SlideShare a Scribd company logo
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
The Evolving Role of the
Network Engineer
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
…Into the Rabbit Hole
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
All or some of the products detailed in this presentation may still be under development and certain
specifications, including but not limited to, release dates, prices, and product features, may change. The
products may not function as intended and a production version of the products may never be released.
Even if a production version is released, it may be materially different from the pre-release version
discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express or implied,
statutory or otherwise, including but not limited to, any implied warranties of merchantability, fitness for
a particular purpose, or non-infringement of third-party rights with respect to any products and services
referenced herein.
ADX, AnyIO, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX,
MyBrocade, OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network
and The On-Demand Data Center are trademarks of Brocade Communications Systems, Inc., in the
United States and/or in other countries. Other brands, products, or service names mentioned may be
trademarks of others.
Legalish Disclaimer
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 3
This presentation, with prepared remarks, includes forward-looking statements regarding Brocade’s financial results,
goals, plans, assumptions, strategy and business outlook, revenue, tax rate, cash, stock buybacks, OEM inventory, prospects,
as well as U.S. Federal spending and order flow, and IT spending, which are only predictions and involve risks and
uncertainties such that actual results may vary significantly. These and other risks are set forth in more detail in our Form
10-K for the fiscal year ended October 26, 2013 and our Form 10-Q for the fiscal quarter ended August 2, 2015. These
forward-looking statements reflect beliefs, assumptions, outlook, estimates, and predictions as of today, and Brocade
expressly assumes no obligation to update any such forward-looking statements whether as the result of new
developments or otherwise.
In addition, this presentation includes various third-party estimates regarding market share and other measures, which do
not necessarily reflect the views of Brocade. Further, Brocade does not guarantee the accuracy or reliability of any such
information or forecast.
Certain financial information is presented on a non-GAAP basis. Management believes that non-GAAP financial measures
used in this presentation allow stakeholders to gain a better understanding of Brocade’s comparative operating
performance both from period to period, and to its competitors’ operating results. Management also believes these non-
GAAP financial measures help indicate Brocade’s baseline performance before gains, losses or charges that are considered
by management to be outside of ongoing operating results. Accordingly, management uses these non-GAAP financial
measures for planning and forecasting of future periods and in making decisions regarding operations performance and
the allocation of resources. The most directly comparable GAAP information and a reconciliation between the non-GAAP
and GAAP figures are provided in
the accompanying press release, which has been furnished to the SEC on Form 8-K and posted on Brocade’s website, and is
included in the appendix in this presentation.
Legal Disclosure
Please see risk factors on Form 10-Q and Form 10-K filed with the SEC
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 4
BROCADE > Futurist & Principal Engineer | Office of the CTO
IETF > Co-Chair TRILL WG
> Routing Directorate Co-Coordinator
> Routing Area Encapsulation Design Team Member
> Architect/Design Group member for the NVo3 WG
ISO/IEC JTC 1 > JTC1BDSG - Study Group on Big Data (completed 1/2015)
INCITS > Ad Hoc on Big Data (completed 1/2015)
Jon Hudson
Recent Evidence of My Existence….
JON.HUDSON@[BROCADE]||[GMAIL].COM
SMS: 1.650.766.7662
@THE_SOLUTIONEER @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 5
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
JON.HUDSON@[BROCADE]||[GMAIL].COM
SMS: 1.650.766.7662
@THE_SOLUTIONEER 6
SERVER L2-7 NETWORK GEAR ROUTING & POLICY ORCHESTRATION
Software Defined DatacenterOn Demand DatacenterRight Click, Datacenter
DAYS DAYS DAYS DAYS
X86 VirtualizationX86 Virtualization
MINS
NfVNFV
MINS
PROGRAMMATICOpenFlow
MINS
API AUTOMATIONOpenstack
MINS
OPEN Daylight
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 7
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING, DON’T ASK WHY
STAGE 2 ANALYTICS & SOFTWARE REMEDIATION
STAGE 3 MACHINE LEARNING
STAGE 4 FIND NEW CAREER
STAGE 0
PATIENT 0 DIES…AND PROBABLY A FEW MORE…
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER FINDS
AN ISSUE
IT GUY
DEBUGS
LOG EVENT &
USER EVENT
CORROLATION
WAIT FOR
CONFIRMATION
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
HUMANS ARE BAD MONITORING TOOLS
STAGE 0
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
LOG EVERYTHING!
STAGE 1
PATIENT 0 STILL DIES…BUT HOPEFULLY NOT AS MANY
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
HOW DO YOU MONITOR THE KNOWN UNKNOWNS?
A SCSI BACKPLANE ISSUE ON EMC
SYMMETRIX STORAGE ARRAY
DISCOVERED SIX MONTHS PRIOR
TO ARRAY BASED ALERTING BY TRACKING
“BURSTABLE EFFICIENCY” OVER TWELVE
MONTHS
DB LOSS TRACKED OVER LONG PERIODS
TO INDICATE LIKELY TRANCEIVER
DEATH
2 YEARS OF DATA NEEDED
TO CATCH ALL HUMAN CYCLES
STAGE 1
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
STAGE 2—ANALYTICS
PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
IP Analytics Pack for vRealize Operations
Virtual network resilience through physical network visibility
VIRTUAL NETWORK RESILIENCE THROUGH PHYSICAL NETWORK VISIBILITY
Intelligent Network Operations
Delivers comprehensive VCS operational
data to support software-defined data
center analytics
Unified Virtual & Physical
Networking
Provides insights and visibility into
the physical network for better
application and VM performance
Simplified Policy Automation
Predefined alerts and recommended actions
simplify monitoring; health,
risk, and efficiency metrics add context
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 14
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGE 2
PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
RINSE &
REPEAT
SETUP BASIC KNOWN
