Hi [[ session.user.profile.firstName ]]

Dartmouth College's Network of the Future is Powered by AI

When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

Watch now, and learn how to:

-Gain visibility into the Wi-Fi user experience
-Quickly troubleshoot network problems with an AI-driven virtual assistant
-Predict network problems before they arise
-Implement personalized location services, such as wayfinding and proximity notifications
Recorded Apr 23 2019 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth College
Presentation preview: Dartmouth College's Network of the Future is Powered by AI

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Trends in Cyber Crime: The Last 18 Months Recorded: Jul 15 2019 54 mins
    Trevor Pott, Security Product Marketing Director, Juniper Networks
    There are three key trends in cybercrime that have been observed over the past 18 months: very long dwell time attacks, advanced spear phishing (especially of executives), and the growing use of both automation and machine learning by malicious actors. This session will explore these trends, what they mean for enterprises, and how defenders can respond to them by using the technologies and techniques of the attackers against them.
  • [PANEL] Prevailing Trends in Cyber Crime Recorded: Jul 15 2019 45 mins
    Robin Smith (Rosint Labs), Bob Rudis (Rapid7), Monique Becenti (SiteLock), Trevor Pott (Juniper)
    The average cost of a malware attack on a company is $2.4 million, according to Accenture. Organizations need to ensure they are following cybersecurity best practices in order to mitigate risk.

    Join this interactive Q&A panel to learn more about:
    • What’s new on the threatscape
    • The latest hacking tools, strategies and methods and how to protect against them
    • How to implement proactive strategies rather than reactive
    • Recommendations for improving security and steps to take today

    Speakers:
    Robin Smith, Presales Consultant, Gospel Technology
    Bob Rudis, Chief Data Scientist, Rapid7
    Monique Becenti, Product & Channel Marketing Specialist, SiteLock
    Trevor Pott, Product Marketing Director, Juniper Networks
  • Transport Architecture Simplification with Segment Routing (SR) & EVPN Recorded: Jul 10 2019 59 mins
    Ron Bonica, Distinguished Engineer
    In this online webinar Ron will share the same presentation he gave at the Technical Advisory Board meeting in Orlando, FL allowing this important information to be shared further in your organizations.

    In the presentation, we will explore Segment Routing and Ethernet Virtual Private Networks. We will also explore how these technologies can simplify network protocols and network operations.
  • What Nature Can Tell Us About IoT Security at Scale Recorded: Jul 8 2019 28 mins
    Ben Baker, Director, Strategic Marketing, Juniper Networks
    The scale and complexity of networks supporting IoT will quickly outstrip human capabilities to defend them. Devices can be elusive; they will hide behind gateways and roaming arrangements. The challenge is how to monitor and learn the behavior of the different classes of devices. IoT devices are like flocks of birds: they move in large groups in the same direction; when one deviates, usually the rest of the group deviates. We can use unsupervised machine learning techniques with a 5-step process to help solve the IoT Security problem. 1. Observe; 2. Cluster; 3. Detect Anomalies; 4. Root Cause Analysis; 5. Remediate.
  • Juniper Connected Security Recorded: Jul 2 2019 20 mins
    Marco Martinez
    Organizations continue to evolve beyond just premises-based IT deployments and are leveraging multicloud to transform IT. As this transformation takes place, it increases the speed they can move, but also the complexity of their environment, heightening the need for fast and elastic protection from advanced threats. Organizations need automated, repeatable security across their entire network. Juniper Connected Security gives organizations the ability to safeguard users, applications and infrastructure by extending security to all points of connection across the network.
    Key validation points:
    -Safeguard users, applications and infrastructure against advanced threats
    -Automate security coverage from endpoints to edge and every cloud in between
    -Multicloud-ready with fast and elastic protection
    -See who and what is on your network and enforce policy across all connection points
    -End-to-end, top-to-bottom best-in-class secure networking
    -Open, since no one has a security green field and we must build on security solutions and infrastructure already in play
  • Automating your AI for IT™ Network with Mist Recorded: Jun 20 2019 32 mins
    Christian Gilby
    In this webinar, we will discuss how Mist has brought a unique user-centric approach to Wi-Fi using 100% APIs while leveraging an AI-driven, modern microservices cloud architecture. Learn how this AI for IT™ automation solution brings the power of APIs across the Juniper enterprise switching, SD-WAN and Mist wireless portfolios.

    We will share several best practices and how, by leveraging Mist’s APIs, customers like you can enable a seamless integration experience across the IT stack and experience proactive operations that will deliver a better user experience.

