SlideShare a Scribd company logo
1 of 49
Data-Driven	Network	Operations
APRICOT	2017
Avi	Freedman
avi at	kentik.com
Summary
It’s	hard	to	run	infrastructure!
… but	there’s	hope
What’s	needed:	Data-Driven	Network	Operations
How-to:	Get	the	data	(what	data)?
How-to:	Fuse	and	store	the	data
Use	cases:	Network	Nerds:	Planning,	peering,	DDoS,	perfomance
Use	cases:	Business	nerds:	Cost,	revenue,	security	posture
Take-aways:	Next	steps
2
SNAFU:
Life’s	hard
4
Tools, tools, everywhere…
But	all	the	views	are	disparate!
How	many	operational	tools+scripts do	you	run?
Active	Testing	(ping/traceroute) Flow	Tools
APM Logging
BI Metric	(App/SNMP)
BGP	Hijack	detection NPM
Config Management Policy	Analysis
Event	Correlation Routing	Analytics
Forensics Traffic	Engineering
Threat	Intelligence
And	how	many	instances	of	each?
5
With	all	those	tools,	can	you:
See	if	it’s	the	network,	or	the	application,	and	where?
See	the	whole	network	– customer,	peering,	WAN,	LAN,	DC?
Answer	ops	questions	around	planning,	peering,	security,	and	performance?
Let	other	tech	groups	understand	the	network’s	impact	(or	not)?
Give	biz	folks	the	answers	to	business	questions	around	revenue,	cost,	and	risk?
Automatically	detect	traffic	anomalies,	attacks,	and	shifts?
6
But	There’s	Hope…
The	network	is	key	to	delivering	revenue
Applications	generate	traffic…
But	networks	deliver	it!
So	why	is	the	network	view	left	out	of	cross-enterprise	visibility	stacks?
1) A	bit	of	a	chicken-and-the-egg	problem.
2) It’s	hard	to	get	some	network	concepts	without	being	hands-on.
3) General	lack	of	vendor	innovation	from	2003-2013.
4) Immaturity	of	backend	and	distributed	systems	methods.
8
Why	the	limitations	like…
• Not	scaling	to	handle	large	amounts	of	data	(space/IO/CPU	limited).
• Not	understanding	network	concepts	(classic	BI	tools).
• Limited	scope	(data	source,	functionality,	target	users).
• Typically	storing	only	aggregates	or	pre-filtered	data.
• Very	limited	fusing,	only	1	or	2	data	types	per	tool.
• Limited	dimensions	and	filtering	depth,	often	slow.
• Needing	lots	of	tuning	and	configuration.
9
Most	tools	are	pre-big	data	architectures!
But	with	a	more	modern	approach,	it’s	possible	to	get:
• Large	scale,	billions	of	records	per	hour,	no	aggregation,	complex	fusing.
• Distributed	micro-service	architecture.	Can	scale	very	“wide”.	++Hardware.
• Speed	with granularity.	Real-time	ingest	and	<	5s	queries.
• Big	challenge	is	adding	fusion,	network	savvy-ness	and	speed	of	back-ends.
• Modern	data	bus	(Kafka)	and	streaming	analytics	options	have	gone	from	0	
to	great	in	the	last	5	years.
• Whether	for	DIY,	or	from	a	new	wave	of	vendor	options.
10
And	people	are	getting	the	network’s	important!
In	net-centric	enterprises	like	service	providers	and	web	companies,
there	is	an	understanding	that	the	network	is	not	just	plumbing,	but
can	actually	see the	business.
And	with	API	partners,	customers,	and	cloud	back-ends	often	on	remote	
networks,	understanding	the	network	is	increasingly	important.
Tools	aren’t	there	yet	but	we’re	seeing	support	for	efforts	to	innovate	
internally	and	by	supporting	a	new	wave	of	vendors!
11
And	yes	- DIY	is	hard…
12
Required areas of expertise
(because every presentation needs a Vin diagram)
Distributed
systems
engineersNetwork
Engineers
SREs
Low-level
Network
developers
Resilience / Reliability
Geo-distributed ingest
Flow friendly data-store
BGP Daemon
Flow inspection & conversion
Network protocols hacking
Make all of the above
work reliably
Train all the other teams
on the involved network
protocols and their usage
Unicorn
But systems like this are no longer (as) exotic.
Ingest &
Fusion layer
Storage Layer Query
Layer
Each layer has separate and different scaling characteristics
Query engine
and UI
Query
interfaces
SQL
WWW
REST
data
sources
clients
SELECT flow
FROM router
WHERE …
>_
And	the	OSS	and	SaaS options	are	growing!
So	yes,	it’s	hard	to	find	instantly	qualified	tooling	folks,	but…