TRIGGERS
*Want to know more about Machine Learning?
Please Check out David Meyer’s ML Presentation
http://www.1-4-5.net/~dmm/talks/2015/MWC/mwc2015.pptx
STAGE 3—MACHINE
LEARNING*
BRINGS YOU NEW QUESTIONS
Google PUE Optimization Application1
• Straightforward application of ANN/supervised learning
– Lots more happening at Google (and FB, Baidu, NFLX, MSFT,AMZN,…)
• http://research.google.com/pubs/ArtificialIntelligenceandMachineLearning.html
• Use case: Predicting Power Usage Effectiveness (PUE)
– Basically: They developed a neural network framework that learns from
operational data and models plant performance
– The model is able to predict PUE2 within a range of 0.004 +
0.005 , or 0.4% error for a PUE of 1.1
• “A simplified version of what the
models do: take a bunch of data, find
the hidden interactions, then provide recommendations that optimize for
energy efficiency.”
– http://googleblog.blogspot.com/2014/05/better-data-centers-through-machine.html
1HTTPS://DOCS.GOOGLE.COM/A/GOOGLE.COM/VIEWER?URL=WWW.GOOGLE.COM/ABOUT/DATACENTERS/EFFICIENCY/INTERNAL/ASSETS/MACHINE-LEARNING-APPLICATIONSFOR-DATACENTER-OPTIMIZATION-FINALV2.PDF
2 HTTP://EN.WIKIPEDIA.ORG/WIKI/POWER_USAGE_EFFECTIVENESS
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 17
Google Use Case: Features
Number of features relatively small (n = 19)
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 18
Google Use Case: Details
• Neural Network
– 5 hidden layers
– 50 nodes per hidden layer
– 0.001 as the regularization parameter (λ)
• Training Dataset
– 19 normalized input parameters (features) per normalized
output variable (the DC PUE)
• Data normalized into the range [-1,-1]
– 184,435 time samples at 5 minute resolution
• O(2) years of data
– 70% for training, 30% for cross validation
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 19
Google Use Case: Sensitivity Analysis
• After the model is trained, one can look at effect of individual
parameters by varying one while holding the others constant
The relationship between PUE and the number of chillers
running is nonlinear because chiller efficiency decreases
exponentially with reduced load.
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 20
Google: Outside Air Enthalpy Has Largest
Impact on PUE
Relationship between PUEand
outside air enthalpy, or total
energy content of the ambient air.
As the air enthalpy increases, the
number of cooling towers,
Supplemental chillers, and
associated loading rises as well,
producing a nonlinear effect on
the DC overhead. Note that
enthalpy is a more compre-
hensive measure of outdoor
weather conditions than the wet
bulb temperature alone since it
includes the moisture content and
specific heat of ambient air.
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 21
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER FINDS AN
ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
STAGE 0 HUMAN ALERT NETWORK
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
LOG EVERYTHING!
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING,
DON’T ASK WHY
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
WAIT FOR
CONFIRMATION
SETUP BASIC KNOWN
TRIGGERS
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING,
DON’T ASK WHY
STAGE 2 ANALYTICS
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
STAGE 0 HUMAN ALERT NETWORK
STAGE 1 LOG EVERYTHING,
DON’T ASK WHY
STAGE 2 ANALYTICS
STAGE 3 MACHINE LEARNING
STAGES OF
ENLIGHTENMENT
BUILD A
DATACENTER
DEPLOY AN
APPLICATION
USER STILL
FINDS AN ISSUE
IT GUY DEBUGS LOG EVENT & USER
EVENT
CORROLATION
RINSE &
REPEAT
SETUP BASIC KNOWN
TRIGGERS
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
EVIL SOFTWARE
COMING TO TAKE
YOUR JOBS
STAGE 4:
FIND NEW CAREER
Tale of the Tape
2000 vs. 2015
TALE%OF%THE%TAPE%
2015%
1 6 3 0 l bs ----- Weigh t ------- 5 9 l bs
4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v
3 2 1 0 0 ---- BTU ------ 2 6 9 7
Yes --- 1 0 G/4 0 G Lin e-Rat e --- Yes
Yes --- 1 0 0 G Lin e-Rat e --- Yes *
YES --- BGP/MPLS --- YES
No --- SW/H W Separ at io n --- Yes
Cus t o m -------- Type ---- Mer ch an t
IOS XR -------------- OS ------- Yo u Ch o o s e
> $ 1 M --- Co s t --- ~ $ 5 k
> $ 2 0 0 k --- 1 yr Suppo r t --- $ 2 k
Yes ----H o t Swap H W ---- No
Yes --- COD --- No
Yes --- H W Par t it io n s --- No
%
TALE%OF%THE%TAPE%
2000%
1 2 0 0 l bs ---- Weigh t ------- 5 9 l bs
4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v
3 2 1 0 0 --- BTU ----- 2 6 9 7
6 4 bit --------- Ar ch ---------- 3 2 bit
2 4 --------- CPUs ------------- 2
4 8 ---------- Th r eads ------------ 2
3 8 4 GB ---- Memo r y ------- 3 2 G
Cus t o m -------- Type ---- Mer ch ant
So l ar is --- OS --- Linux
~ $ 2 5 0 k ----- Co s t ------ ~ $ 2 .5 k
$ 6 0 k --- 1 yr Suppo r t --- $ 2 k
Yes ----H o t Swap H W ---- No
Yes --- COD --- No
Yes --- H W Par t it io ns --- No
%
%
%
2000 2015
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 27
THIS IS ALSO ABOUT
MULTITENANCY
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
Next Gen Data Centers
Direct networking and free range VMs
x20
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 29
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 30
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 31
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 32
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 33
Programmability
Python scripting
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
To use Python interpreter:
NOSCLI “python” from NOSCLI
shell.
Create Python script; copy script
to switch and execute
sw0# copy
scp://releaseuser:releaseuser@10.24.81.13//users/home32/badan
iya/proj/scorpius/scripts/create_po.py flash://create_po.py
sw0# python create_po.py
!Command: show running-config int vlan
!Time: Tue Jan 6 08:32:33 2015
interface Vlan 1
!
Script can be loaded on principal
switch and automate VCS Fabric
34
Programmability
VDX Puppet Integration
Node1
Node2 Netconf
Netconf
Puppet
Master
VCS1
Catalog
Catalog
catalog
VCS2
Catalog
Catalog
catalog
• nos_netdev_device: Device Configuration
• nos_netdev_interface: L2 Interface configuration
• nos_netdev_vlan: VLAN configuration
• nos_netdev_l2_interface: VLAN to interface assignments
NOS Provider List
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 35
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 36
Real-Time Routing with Reality
Don’t guess, know!
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
Analysis Engine
37
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
Thank you