    You will see hands-on examples of how easy it is to create thousands of customer sites through automation and hear about experiences from some of Mist’s Fortune 100 customers in how they have leveraged Mist APIs to transform their business with automation and insights. We will also share an innovative customer example of complete API integration using OpenConfig of which Mist is the first Wi-Fi vendor to support this open standard.

    Finally, we will share several example automated scripts that expose Mist APIs to customers who are new to this software model through easy to use tools like Postman. You will learn about several simple Python templates that are publicly available for customers to experiment with and begin their automation and API journey.
  • Transport Architecture Simplification with Segment Routing (SR) & EVPN Recorded: Jun 17 2019 60 mins
    Ron Bonica, Distinguished Engineer
    In this online webinar Ron will share the same presentation he gave at the Technical Advisory Board meeting in Orlando, FL allowing this important information to be shared further in your organizations.

    In the presentation, we will explore Segment Routing and Ethernet Virtual Private Networks. We will also explore how these technologies can simplify network protocols and network operations.
  • Codifying Network Configuration Through Simple Declarative Automation Recorded: Jun 12 2019 32 mins
    David Gee
    This webinar will take users through a brief journey to introduce imperative- and configuration-driven automation, and how they can move to declarative automation where we ask ‘what’ to automate rather than ‘how’. We are using a tool called Terraform to achieve this, and currently developing Terraform Junos providers with the initial release for QFX Series switches being set for Q2/2019.

    In this online session we will cover a simple use case showing the difference between an imperative lead approach and the powerful gains achieved by using the declarative approach. By the end of the webinar, attendees will understand the CRUD (Create, Read, Update, Delete) pattern used and its enormous power for automation pipelines.

    Demonstrations will be provided on the webinar with links so attendees can repeat in their own time.

    Introduction to declarative automation
    Difference from imperative automation
    Introduction to Terraform
    Exploration of CRUD
    Observing a CI/CD pipeline with declarative
  • Test-Driven Network Automation Recorded: Jun 11 2019 39 mins
    Matthew Oswalt
    One of the key tenets of network reliability engineering (NRE) is the ability to test that your network is doing the thing it should be doing. There are numerous tools you can use to accomplish this, but these are spread over several levels of testing and verification tasks you may want to be conducting. In addition, the types of things you'll want to test will vary between the different areas of your network.

    In this webinar, we'll explore all of these aspects, and explore the kinds of tools and techniques you'll need to proactively guarantee that your network is providing the services your organization needs it to provide.
  • The Combination of Automated Detection with Automated Enforcement Recorded: Jun 11 2019 22 mins
    Dwann Hall
    Security automation is getting all the attention and focus, but this doesn’t mean the transition will occur overnight. Current efforts have focused on addressing the alert fatigue being experienced in the SOC – putting it simply they have too much data and not enough people. Advances in automation will sift through this barrage of data, detecting threats and in terms of security automation making life easier for the SOC. However, this optimisation of detection means that the constraint has moved from detection to enforcement.

    In this webinar we will look at this next stage of the security automation journey; combining automated detection with automated enforcement to improve the overall throughput and response of this workflow.
  • Network Automation: Network Automation is About Reliability Recorded: Jun 10 2019 32 mins
    Derick Winkworth
    During this first webinar Derick Winkworth will discuss the on-going transformation of network automation into Network Reliability Engineering.

    Automation, first and foremost, is about reliability. Learn how network engineers have an important role to play in the reliability engineering space, bringing their expertise to bear on the tools and practices used to make network operations more reliable.

    Learn how you can use automation today to help you be more effective as a network engineer
    Learn how to talk to other network engineers and operations managers about reliability engineering
  • Delivering an Application Led Network Recorded: Jun 10 2019 61 mins
    Steven Veneman, Matt Pooley, and Charlie Arteaga
    Enterprises are adopting cloud at an increasing pace, and with it their expectations from network services are changing. There has been a shift of focus away from bandwidth-based connectivity services. Instead, enterprises are looking for providers that can promise simplicity and flexibility in how they design, deploy, secure, monitor and manage networking services in a “multicloud” world. This means delivering secure, managed networking – not just in the WAN, but in the LAN and datacenter as well.