Distributed	system,	devops,	and	big	data	systems	and	skills	are	
becoming	more	wide-spread	– and	at	a	faster	rate	than	every	before.
And	recent	vendors	built	from	scratch	multi-tenant	open	SaaS and	
on-prem big	data	options.
14
What’s	Needed:
Data	Driven	
Network	Operations
What	is	Data-Driven	Network	Operations?
Getting	network	traffic	intelligence	(netops +	network-savvy	BI)	by…
Using	data	to	drive	your	technical	and	business	operations!
Most	content	companies	and	enterprises	are	data	and	analytics	driven.
Devops is	as	well	(logs,	APM,	metrics-at-scale).
But	the	network	world	has	some	catchup	to	do.
We	can	have	nice	things	too!
And	share	with	our	tech	peers	(systems/apps)	and	the	business	side?
16
Data-driven	operations	+	business	use	cases
• Network	Planning
• Peering	Analytics	and	Abuse
• Congestion	detection
• Is	it	the	network?
• Where	on	the	network?
• Proactive	alerting
• Distributed	DDoS	Detection
• What	Changed	Post	Deploy?
• Security	and	Breach	Detection
• Cost	Analytics
• Revenue	Identification	
(New	+	@	Risk)
• Enabling	Internal	Groups
17
Key	network	operator	requirements
18
Key	requirements	for	modern	Data-Driven	Network	Operations:
• No	data	aggregation	or	pre-filtering.
• Correlation	(fusing)	between	data	types.
• Full	resolution	searchable	and	stored	for	months.
• FAST.	Less	than	10s	for	results.		Cannot	wait	minutes	while	spelunking.
• Network-savvy	UIs	and	APIs	(understanding	routing	and	prefixes).
• Detect	anomalies.	Should	not	have	to	watch	graphs	manually.
• Data	and	alerts	available	across	the	company.
• “0”	to	usable	in	minutes	to	weeks,	not	months	to	years.
How	To:
Get	the	data.
Fuse	the	data.
Store	the	data.
Use	the	data.
Share	the	data.
How	To:
Get	the	Data
(What	Data?)
TCP stats data / app specific data
Where to find this data ?
Flow data
NetFlow, SFlow, IPFIX
SNMP, Streaming telemetry
Sys/Event logs
TACACS
&
Syslog
App
Server,
Logs,
Metrics
BGP, IGP Path info
NETWORK
+
+
+
=
Combinatorially
Useful!
+
Router
Router
PCAP
agent
+User tags, Threat Intel,
SDN Control, DNS, ping/trace
A	broader	view	of	“NetFlow”
You	can	ALSO	get	performance	data	from	the	infrastructure:
• Queue	Depth
• Retransmits	per	flow
• TCP	latency
• Application	Latency
From:
• Host	software	(nProbe)
• Sensors	/	Taps
• Webserver	logs	(Nginx)
• Cisco	AVC	supported	routers
22
How	To:
Fuse	the	Data
Fusing	data	for	richer	traffic	analytics
Flow	or	BGP	or	SNMP	or	DNS	or	logs	alone	are	not	enough.
This	becomes	much	richer	when	combined	with:
• Performance	and	layer	7	information
• BGP	attributes
• Geography
• Tags	(rack,	department,	customer…)
• Config changes	and	software	versions
• Threat	intelligence	and	known-bad	IPs
• Fusing	should	be	near	real-time,	performed	at	ingest	and	data	specific
24
DATA FUSION
Decoder
Modules
Mem
Table
sNetFlow v5
NetFlow v9
IPFIX
BGP RIB
Custom
Tags
SNMP
Poller
BGP
Daemons
Enrichment
DB
DATA FUSION
Geo ←→ IP
ASN ←→ IP
SFlow
ROUTER
TRAFFIC-SAVVY DATASTORE
Single flow
fused row
sent to storage
PCAP
PCAP
agent
proxy
Store	the	data:	Yes,	back-ends	are	still	tricky.
You	can’t	keep	enough	granularity	on	a	VM- or	relational-based	backend.
FOSS	big	data	has	limited	network-savviness and	no	support	for	query	rate-
limiting,	which	is	key	to	multi-tenancy,	and	query	fragment	caching,	which	is	
key	for	efficiency.
You	can	do	a	lot	with	ELK,	but	it’s	not	very	efficient	or	super	network-savvy	–
and	has	basically	no	multi-tenanted	security.
Column	store	systems	are	still	rapidly	developing.
26
Use	Cases:
For	Network	Nerds…
Use	case:	Traffic	debugging	and	inspection
Why	did	the	interface	just	double	its	traffic,	now	saturated?
Is	it	an	attack?		No,	it’s	a	mis-config!		No,	it’s	an	attack…
Where	is	the	traffic	leaving	my	network?		
Is	a	peer	sending	me	traffic	they	shouldn’t	be?	Are	my	peers	balanced	with	
me?
Did	a	content	provider	shift	their	traffic	path	to	me?
Are	other	networks	seeing	what	I’m	seeing? 28
Fusing	data	for	richer	traffic	analytics
Data	in	a	“lake”	is	not	useful!