More Related Content

PPTX
The Data Center of the Future: The New IP - Phil O'Reilly
PPTX
Cyber Priority - Judson Walker
PPTX
Data Center: New Frontiers - Clive D'Souza
PPTX
Why a Dedicated Network for IP Storage? - Dr. Chip Copper
PPTX
Campus Networking Solutions - Bill Ryan
PPTX
Framework for the New IP - Phil O'Reilly
PPTX
Solution Demonstration Overview - Steve Wallo
PPTX
Delivering Network Innovation with SDN - Tom Nadeau
The Data Center of the Future: The New IP - Phil O'Reilly
Cyber Priority - Judson Walker
Data Center: New Frontiers - Clive D'Souza
Why a Dedicated Network for IP Storage? - Dr. Chip Copper
Campus Networking Solutions - Bill Ryan
Framework for the New IP - Phil O'Reilly
Solution Demonstration Overview - Steve Wallo
Delivering Network Innovation with SDN - Tom Nadeau

What's hot (20)

PPTX
Evolution of the Physical Data Center - Mike Bushong
PPTX
OpenStack Hybrid Cloud Management and Orchestration - James Bond
PDF
A Switch based complete solution
PDF
Clues for Solving Cloud-Based App Performance
PDF
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
PPTX
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
PDF
TechWiseTV Workshop: Cisco DNA Center Assurance
PDF
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
PPTX
Cisco connect winnipeg 2018 simple it leads to simple it management
PPTX
F5 Application Services Reference Architecture (Audio)
PPTX
Analytical Driven Security - Chip Copper
PPTX
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
PDF
Cisco connect winnipeg 2018 simply powerful networking with meraki
PPTX
Cisco connect winnipeg 2018 a look at network assurance in dna center
PDF
Cisco Connect 2018 Philippines - introducing cisco dna assurance
PDF
Cisco Connect Halifax 2018 Cisco dna - network intuitive
PPTX
Key Findings from the State of Application Delivery 2015
PPTX
Combining Man & Machine: A Glimpse into the Future - David Meyer
PPTX
Troubleshooting Webex and Microsoft Teams with ThousandEyes
PDF
Cisco connect winnipeg 2018 introducing the network intuitive
Evolution of the Physical Data Center - Mike Bushong
OpenStack Hybrid Cloud Management and Orchestration - James Bond
A Switch based complete solution
Clues for Solving Cloud-Based App Performance
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
TechWiseTV Workshop: Cisco DNA Center Assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
Cisco connect winnipeg 2018 simple it leads to simple it management
F5 Application Services Reference Architecture (Audio)
Analytical Driven Security - Chip Copper
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Key Findings from the State of Application Delivery 2015
Combining Man & Machine: A Glimpse into the Future - David Meyer
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Cisco connect winnipeg 2018 introducing the network intuitive
Ad

Viewers also liked (6)

PPTX
Top 5 network engineer cover letter samples
PPT
Computer system administrator
PPT
Duties of a system administrator
PPTX
Network Engineer Interview Questions with Answers
PDF
1000 Ccna Questions And Answers
PDF
Router commands
Top 5 network engineer cover letter samples
Computer system administrator
Duties of a system administrator
Network Engineer Interview Questions with Answers
1000 Ccna Questions And Answers
Router commands
Ad

Similar to The Evolving Role of the Network Engineer - Jon Hudson (20)

PDF
SFBA Splunk Usergroup meeting July 17, 2024
PDF
Building the Global "Cloud 2"
PDF
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
PDF
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
PDF
Micrso Strategy Advanced Guide
PDF
IRJET-Securing Electronic Health Records using Blockchain
DOC
Capstone Final Project
PDF
SIEM, malware protection, deep data visibility — for free
PPT
Social Enterprise: Trust; Vision; Revolution
DOC
RiskAssessmentReport
PDF
Platform session 1 Innovation on the salesforce platform - speed vs control
PPTX
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
PDF
Welcome to the Government Success Platform
PDF
Fintech Fundamentals 1st Edition Len Mei Phd
PDF
DevOps for Highly Regulated Environments
DOCX
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
PDF
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
PDF
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
PDF
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
PDF
Splunk Solution overview testing versi 1
SFBA Splunk Usergroup meeting July 17, 2024
Building the Global "Cloud 2"
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Micrso Strategy Advanced Guide
IRJET-Securing Electronic Health Records using Blockchain
Capstone Final Project
SIEM, malware protection, deep data visibility — for free
Social Enterprise: Trust; Vision; Revolution
RiskAssessmentReport
Platform session 1 Innovation on the salesforce platform - speed vs control
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
Welcome to the Government Success Platform
Fintech Fundamentals 1st Edition Len Mei Phd
DevOps for Highly Regulated Environments
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Splunk Solution overview testing versi 1

More from scoopnewsgroup (20)

