol (IGP) tuning related to enterprise networks to minimise network outage times. Finally the session treats common pitfalls such as asymmetrical routing, unicast flooding, and routing black holes and provides best practices for optimising an enterprise campus network to support today's business applications. This session is for attendees responsible for the design, deployment, operations, and management of enterprise campus networks. Introductory knowledge of Spanning Tree, routing protocols, and LAN switching is recommended.
4.0/5.0
BRKAPP-9001 - Policy Driven Data Centre Design (2014 Melbourne) This session is an intermediate session that provides detailed information on the need for, and methodology of, driving data centre infrastructure design and configuration through policy. The rapid evolution of data centre architecture, driven by increasing application demands, has exposed a gap between the way applications are designed and the way they are deployed. Application connectivity and the performance, security, auditing policies they require must be translated from application development teams to infrastructure architects/engineers without a common language. Moving current methodologies to a policy driven approach provides a natural abstraction between app design, and infrastructure configuration allowing enhanced coordination, fluid deployment, and design reusability.
ITMPCS-1073 - VMware Develops an IT as a Service Strategy for a Leading Australian Bank (2014 Melbourne) The Australian market is highly virtualised with over 60% of workloads running on VMware virtual infrastructure. While virtualisation has driven significant benefits in terms of consolidation and cost reduction, this technology has not yet been fully leveraged to change the way IT is structured and how it provides services to the business. This case study will show how VMware partnered with an Australian financial institution to assist in creating an actionable IT as a Service (ITaaS) strategy to move from a highly virtualised current state (>90%) to an ITaaS target state, fundamentally transforming IT into a service brokerage organisation.
5.0/5.0
BRKSPG-1640 - The Internet of Things: Routing and Related Protocols (2014 Melbourne) Intelligent machines and everyday smart objects such as sensors, light bulbs, power meters, road signs and even garden sprinklers will grow the Internet device population by tens of billions in the next 10 years creating the Internet of Things. These devices will usually operate in a highly constrained environment in terms of physical size, available memory, CPU power and battery life over wireless and wired networks of potentially varying quality. This type of operational environment throws up quite a number of networking challenges in protocol design at various layers.   This presentation starts by explaining the subtle differences between IoT/IoE and M2M and how they are inter-related. It then highlights the various protocols from the link layer up to the messaging layer such as RF Mesh, Power Line Comms and CoAP.   The second half of the presentation concentrates on the development of an emerging IPv6 routing protocol called RPL which has been specifically designed to support IoT networks. IoT networks typically support thousands to millions of sensor nodes (commonly referred to as motes) over connections that are intrinsically are lossy in nature such low power wireless and power line communications. The presentation covers the technologies and innovations that were necessary to allow huge numbers of Smart Objects/IoT devices to route information over IPv6 in the Internet of Things in a scalable manner.
5.0/5.0
BRKVIR-2012 - Inside the Nexus 1000v (2014 Melbourne) The recent trend of virtualising servers has a huge impact on the underlying network. Computers are no longer physical, immovable objects that plug nicely into your network switches and remain for a while; they are transient creations that can come and go in the blink of an eye. And it's not stopping there... With a virtual distributed switch we restore network visibility to the boundary of the virtual machine, not just to the boundary of the physical host that runs the hypervisor. Bringing the complete feature set of networking to a massively virtualised Data Centre requires some new design concepts. This session describes the Nexus 1000v from a development point of view. It describes the design challenges and why we made certain implementation decisions. At the end of the session you will have a good understanding of what the Nexus 1000v virtual switch adds to your network and how it is designed. This deep understanding will help you to make the right deployment decisions when you implement the technology in your own environment.