A	modern	data-driven	network	operations	system	should	have:
• A	flexible	and	spelunk-able	UI
• Proactive	alerting	with	links	to	detailed	history	and	trends
• Dashboards	that	instantly	link	to	detailed	history	and	exploration
• Complete	API	availability	for	bi-directional	integration
29
Use	Case:	Traffic	debugging	and	inspection
30
Traffic	annotated	with	multiple	events
31
Anomaly	detection:	DDoS	detection	and	characteristics
32
Use	case:	Anomaly	detection	for	peering
Traffic	from	individual	top-20	ASN	over	transit	unusually	high.	Operator	
notified	at	red	line.
33
Traffic,	anomaly	detection	and	annotation
34
Use	case:	Network	planning
Flow-based	traffic	+	BGP	can	be	used	to	help	show:
• Path,	neighbor,	transit,	origin,	and	country	of	traffic.
• Strategic	peering	and	transit	changes	that	can	improve	perf and	costs.
• Potential	new	peers	and	locations	to	peer.
• Evaluate	the	potential	of	new	peering	exchanges	or	facilities.
• Transit	relationships	that	are	of	high	or	little	value.
• Understand	ROI	before	extending	backbone	links	or	capacity.
35
Use	Case:	Network	planning,	traffic	by	BGP	HOP
36
Use	case:	Network	security	analytics
Flow-based	traffic	+/- threat	intelligence	can	show:
• Compromised	servers,	desktops,	and	IoT devices.
• From	threat	intel and	anomaly	detection.
• To	help	your	own,	or	downstream/internal	customers.
• And	feed	DDoS response	if	there	are	local	sources/sinks.
• And	find	BCP38	violations	on-net	or	on	peers,	even	with
simple	“how	many	source	/8s”	heuristics.
37
Use	case:	Network	performance	analytics
Flow-based	traffic	+	BGP	+	network	performance	data	can	show:
• Whether	issues	are	in	the	application	or	network	layer	(+	where)
• And	where?
• And	in	a	way	expose-able	to	internal	dev +	app	operations
• And	to	pinpoint	performance	issues	by	peer	or	remote	AS	path
• Or	prefix
• Or	data	center
• Or	provably	not	in	the	network	J
38
Perf-enhanced flow: TCP latency / ASN
Perf-enhanced flow: TCP latency / Prefix
What	For?
For	Business	Nerds…
Use	case:	Customer	cost	analysis
Whether	an	enterprise	or	SP…
Customers	(external	or	internal)	cost	money.
Most	critical	for	SPs	(customer	packet-mile	cost)…
But	also	important	for	many	enterprise:
How	much	does	this	service	use	of	our	international	backbone)?
42
Use	case:	Security	posture	and	risk
The	same	analytics	that	can	power	operational	knowledge	and	fixes	can	inform	
the	business	about	the	risk	and	support	security	groups	as	they	assess	and	fix	
not	just	the	production but	also	the	corporate networks.
43
Use	case:	Revenue	enhancement	and	retention
Sometimes	not	discussed	in	polite	company,	but	great	traffic-based	analytics	
can	help	with	the	top	line	as	well	as	margin:
• Offering	high-margin	customers	lower	rates	to	attract	more	traffic.
• Identifying	large	2nd and	3rd hop	AS	sinks	or	sources	behind	peers,
to	convert	to	customers.
• Find	large	customers	that	look	small	(on-boarding/testing)	or	large
customers	starting	to	migrate	to	competitors.
• Create	service	revenue	around	security,	DDoS,	and	performance.
44
Summary
Summary
46
• It’s	not	just	“flow	tools”	any	more	(or	just	BGP	or	just	SNMP	or	…).
• Networks	can	produce	a	lot	of	(very	diverse)	data.
• You	can	capture	and	use	it	with	modern	streaming,	fusing,	and	storage	
components.
• Enterprises	are	looking	for	and	funding	turnkey	but	open	tools	that	
integrate	and	provide	cross-group	access.
• Vendors	are	starting	to	innovate.
• And	DIY	options	are	getting	better	(but	still	require	a	lot	of	training).
Take-Aways
Take-Aways
48
• You	deserve,	and	can	have,	nice	things!
• And	so	can	your	tech	and	business	peers.
• And	answer	business	as	well	as	tech	ops	questions.
• It’s	possible	(with	some	work)	to	see	not	just	traffic	flow	but	performance.
• There	are	a	new	wave	of	SaaS and	big	data-based	vendors	that	integrate.
• And	if	you	intend	to	DIY,	start	cross-training	and	hiring	now.
Questions?
(Happy	to	answer	offline	as	well...)
Avi	Freedman
email:	avi at	kentik.com
49