    In this session STL Partners will join Juniper and IBM to share our latest analysis on enterprise network trends. We will argue that the current appetite for SD-WAN is an opportunity for service providers to play a bigger role in helping enterprises to make the transition to multicloud and set out the pathways to making this happen.
  • What Nature Can Tell Us About IoT Security at Scale Recorded: Jun 4 2019 29 mins
    Ben Baker, Director, Strategic Marketing, Juniper Networks
    The scale and complexity of networks supporting IoT will quickly outstrip human capabilities to defend them. Devices can be elusive; they will hide behind gateways and roaming arrangements. The challenge is how to monitor and learn the behavior of the different classes of devices. IoT devices are like flocks of birds: they move in large groups in the same direction; when one deviates, usually the rest of the group deviates. We can use unsupervised machine learning techniques with a 5-step process to help solve the IoT Security problem. 1. Observe; 2. Cluster; 3. Detect Anomalies; 4. Root Cause Analysis; 5. Remediate.
  • Mist vs Meraki - Not All Clouds are Created Equal Recorded: May 27 2019 69 mins
    Wes Purvis and Gene Sawyer
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • Mist vs Meraki - Not All Clouds are Created Equal Recorded: May 22 2019 69 mins
    Wes Purvis and Gene Sawyer
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • Light Reading Webinar: Key Considerations for 5G Security Strategy Recorded: Apr 26 2019 62 mins
    Irene Zhang and Jim Hodges
    5G promises to be a game changer. It is not just about faster, but also about enabling a diverse new set of services and vertical use cases, including the support of IoT. Security is fundamental to the successful delivery of 5G networks and services. This heterogeneity of applications and scale of 5G communication will be challenging to balance the efficiency and accuracy of security management and policy control. In addition, the use of edge computing, virtualization, CUPS and network slicing creates new attack vectors that service providers need to consider. Join this webinar to learn: What’s new and different from 4G to 5G? What are the security implications from evolving to 5G and IoT? What needs to change? Here's what service providers need to consider when planning for 5G security strategy.
  • Dartmouth College's Network of the Future is Powered by AI Recorded: Apr 23 2019 60 mins
    Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth College
    When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

    In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

    Watch now, and learn how to:

    -Gain visibility into the Wi-Fi user experience
    -Quickly troubleshoot network problems with an AI-driven virtual assistant
    -Predict network problems before they arise
    -Implement personalized location services, such as wayfinding and proximity notifications
  • Juniper Connected Security Recorded: Apr 19 2019 21 mins
    Marco Martinez
    Organizations continue to evolve beyond just premises-based IT deployments and are leveraging multicloud to transform IT. As this transformation takes place, it increases the speed they can move, but also the complexity of their environment, heightening the need for fast and elastic protection from advanced threats. Organizations need automated, repeatable security across their entire network. Juniper Connected Security gives organizations the ability to safeguard users, applications and infrastructure by extending security to all points of connection across the network.
    Key validation points:
    -Safeguard users, applications and infrastructure against advanced threats
    -Automate security coverage from endpoints to edge and every cloud in between
    -Multicloud-ready with fast and elastic protection
    -See who and what is on your network and enforce policy across all connection points
    -End-to-end, top-to-bottom best-in-class secure networking
    -Open, since no one has a security green field and we must build on security solutions and infrastructure already in play
  • Harnessing Machine Learning and Automation Against Advanced Threats Recorded: Apr 16 2019 48 mins
    Frank Jas, Distinguished Engineer
    So, you've finally taken the mantra "Assume breach" to heart and deployed a security solution that detects the advanced threats that slip past your perimeter. Now what? In this session, we describe how advanced threat detection solutions impact incident response and how to deploy security automation to reduce that impact with an eye to time and cost savings relative to your unique SOC workflow.
  • Trends in Advanced Threat Detection & Vulnerability Management Recorded: Apr 16 2019 61 mins
    Wade Woolwine, Rapid7, Ajay Uggirala, Juniper Networks & O'Shea Bowens, Null Hat Security & Paul Crichard, BT Global Services
    As cyber attacks become increasingly common, it is vital for organisations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:

    - Trends in Advanced Threat Detection & Vulnerability Management
    - How to use analytics to fight against cyber attacks – patching, detection and response
    - What are the common mistakes made when it comes to Advanced Threat Detection implementation
    - Best practices and recommendations for improving your security posture

    Panel moderated by:
    Michele Drolet, CEO, Towerwall

    Panelists:
    Wade Woolwine, Director of Managed Services, Rapid7
    Ajay Uggirala, Sr. Manager, Product Marketing, Juniper Networks
    O'Shea Bowens, CEO & Founder, Null Hat Security
    Paul Crichard, Security CTO, BT Global Services
Juniper Networks
Juniper Networks simplifies the complexities of networking with products, solutions and services in the cloud era to transform the way we connect, work and live. We remove the traditional constraints of networking to enable our customers and partners to deliver automated, scalable, and secure networks that connect the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Dartmouth College's Network of the Future is Powered by AI
  • Live at: Apr 23 2019 3:00 pm
  • Presented by: Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth College
  • From:
Your email has been sent.
or close