5.0/5.0
BRKUCC-2665 - Communications Manager for Video Call Control (Unified Call Control) (2014 Melbourne) CUCM 10 - a true Call control platform not just for voice but also for video. This session discusses how to create a seamless end user experience across multiple video technologies, such as immersive TelePresence, multipurpose room systems, video telephony, and mobile video systems. We will explore how the Cisco's open standards and architecture, delivers on the vision of true video collaboration everywhere in the organisation. Delving into implementation examples between different TelePresence and video technologies to give the audience a good grounding for their own deployments. We'll examine the values of the Cisco network-centric approach and how to implement a highly interoperable and scalable video collaboration environment for enterprise. This breakout will cover the entire TelePresence solution including CUCM, VCS, TelePresence Server, CTMS, MCU, TMS and endpoints.
BRKUCC-2058 - Utilising Network Intelligence for Collaboration and Real Time Media (2014 Melbourne) Are you stressed out about how to monitor your UC deployment? Collaboration is having an increasing impact to the network, user work style, network applications as well as expectations from the network. Application and network operators are challenged with providing a reliable collaboration service that works every time. However, issues do occur and in this session we will cover strategies for quantifying video conferencing demands, fault identification , isolation as well as expedited resolution. We will cover architectural strategies for both the endpoint and the network as well as the day-to-day tools that provide much improved visibility into application health and performance to assess measure and accelerate troubleshooting of voice/video/data applications. Standard MIBs and alerting mechanisms as well as new management tools, new monitoring features like IOS and MSI performance monitoring, mediatrace and IPSLA VO will be covered. Live demonstrations of the tools and technology will be used to provide tangible context. Join this session, learn about the latest tools and strategies and get back the enjoyment from your UC deployment!
BRKSEC-2060 - Cisco Security Management (2014 Melbourne) This session will showcase the different Cisco Security Management solution and how they provide operational benefit to organisations of all size. We'll cover producs such as Cisco Security Manager, Cisco Prime Security Manager, API integrations, etc.   Note:  Due to recording issues in Melbourne, we are offering another recent recording of this session.
3.0/5.0
BRKSEC-2663 - Before. During. After. Cisco's Integrated Security Strategy (2014 Melbourne) Increasing user mobility, virtualisation and consumerisation of IT are some of the trends security teams are faced with in their networks today. In this session we look at specific components of the Borderless Networks Security architecture which offers an end-to-end security implementation approach to address security concerns in today's real world corporate networks. We will look at the specific security considerations and details as described in a typical business use case. Security technologies discussed in the session will include Next-Generation Firewalls (ASA/CX), Remote Access VPNs (Anyconnect), Identity Based Access Control (ISE/Trustsec/802.1x), Netflow. We will look at how these different components come together to provide an architectural approach to security.
BRKSEC-2024 - Design and Deployment of SourceFire NGIPS and NGFWL (2014 Melbourne) This presentation covers how customers can deploy the SourceFire Next Generation IPS and Next Generation Firewall solutions to augment their threat protection capabilities - Attendees learn how to deploy the FirePOWER security appliances and FireSIGHT Management Centre to unify the critical security functions of the Sourcefire next-generation network security platform using FireSIGHT real-time awareness and security automation technology.   Note:  Due to recording issues in Melbourne, we are offering another recent recording of this session.
1.0/5.0
BRKRST-2501 - Enterprise QoS - The Most Widely Deployed Feature to any Enterprise Organisation (2014 Melbourne) Whether it be controlling mining trucks and trains remotely, running clinical applications in a hospital or responding to important control systems,  more and more enterprise networks are supporting applications and functions which the business considers mission critical.  Quality of Service is a continually evolving network capability, which provides a critical function to ensure effective delivery of all network supported applications, such as voice, video, and business applications. This session will look at a number of factors that continue to drive the development of QoS design for Wired and Wireless Networks including, new applications, new platforms and new industry guidance.  Consistent enterprise wide QoS deployment and maintenance is one of the most common use cases for Software Defined Networks (SDN) in the enterprise campus. This session reintroduces the requirements for QoS in a network, tools for classification and marking, policing and shaping, congestion management and admission control. It focuses on how strategic best practice design principles are applied to the Enterprise Campus Network, the considerations necessary to support a converged network to protect Voice, Video and Data Apps. It will also discuss well how those considerations that may be monitored, controlled and presented to Business stakeholders to support Transformation projects through the use of tools like the APIC-EM.
