Network Automation is a key component of closed-loop automation, but it is not complete without the proper safeguards provided by Network Verification. In this open session, join Itential’s Senior Solution Architect, Mike Elrom and Forward Networks Director of Technical Marketing, Fabrizio Maccioni as they discuss the benefits of organizations combining automaton with visualization and predictive capabilities to automate complex, business-critical changes within hybrid, multi-cloud networks. During this session they will also demo the technology integrations of Itential’s Automation Platform with Forward Networks platform that assures…
In this ONUG Academy session with Itential, we will discuss the importance of network compliance, the difficulties that are often encountered with achieving compliance in traditional networks, and the additional challenges with establishing compliance in an environment where networking has expanded into multiple clouds and cloud-based services. This session will explain why networking teams should use APIs for cloud networking services for compliance and demonstrate how Itential can combine Network Automation with Configuration, Remediation and Validation to deliver compliance across both traditional, CLI-based and modern,…
Two emerging wireless technologies — 5G wireless and Wi-Fi — both promise to extend wireless connectivity and capabilities. Researchers in industry and academia are working to find new ways to the technologies an be used to provide always-on, instant-access, low-latency responsive computing. In this session, presenters review the overall goal and report on some of the progress being made to achieve it.
Both public and private cloud data centers used Software Defined Networking (SDN) to configure and manage their networks. The technology uses software known as an SDN Controller to accepts requests from management applications and configure network switches with forwarding rules to implement each request. One controller, the Network Operating System (ONOS) from the Open Networking Foundation (ONF), has emerged as a leader. This talk, from an eminent Computer Scientist, describes ONF’s forward-looking design for the next generation of ONOS. It explains how functionality will be…
Our invited panel, researchers from academia and industry, will examine and discuss the viability of AI techniques, especially Machine Learning (ML) in automating network management. We discuss how ML can help operators in situations in which a network must detect and recover rapidly from failures and attacks as well as in managing large networks that require frequent reconfiguration (e.g., a public or private cloud data center. We also discuss whether operators from the industry find the risk of running ML for such operations acceptable and…
Advances in Software-Defined Networks (SDN) make it possible to treat the network as a programmable platform: Programmable both top-to-bottom (including the forwarding plane) and end-to-end (including the access network). This talk discusses how this programmability can be used to support verifiable closed-loop control, including throughout 5G mobile networks. The talk also describes our experiences building an open source 5G-enabled edge cloud that demonstrates the value of treating the network as a programmable platform. A pilot deployment is now running in campuses and enterprises around the…
You’ve probably been hearing a lot of talk about digital business transformation. But has anyone talked to you about what it actually means for your organization? Why does it matter? What does it entail and how do you start? In this video whiteboarding session, you’ll have the chance to hear from Zscaler’s Global Customer Success Leader, Bill Lapp about the drivers of digital transformation, get answers to your questions, and learn how to take the first steps—or the next steps—on your journey. The session will…
This demonstration will show NETSCOUT Omnis Cyber Investigator in action, showing workflows to help investigate, and identify cyberthreats present in your hybrid AWS environment, to provide details to other systems such as firewalls or IDS’s, and NETSCOUT Arbor Edge Defense technology, to block these events for ongoing protection. Additionally it will detail some examples of how Cyber Investigator fits into an existing Security Ecosystem; how it delivers it’s cyber events to third party SIEMs such as Splunk, and AWS Security Hub as well as how…
Industries and organizations today are looking to deliver better software faster. Yet for many software teams the key to achieving this goal exists beyond technology alone. As with photography, getting the desired result requires lining up to take the shot and tuning one’s parameters to work best in the environment at hand. Join this DevOps session as we share the fundamentals for capturing delivery success, developing from the negatives, and focusing on what’s important, likening you and DevOps to pro photographers and photography.
Cloud infrastructure adoption has accelerated faster than many enterprise IT and cloud teams expected. Today, the business drives which public clouds will be used – based on customer requirements, acquisitions, or simply that some business-critical apps and workloads perform better in one cloud versus another. Ready or not, a multi-cloud network that is agile and enterprise-class is now strategic to helping networking pros stay ahead of the business and supporting the apps that drive business transformation. In this session, Nick and Steve we’ll explore some of the…