|
Abby Strong presents at Networking Field Day 21 |
This Presentation date is October 4, 2019 at 13:30-15:30.
Presenters: Abby Strong, Bruce Hubbert, Ed Koehler, Gregor Vucajnk, Shyam Pullela, Steve Smith
Follow on Twitter using the following hashtags or usernames: #NFD21
Extreme Networks The New Extreme: Cloud-Driven End-to-End Enterprise
Watch on YouTube
Watch on Vimeo
This video is an introduction to Extreme’s bold vision for the future as the industry’s first cloud-driven end-to-end enterprise networking vendor.
Personnel: Abby Strong
Extreme Networks ExtremeCloud IQ Architecture
Watch on YouTube
Watch on Vimeo
Watch this presentation on the modern cloud architecture, including a breakdown of the components and how they interoperate as well as deployment options. Real-time demonstration of managed devices, connected clients, and corresponding events at massive scale. See how Extreme can analyze and present the critical information in an innovative way while powering our customers experience.
Personnel: Gregor Vucajnk, Shyam Pullela
Extreme Networks ExtremeCloud IQ Demo
Watch on YouTube
Watch on Vimeo
See a live demonstration of ExtremeCloud IQ, a third generation, AI/ML fueled, cloud-management platform. Will cover foundational paradigms (Network 360, Device 360 and Client 360) and how we employ ML and AI both today and into the future. We’ll dive deep into core features such as Maximum Client Capabilities and discuss the network impacts of real-world scenarios such as the introduction of the iPhone 11. Lastly, we will share Extreme’s capability to cloudify applications using A3 as an example.
Personnel: Bruce Hubbert, Gregor Vucajnk, Shyam Pullela
Extreme Networks Stealth Networking & Hypersegmentation
Watch on YouTube
Watch on Vimeo
Today’s pressing need to create segmented networks is driven by the increasingly complex cybersecurity environment. During this technical deep dive, we’ll discuss how to enable scalable, inherently secure (or stealth) network segments with ease using the Shortest Path Bridging networking standard. We will also provide design guidance on how a segmented network can best be deployed with security appliances to provide multiple layers of defense in a way that minimizes overall complexity.
Note: During the hackathon, the delegates were unable to hack the setup as outlined by the presenter.
Personnel: Ed Koehler