4.0/5.0
BRKEWN-2027 - Design and Deployment of Outdoor Mesh Wireless Networks (2014 Melbourne) This intermediate-level session will describe the Outdoor wireless products involved in delivering outdoor broadband wireless services for Service Providers, Municipalities, Transportation, Mining and Resources, and other end user customers. The Cisco Outdoor Wireless Bridging and Mesh technologies will be discussed in detail.
BRKCOM-1601 - Introduction to Solid State Storage Systems (2014 Melbourne) This breakout session is an introductory level where you will learn about key concepts of solid state storage systems such as UCS Invicta and will include use cases and deployment scenarios.   While the session is introductory you will be expected to have some basic knowledge of storage systems and data centre technologies.
5.0/5.0
BRKSEC-2662 - BYOD - Risk Management Perspective (2014 Melbourne) The rapid adoption of BYOD within the enterprise introduces a number of new challenges and business considerations. This session looks at risks, mitigating controls and guiding principals associated with the adoption of BYOD. Areas of focus include 'Governance Management', 'Legal, Regulatory & HR Management', 'Technical Device, User and Application Management'.
BRKVIR-2023 - How to Interconnect with Hybrid Cloud Architectures and Approaches (2014 Melbourne) This session will be based on details of Cisco InterCloud Fabric and related technology and feature capability, and how to design into a secure hybrid cloud with enterprise workloads and network services. Customer and Partners are looking for approaches and technologies to securely extend their data center workloads to public clouds. That too, while maintaining their current operational consistency and paradigms in their current data centers. Service Providers are also looking ways to expand their cloud services and on board workloads. This session will review approach and technical architecture for secure hybrid cloud where enterprises and SPs can extend their network and network virtual services in a secure fashion to public clouds.
ATE-CL002 - Physical to Virtual: Accelerate Migration and Simplify Operations As companies migrate physical SAP landscapes to virtualized landscapes, they are able to gain significant cost benefits. But is it worth the risk? What new challenges confront IT and the business? Michael will describe how Vblock Systems, EMC VPLEX, and SAP Landscape Virtualization Manager (LVM) enable you to simplify operations, improve performance, and lower risk, while running SAP in a virtualized data center spanning multiple locations.   At the end of this session, you will have learned: • Why so many SAP customers are choosing converged infrastructure to simplify SAP operations • How to optimize configurations for SAP deployments, enabling improved performance using less hardware • How to improve deployment speed of new SAP applications and accelerate replatforming efforts • How to combine your datacenters into a true virtualized data center • How to create the equivalent of an App Store for SAP
4.5/5.0
ATE-CL004 - Managing End-to-End Service Delivery Across Cisco Networks This webinar focuses on how the network team can achieve a more prominent role in managing service delivery to better understand network and application performance. We will explore best practices for achieving end-to-end operational visibility that extends from the data center, through the network, to the users – enabling a comprehensive view into the network infrastructure and all applications and services.  The session features practical approaches to managing performance in Cisco environments and how to leverage NetScout to achieve operational visibility that helps to increase uptime and improve the user experience. In this session, you will learn:• The role of the Network team in managing application delivery and performance• Building a strategic network and application monitoring architecture including a reference design for monitoring the Cisco Powered Data Center, monitoring Cisco UCS server farms, virtualized environments (such as Cisco Nexus 1000v), Cisco UC deployments and the role and architecture for Network Monitoring Switches• Gaining deep level visibility into all application flows and user sessions, including web, multimedia, and peer-to-peer applications from the network• How to proactively identify, triage and troubleshoot network and application performance from a single platform• Use cases and real-world examples
3.0/5.0
ATE-CL320 - SIP Trunking Enhancements and More (2013 Orlando) Enterprises are moving to Session Initiation Protocol (SIP) trunking, deploying cloud services, and evolving their unified communications (UC) networks to realize significant productivity gains and cost savings. Your existing Cisco Integrated Services Routers (ISRs) and Aggregation Services Routers (ASRs) with new Cisco UC capabilities provide the flexible architecture and features that enable you to pursue these growth opportunities while increasing your return on investment.Attend this technical webcast to learn about these unified communications capabilities and solutions on the Cisco ISRs and ASRs. Get an update on these new capabilities and learn best practices for designing your Cisco UC and collaboration architecture to benefit from these enhancements. Agenda: * Overview of new Cisco UC capabilities now available on Cisco ISRs and ASRs, including enhancements for SIP trunking, gateways, branch and cloud telephony survivability, and branch call control * Best practices for designing your UC and collaboration architecture to benefit from these new capabilities For More Information Visit the Cisco Collaboration virtual resource center to get additional information, download product and solution material, and more.