PDF
2020: What's on Deck for the PMA
PDF
Modernization Requires Choice
PDF
Smarter Access is the Bridge to Security Modernization
PDF
How Zero Trust Makes the Mission Simple & Secure
PDF
Building a Zero Trust Architecture
PDF
History of Data-Centric Transformation
PDF
IC Fireside Chat
PDF
The Edge to AI
PDF
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PDF
Moving Beyond Zero Trust
PDF
Keeping the Workforce of the Future Empowered, Engaged & Happy
PDF
Opening Remarks
PDF
It All Starts with Linux
PDF
Leadership in the Digital Age
PDF
Digital Transformation for Government
PDF
DevSecOps: The DoD Software Factory
PDF
Enhancing your Cyber Skills through a Cyber Range
PDF
Lessons Learned from Fire Escapes for Cybersecurity
PDF
2019 FedScoop Public Sector innovation Summit
2020: What's on Deck for the PMA
Modernization Requires Choice
Smarter Access is the Bridge to Security Modernization
How Zero Trust Makes the Mission Simple & Secure
Building a Zero Trust Architecture
History of Data-Centric Transformation
IC Fireside Chat
The Edge to AI
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Moving Beyond Zero Trust
Keeping the Workforce of the Future Empowered, Engaged & Happy
Opening Remarks
It All Starts with Linux
Leadership in the Digital Age
Digital Transformation for Government
DevSecOps: The DoD Software Factory
Enhancing your Cyber Skills through a Cyber Range
Lessons Learned from Fire Escapes for Cybersecurity
2019 FedScoop Public Sector innovation Summit

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Hybrid model detection and classification of lung cancer
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
A Presentation on Touch Screen Technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MIND Revenue Release Quarter 2 2025 Press Release
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Zenith AI: Advanced Artificial Intelligence
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Group 1 Presentation -Planning and Decision Making .pptx
1. Introduction to Computer Programming.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
OMC Textile Division Presentation 2021.pptx
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles - August'25-Week II
Hybrid model detection and classification of lung cancer
Enhancing emotion recognition model for a student engagement use case through...
TLE Review Electricity (Electricity).pptx
A novel scalable deep ensemble learning framework for big data classification...
DP Operators-handbook-extract for the Mautical Institute
A Presentation on Touch Screen Technology
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence

