The network automation community, for the most part, agrees that to automate the network and higher-level services, we need structured data, ideally stored in a centralized location, often referred to as the Source of Truth (SoT).
We have seen increased advocacy for a better way of governing the data in and their relationships using a design-driven approach. The goal is to move away from...
This presentation covers all of the free tools and services Team Cymru offers. I have a few more slides to add/update as new features are coming online but this covers most of everything.
I would need no more than 30 minutes, but
Piracy Shield from an operator PoV
Trust is essential for successful network automation adoption.
When automation platforms exhibit predictable behaviors and transparent processes, teams can confidently delegate critical network operations. Building trustworthy automation doesn't happen by itself, it needs to be baked into the design of every workflows. This technical session examines core principles that build trust,...
Modern network infrastructure management faces a critical challenge: up to 95% of network changes are performed manually, resulting in operational costs 2-3 times higher than network hardware costs. This presentation demonstrates how automated asset discovery platforms eliminate costly human errors while creating seamless integration workflows between monitoring, security, and management...
This presentation outlines the essential pillars for successfully launching and scaling an Internet Service Provider (ISP). We begin by defining the core technical infrastructure—network architecture, routing protocols, bandwidth provisioning, peering arrangements, and redundancy strategies—to ensure high availability and optimal performance. Next, we address security imperatives and...