3.8/5.0
UCS-4792 - UCS Security Engineering Overview (2012 San Diego) We will outline key security features and best practices for UCS. This is a session broken into two key areas between the UCS control plane (processes, open ports, organizational boundaries, access methods, etc.) and the UCS data plane (VLAN groups, FEX isolation, DisJoint L2 operations, VM-FEX for isolation to the VM, etc.) and finish up with certification status.
4.3/5.0
ATE-CL326 - Architecting a Modern Approach to Real Time Business with Vblock Specialized System for SAP HANA (2013 Orlando) Learn how VCE’s new Specialized System is enabling customers to get SAP HANA software up and running in production more smoothly, quickly, and reliably in order to capitalize on the benefits of real-time insights to help address fleeting business opportunities faster.Takeaways: * Identifying transformational opportunities * Planning an SAP HANA installation * Advantages of Vblock Specialized System For More Information Visit the VCE virtual resource center to get additional information, download product and solution material, and more.
4.3/5.0
GENSSN-1616 - Super Session – Intelligent Cybersecurity for the Real World (2014 Melbourne) Driven by market trends in cloud, mobile and the Internet of Everything, technological change is accelerating at lightning speed with the network at the core. Security is no different. Attackers are innovating faster than the industry, finding new attack vectors to exploit their targets and creating significant new security challenges. Join Christopher Young for a discussion on how these phenomena have driven defenders to challenge today’s security assumptions and how Cisco’s new security model and offerings can address our customers’ biggest security problems.
5.0/5.0
GENKEY-1627 - Cisco Live Melbourne Opening Keynote (2014 Melbourne) Join visionary speaker Wim Elfrink for the opening keynote address and learn about the impact of IoE.
5.0/5.0
CP-1006 - Network Models and the Network Architect One of the very first things any aspiring network engineer learns is the OSI seven layer model -- but once it's learned, it's often left in the background, another trivia item that doesn't seem to be much use in the real world. Leaving models in the background is, however, a mistake; these are some of the most useful tools the network engineer has to classify and understand protocols and network operation. This session will discuss the history behind the popular seven layer model, and then move into some other models network engineers might find useful, including some you may never have seen before. Cisco Press book: The Art of Network Architecture: Business-Driven Design by Russ White and Denise Donohue
4.3/5.0
ATE-CL346 - Build Your Own Innovative Support Applications leveraging Cisco Support APIs (2014 San Francisco) How are APIs delivering both a competitive and support edge to a growing number of companies and IT professionals? A recent survey by Venture Beat found that more than 85% of large companies will have API programs in the next 5 years. Join Alok Patel and colleagues from the Cisco Smart Web Technology Group to explore how – 1. The market landscape of APIs for Enterprise Customers and Channel Partners is changing 2. APIs enable you to pull vital Cisco support data into your own systems on demand 3. Companies are using APIs to unlock business innovation and boost their bottom lines This session covers the “what,” “why” and “how” of Cisco APIs now available to you. We will spotlight lessons learned, best practices, and exemplary API strategies adopted by Cisco partners and customers.This session also features live demonstrations of Cisco Support APIs, and illustrates how companies are using APIs today to both innovate support solutions and advance business priorities. For More Information Visit the Cisco Services Solutions Center to get additional information, download product and solution material, and more.