The Evolving Role of the Network Engineer - Jon Hudson

  • 1. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES The Evolving Role of the Network Engineer
  • 2. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES …Into the Rabbit Hole @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
  • 3. All or some of the products detailed in this presentation may still be under development and certain specifications, including but not limited to, release dates, prices, and product features, may change. The products may not function as intended and a production version of the products may never be released. Even if a production version is released, it may be materially different from the pre-release version discussed in this presentation. Nothing in this presentation shall be deemed to create a warranty of any kind, either express or implied, statutory or otherwise, including but not limited to, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement of third-party rights with respect to any products and services referenced herein. ADX, AnyIO, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX, MyBrocade, OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network and The On-Demand Data Center are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be trademarks of others. Legalish Disclaimer @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 3
  • 4. This presentation, with prepared remarks, includes forward-looking statements regarding Brocade’s financial results, goals, plans, assumptions, strategy and business outlook, revenue, tax rate, cash, stock buybacks, OEM inventory, prospects, as well as U.S. Federal spending and order flow, and IT spending, which are only predictions and involve risks and uncertainties such that actual results may vary significantly. These and other risks are set forth in more detail in our Form 10-K for the fiscal year ended October 26, 2013 and our Form 10-Q for the fiscal quarter ended August 2, 2015. These forward-looking statements reflect beliefs, assumptions, outlook, estimates, and predictions as of today, and Brocade expressly assumes no obligation to update any such forward-looking statements whether as the result of new developments or otherwise. In addition, this presentation includes various third-party estimates regarding market share and other measures, which do not necessarily reflect the views of Brocade. Further, Brocade does not guarantee the accuracy or reliability of any such information or forecast. Certain financial information is presented on a non-GAAP basis. Management believes that non-GAAP financial measures used in this presentation allow stakeholders to gain a better understanding of Brocade’s comparative operating performance both from period to period, and to its competitors’ operating results. Management also believes these non- GAAP financial measures help indicate Brocade’s baseline performance before gains, losses or charges that are considered by management to be outside of ongoing operating results. Accordingly, management uses these non-GAAP financial measures for planning and forecasting of future periods and in making decisions regarding operations performance and the allocation of resources. The most directly comparable GAAP information and a reconciliation between the non-GAAP and GAAP figures are provided in the accompanying press release, which has been furnished to the SEC on Form 8-K and posted on Brocade’s website, and is included in the appendix in this presentation. Legal Disclosure Please see risk factors on Form 10-Q and Form 10-K filed with the SEC @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 4
  • 5. BROCADE > Futurist & Principal Engineer | Office of the CTO IETF > Co-Chair TRILL WG > Routing Directorate Co-Coordinator > Routing Area Encapsulation Design Team Member > Architect/Design Group member for the NVo3 WG ISO/IEC JTC 1 > JTC1BDSG - Study Group on Big Data (completed 1/2015) INCITS > Ad Hoc on Big Data (completed 1/2015) Jon Hudson Recent Evidence of My Existence…. JON.HUDSON@[BROCADE]||[GMAIL].COM SMS: 1.650.766.7662 @THE_SOLUTIONEER @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 5
  • 6. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES JON.HUDSON@[BROCADE]||[GMAIL].COM SMS: 1.650.766.7662 @THE_SOLUTIONEER 6
  • 7. SERVER L2-7 NETWORK GEAR ROUTING & POLICY ORCHESTRATION Software Defined DatacenterOn Demand DatacenterRight Click, Datacenter DAYS DAYS DAYS DAYS X86 VirtualizationX86 Virtualization MINS NfVNFV MINS PROGRAMMATICOpenFlow MINS API AUTOMATIONOpenstack MINS OPEN Daylight @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 7