ATE-CL327 - Security Defined Networks: Deploying Security Defined Networks in the Real World (2013 Orlando) Today’s advanced network security threats are growing in complexity, scale and scope. Highly co-ordinated resources and activities are being leveraged to assault today’s networks with unprecedented speed and agility—a new paradigm in network security monitoring is required in order for organizations to adapt and respond to these threats. In this presentation, Net Optics VP of Technology & Solutions Sharon Besser defines the next generation approach to security utilizing security-centric SDN, and provides concrete steps organizations must take with their network security and monitoring. For More Information Visit the Net Optics virtual resource center to get additional information, download product and solution material, and more.
5.0/5.0
CIN-WS205 - Activate—Identity Services Engine 1.2 Learn about the Cisco Identity Services Engine and the new enhancements available with its most recent release—ISE 1.2. The Identity Services Engine provides a comprehensive, all-in-one solution to manage and maintain network access and policies—ensuring consistent enforcement across wired, wireless, and VPN networks. During this online event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors. Join Cisco experts Sanjay Raja and David D’Aprile for a closer look at ISE 1.2, and all the advantages it can bring your business.
4.6/5.0
ATE-CL412 - Application Centric Infrastructure (ACI) (2014 Milan) Learn how Application Centric Infrastructure is ushering in a new era of simplicity and automation, and driving the next generation of data center infrastructure. For More Information Visit the Cisco Switching Solutions Center to get additional information, download product and solution material, and more.
4.7/5.0
ATE-CL400 - Deploying and Managing the Unified Access One Network (2013 London) Enable IT organizations to effectively adopt, integrate and operate the unified access infrastructure with Cisco Prime Infrastructure. Visit the Cisco Prime virtual resource center to get additional information, download product and solution material, and more.
4.0/5.0
ATE-CL408 - Cisco Unified Fabric: Delivering Architectural Flexibility (2013 London) The confluence of a number of trends, including cloud computing, video, virtualization / workload mobility, the data deluge brought on by the  “Internet of things,” is driving significant change in the data center. Customers are looking for flexible data center architectures that will adapt to these changes as their business evolve to take advantage of these trends. Cisco’s Unified Fabric and Nexus portfolio deliver this flexibility and continue to lead the industry with a number of leading innovations that enable architectural flexibility for general, virtualized and cloud deployments. What are these leading innovations and how they enable architectural flexibility that extends from the server to the cloud will be discussed. Visit the Cisco Switching virtual resource center to get additional information, download product and solution material, and more.
4.3/5.0
ATE-CL401 - Delivering a Future Proof Service Orientated Infrastructure to Your Business (2013 London) The consumption model for IT is changing rapidly to include many services delivered by the Cloud. To remain competitive the challenges facing organisations today include time to market for services and products, adaptability and flexibility. The key to evolving a resilient IT strategy is to provide an infrastructure that delivers, non-disruptive operations, immense capability to scale, workload independence, efficiency and automation. In this session Cisco and NetApp will discuss how their industry leading joint FlexPod solution is enabling their customers and cloud service providers to make this move to a future proofed, service orientated infrastructure. Using the Cisco Validated Design (CVD) framework to de-risk implementations and accelerate solution delivery, this session will cover technology areas including utilising pooled computing assets, creating virtualised resource pools at scale, managing elasticity on demand, introducing automation for policy, application awareness and mobility, secure multi tenancy architecture and metered billing. Visit the NetApp virtual resource center to get additional information, download product and solution material, and more.
3.8/5.0
UCS-4797 - Cisco Intelligent Automation for Cloud (UCS) (2012 San Diego) Cisco Intelligent Automation for Cloud is a self-service provisioning and orchestration software solution for cloud computing and data center automation. This session will provide a detailed product overview, followed by an instructor led demonstration of the software suite. We will build off the UCS Manager capabilities describing how this solution automates key data center functions and actions.