  • 8. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGE 0 HUMAN ALERT NETWORK STAGE 1 LOG EVERYTHING, DON’T ASK WHY STAGE 2 ANALYTICS & SOFTWARE REMEDIATION STAGE 3 MACHINE LEARNING STAGE 4 FIND NEW CAREER
  • 9. STAGE 0 PATIENT 0 DIES…AND PROBABLY A FEW MORE… BUILD A DATACENTER DEPLOY AN APPLICATION USER FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
  • 10. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES HUMANS ARE BAD MONITORING TOOLS STAGE 0
  • 11. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION SETUP BASIC KNOWN TRIGGERS LOG EVERYTHING! STAGE 1 PATIENT 0 STILL DIES…BUT HOPEFULLY NOT AS MANY
  • 12. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES HOW DO YOU MONITOR THE KNOWN UNKNOWNS? A SCSI BACKPLANE ISSUE ON EMC SYMMETRIX STORAGE ARRAY DISCOVERED SIX MONTHS PRIOR TO ARRAY BASED ALERTING BY TRACKING “BURSTABLE EFFICIENCY” OVER TWELVE MONTHS DB LOSS TRACKED OVER LONG PERIODS TO INDICATE LIKELY TRANCEIVER DEATH 2 YEARS OF DATA NEEDED TO CATCH ALL HUMAN CYCLES STAGE 1
  • 13. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION SETUP BASIC KNOWN TRIGGERS STAGE 2—ANALYTICS PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
  • 14. IP Analytics Pack for vRealize Operations Virtual network resilience through physical network visibility VIRTUAL NETWORK RESILIENCE THROUGH PHYSICAL NETWORK VISIBILITY Intelligent Network Operations Delivers comprehensive VCS operational data to support software-defined data center analytics Unified Virtual & Physical Networking Provides insights and visibility into the physical network for better application and VM performance Simplified Policy Automation Predefined alerts and recommended actions simplify monitoring; health, risk, and efficiency metrics add context @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 14
  • 15. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGE 2 PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY
  • 16. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION RINSE & REPEAT SETUP BASIC KNOWN TRIGGERS *Want to know more about Machine Learning? Please Check out David Meyer’s ML Presentation http://www.1-4-5.net/~dmm/talks/2015/MWC/mwc2015.pptx STAGE 3—MACHINE LEARNING* BRINGS YOU NEW QUESTIONS
  • 17. Google PUE Optimization Application1 • Straightforward application of ANN/supervised learning – Lots more happening at Google (and FB, Baidu, NFLX, MSFT,AMZN,…) • http://research.google.com/pubs/ArtificialIntelligenceandMachineLearning.html • Use case: Predicting Power Usage Effectiveness (PUE) – Basically: They developed a neural network framework that learns from operational data and models plant performance – The model is able to predict PUE2 within a range of 0.004 + 0.005 , or 0.4% error for a PUE of 1.1 • “A simplified version of what the models do: take a bunch of data, find the hidden interactions, then provide recommendations that optimize for energy efficiency.” – http://googleblog.blogspot.com/2014/05/better-data-centers-through-machine.html 1HTTPS://DOCS.GOOGLE.COM/A/GOOGLE.COM/VIEWER?URL=WWW.GOOGLE.COM/ABOUT/DATACENTERS/EFFICIENCY/INTERNAL/ASSETS/MACHINE-LEARNING-APPLICATIONSFOR-DATACENTER-OPTIMIZATION-FINALV2.PDF 2 HTTP://EN.WIKIPEDIA.ORG/WIKI/POWER_USAGE_EFFECTIVENESS @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 17
  • 18. Google Use Case: Features Number of features relatively small (n = 19) @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 18
  • 19. Google Use Case: Details • Neural Network – 5 hidden layers – 50 nodes per hidden layer – 0.001 as the regularization parameter (λ) • Training Dataset – 19 normalized input parameters (features) per normalized output variable (the DC PUE) • Data normalized into the range [-1,-1] – 184,435 time samples at 5 minute resolution • O(2) years of data – 70% for training, 30% for cross validation @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 19
  • 20. Google Use Case: Sensitivity Analysis • After the model is trained, one can look at effect of individual parameters by varying one while holding the others constant The relationship between PUE and the number of chillers running is nonlinear because chiller efficiency decreases exponentially with reduced load. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 20
  • 21. Google: Outside Air Enthalpy Has Largest Impact on PUE Relationship between PUEand outside air enthalpy, or total energy content of the ambient air. As the air enthalpy increases, the number of cooling towers, Supplemental chillers, and associated loading rises as well, producing a nonlinear effect on the DC overhead. Note that enthalpy is a more compre- hensive measure of outdoor weather conditions than the wet bulb temperature alone since it includes the moisture content and specific heat of ambient air. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 21
  • 22. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGES OF ENLIGHTENMENT BUILD A DATACENTER DEPLOY AN APPLICATION USER FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION STAGE 0 HUMAN ALERT NETWORK
  • 23. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGES OF ENLIGHTENMENT BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION SETUP BASIC KNOWN TRIGGERS LOG EVERYTHING! STAGE 0 HUMAN ALERT NETWORK STAGE 1 LOG EVERYTHING, DON’T ASK WHY
  • 24. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGES OF ENLIGHTENMENT BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION WAIT FOR CONFIRMATION SETUP BASIC KNOWN TRIGGERS STAGE 0 HUMAN ALERT NETWORK STAGE 1 LOG EVERYTHING, DON’T ASK WHY STAGE 2 ANALYTICS
  • 25. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES STAGE 0 HUMAN ALERT NETWORK STAGE 1 LOG EVERYTHING, DON’T ASK WHY STAGE 2 ANALYTICS STAGE 3 MACHINE LEARNING STAGES OF ENLIGHTENMENT BUILD A DATACENTER DEPLOY AN APPLICATION USER STILL FINDS AN ISSUE IT GUY DEBUGS LOG EVENT & USER EVENT CORROLATION RINSE & REPEAT SETUP BASIC KNOWN TRIGGERS
  • 26. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES EVIL SOFTWARE COMING TO TAKE YOUR JOBS STAGE 4: FIND NEW CAREER
  • 27. Tale of the Tape 2000 vs. 2015 TALE%OF%THE%TAPE% 2015% 1 6 3 0 l bs ----- Weigh t ------- 5 9 l bs 4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v 3 2 1 0 0 ---- BTU ------ 2 6 9 7 Yes --- 1 0 G/4 0 G Lin e-Rat e --- Yes Yes --- 1 0 0 G Lin e-Rat e --- Yes * YES --- BGP/MPLS --- YES No --- SW/H W Separ at io n --- Yes Cus t o m -------- Type ---- Mer ch an t IOS XR -------------- OS ------- Yo u Ch o o s e > $ 1 M --- Co s t --- ~ $ 5 k > $ 2 0 0 k --- 1 yr Suppo r t --- $ 2 k Yes ----H o t Swap H W ---- No Yes --- COD --- No Yes --- H W Par t it io n s --- No % TALE%OF%THE%TAPE% 2000% 1 2 0 0 l bs ---- Weigh t ------- 5 9 l bs 4 x2 4 0 v ------- Po wer ------- 2 x1 2 0 v 3 2 1 0 0 --- BTU ----- 2 6 9 7 6 4 bit --------- Ar ch ---------- 3 2 bit 2 4 --------- CPUs ------------- 2 4 8 ---------- Th r eads ------------ 2 3 8 4 GB ---- Memo r y ------- 3 2 G Cus t o m -------- Type ---- Mer ch ant So l ar is --- OS --- Linux ~ $ 2 5 0 k ----- Co s t ------ ~ $ 2 .5 k $ 6 0 k --- 1 yr Suppo r t --- $ 2 k Yes ----H o t Swap H W ---- No Yes --- COD --- No Yes --- H W Par t it io ns --- No % % % 2000 2015 @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 27
  • 28. THIS IS ALSO ABOUT MULTITENANCY @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
  • 29. Next Gen Data Centers Direct networking and free range VMs x20 @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 29
  • 30. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 30
  • 31. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 31
  • 32. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 32
  • 33. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 33
  • 34. Programmability Python scripting @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES To use Python interpreter: NOSCLI “python” from NOSCLI shell. Create Python script; copy script to switch and execute sw0# copy scp://releaseuser:releaseuser@10.24.81.13//users/home32/badan iya/proj/scorpius/scripts/create_po.py flash://create_po.py sw0# python create_po.py !Command: show running-config int vlan !Time: Tue Jan 6 08:32:33 2015 interface Vlan 1 ! Script can be loaded on principal switch and automate VCS Fabric 34
  • 35. Programmability VDX Puppet Integration Node1 Node2 Netconf Netconf Puppet Master VCS1 Catalog Catalog catalog VCS2 Catalog Catalog catalog • nos_netdev_device: Device Configuration • nos_netdev_interface: L2 Interface configuration • nos_netdev_vlan: VLAN configuration • nos_netdev_l2_interface: VLAN to interface assignments NOS Provider List @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 35
  • 36. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 36
  • 37. Real-Time Routing with Reality Don’t guess, know! @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES Analysis Engine 37
  • 38. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES
  • 39. @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES Thank you