ATE-CL338 - Scale your Network Security and Monitoring infrastructure to Keep up with Advanced Targeted Attacks and Big Data Flows (2014 San Francisco) Even as network data has exploded in volume, velocity and variety, network security and monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale, and accommodate continuous monitoring in consolidated physical, virtual and cloud based datacenters. The network’s increasing speed and rapidly growing complexity (e.g. virtualization, and tunneling with encryption), pose challenges for IT network and security professionals trying to manage and secure network infrastructure. How does one architect a scalable security & monitoring architecture to withstand the test of time while ensuring adaptability to evolving business needs? The IT organization as a whole needs to ensure end-to-end visibility and data access to meet and exceed business, network and application performance SLAs while keeping their infrastructure and data secure against continually evolving advanced and targeted attacks. Join Tony Zirnoon, CISSP – Sr. Director Security Strategy VSS Monitoring, as he discusses: 1. Monitoring gaps and security vulnerabilities in today’s traditional network security and monitoring architecture 2. How to address those gaps and vulnerabilities without defaulting to a rip and replace approach 3. Proven best practices in architecting a future-proofed physical or virtual DC monitoring fabric for total network visibility 4. Learn how you can architect a defense-in-depth network security model that scales across converged networks (with real production deployment examples) 5. Future proofing your security infrastructure design and investments against the ongoing barrage of advanced security threats while maintaining high availability and agility to keep up with Big Data flows.
3.0/5.0
ATE-CL334 - Realize Faster Resolutions with Smart Call Home (2014 San Francisco) Start using the technology embedded in your Cisco devices to proactively monitor their health. Receive notification of events based on internal diagnostics with recommendations from Cisco's deep pool of Intellectual property. Realize faster resolution through automated TAC case creation for the most critical events. Topics will include supported devices and faults, deployment scenarios in and out of the datacenter, and configuration examples including UCS blades and rack servers. For More Information Visit the Cisco Services Solutions Center to get additional information, download product and solution material, and more.
3.8/5.0
ATE-CL336 - End-to-end management of NetApp FlexPod integrated infrastructure with Cisco UCS Director (2014 San Francisco) Customers are faced with difficult decisions about how to deploy and manage IT. FlexPod allows customers to deploy best in class technologies, pre-validated to reduce time to deployment and operational complexity. Cisco UCS Director gives you a single application to monitor, plan, and execute infrastructure management tasks. For More Information Visit the NetApp Solutions Center to get additional information, download product and solution material, and more.
2.7/5.0
ATE-CL508 - IoT Wireless Sensor Networks and Multi-Service Field Network Architecture (2014 Melbourne) Wireless sensor networks are the foundation for enabling the Internet of Things.  Cisco has designed a field network architecture to provide IPv6 network services for Smart Grid and other industries.   This session will provide an overview on how to build a multi-service, secure, scalable, and resilient Field Area Network (FAN). It will include case studies of customers who are servicing millions of smart meters using Cisco’s FAN architecture. For More Information Visit the Cisco Internet of Things Solutions Center to get additional information, download product and solution material, and more.
3.0/5.0
BRKPCS-2059 - ACI Impact on Physical Infrastructure Design and Deployment (2014 San Francisco) Adoption of Cisco’s new Application Centric Infrastructure (ACI) will require some changes to the way data center physical infrastructures are designed and deployed. Depending on the scalability, performance, and applications requirements, customers will need to determine the best physical infrastructure to accommodate a variety of spine/leaf network topologies options including ToR, EoR, and MoR leaf switches. In this session, Panduit examines the physical implementation requirements of an ACI deployment including how to design ToR, EoR and MoR network architectures for ACI, and strategies to simplify the deployment of this next generation architecture in order to help customers accelerate their path to ACI.In addition an overview of available services and product sets that help customers manage risk within the physical infrastructure by intelligently converging physical and logical systems to simplify the deployment will be presented.
3.3/5.0
Get More Results