Editor's Notes

  • #11: I once finished a remote office VOIP project early and under budget with a team I was on. We were very proud of ourselves. 6 months later we got a very angry call from the local manager. His cell phone costs had gone up 300% The employees were so dedicated to the company that they didn’t want to complain. So when the VOIP phones would have issues, they would just go outside and use their cell phone. We had relied on humans to tell us of issues, and they failed us for all the right reasons. We failed because simple put, “you don’t own what you don’t measure” NO ONE cared that we finished early, or under budget. A win turned into a fail due lack of automated monitoring.
  • #13: After instrumenting the hell out of a FC network for Finisar I was able to use 2 years of detailed logs to look for trends. Doing this I was able to pull off the two items above. 2 years is needed because it’s easy to get caught by a once/year human social event like Christmas. Sometimes ½ your Users logging off suddenly at 3pm is just Christmas dinner on the east coast.
  • #15: At the highest level, Brocade is the best underlay for the VMware overlay network and our content packs for vRealize deliver the visibility piece across all that for better application and VM performance. This is because the administrators are armed with context about any issues that they can take to the network team, cutting down time to resolution. [The network team can use vRealize too – to identify which switches and ports to reconfigure.] There are some additional out-of-the-box tools for administrators in vRealize Ops. The health, risk and efficiency metrics help – and there are also alerts with recommended actions too.
  • #16: Comcast presented at NANOG 55 that they could find DNS issues faster using Twitter than with any internal tool they use. They “baselined” something like “ Comcast sucks” and look for pockets of “bursty comcast” hate being spread over twitter. CDC does the same thing for outbreaks. The DARPA Red Balloon project tracked a simple balloon through a city just using what random people tweeted about it to discover its’ route.
  • #17: Analytics is when you have questions you need answers to. Machine Learning is for when you need to improve but don’t know what question to ask next. This talk is about what you can do with analytics and machine learning, not on what they are. If you want to learn more about machine learning I suggest starting with http://www.1-4-5.net/~dmm/talks/2015/MWC/mwc2015.pptx (Also above on Slide)
  • #32: Which way is up? East/West/North/South all become relative.
  • #37: Applications & Datacenter as a Service
  • #38: Lots of new data sources
  • #39: Network Architects of the Future