More Related Content

What's hot

Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017zapp0
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsDamon Small
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityJoel Cardella
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Skybox Security
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
Experiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data AccessExperiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data AccessPrecisely
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability ManagementVicky Ames
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachSridhar Karnam
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Dan Morrill
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability ManagementMarcelo Martins
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devicesBenjamin Biwer
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DevicePriyanka Aash
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseRahul Neel Mani
 

What's hot (20)

Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
Experiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data AccessExperiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data Access
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 

Viewers also liked

FreeRangeRouting - A new Quagga fork with more open development
FreeRangeRouting - A new Quagga fork with more open developmentFreeRangeRouting - A new Quagga fork with more open development
FreeRangeRouting - A new Quagga fork with more open developmentAPNIC
 
Apply SDN/NFV for MobiFone Network
Apply SDN/NFV for MobiFone NetworkApply SDN/NFV for MobiFone Network
Apply SDN/NFV for MobiFone NetworkAPNIC
 
Myanmar IP Data Network
Myanmar IP Data NetworkMyanmar IP Data Network
Myanmar IP Data NetworkAPNIC
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN DeploymentAPNIC
 
Unknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping PollersUnknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping PollersAPNIC
 
Policy SIG Report
Policy SIG ReportPolicy SIG Report
Policy SIG ReportAPNIC
 
End User DNS Measurement at APNIC
End User DNS Measurement at APNICEnd User DNS Measurement at APNIC
End User DNS Measurement at APNICAPNIC
 
APRICOT 2017 conference network
APRICOT 2017 conference networkAPRICOT 2017 conference network
APRICOT 2017 conference networkAPNIC
 
BGP Shutdown Communication
BGP Shutdown CommunicationBGP Shutdown Communication
BGP Shutdown CommunicationAPNIC
 
APNIC 43 Vote of Thanks
APNIC 43 Vote of ThanksAPNIC 43 Vote of Thanks
APNIC 43 Vote of ThanksAPNIC
 
IPv6 Readiness Measurement BoF Report
IPv6 Readiness Measurement BoF ReportIPv6 Readiness Measurement BoF Report
IPv6 Readiness Measurement BoF ReportAPNIC
 
DMARC and mailing list
DMARC and mailing listDMARC and mailing list
DMARC and mailing listAPNIC
 
Running a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root ZoneRunning a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root ZoneAPNIC
 
IPv6 Deployment Status in Bangladesh
IPv6 Deployment Status in BangladeshIPv6 Deployment Status in Bangladesh
IPv6 Deployment Status in BangladeshAPNIC
 
NAT64/DNS64 experiments, warnings and one useful tool
NAT64/DNS64 experiments, warnings and one useful toolNAT64/DNS64 experiments, warnings and one useful tool
NAT64/DNS64 experiments, warnings and one useful toolAPNIC
 
APIX Report
APIX ReportAPIX Report
APIX ReportAPNIC
 
IPv6 Deployment: Case of Sudan/SudREN
IPv6 Deployment: Case of Sudan/SudRENIPv6 Deployment: Case of Sudan/SudREN
IPv6 Deployment: Case of Sudan/SudRENAPNIC
 
APNIC 44 Update
APNIC 44 UpdateAPNIC 44 Update
APNIC 44 UpdateAPNIC
 
The trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route serversThe trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route serversAPNIC
 
Fukuoka University Public NTP Service Deployment Use case
Fukuoka University Public NTP Service Deployment Use caseFukuoka University Public NTP Service Deployment Use case
Fukuoka University Public NTP Service Deployment Use caseAPNIC
 

Viewers also liked (20)

FreeRangeRouting - A new Quagga fork with more open development
FreeRangeRouting - A new Quagga fork with more open developmentFreeRangeRouting - A new Quagga fork with more open development
FreeRangeRouting - A new Quagga fork with more open development
 
Apply SDN/NFV for MobiFone Network
Apply SDN/NFV for MobiFone NetworkApply SDN/NFV for MobiFone Network
Apply SDN/NFV for MobiFone Network
 
Myanmar IP Data Network
Myanmar IP Data NetworkMyanmar IP Data Network
Myanmar IP Data Network
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Unknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping PollersUnknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping Pollers
 
Policy SIG Report
Policy SIG ReportPolicy SIG Report
Policy SIG Report
 
End User DNS Measurement at APNIC
End User DNS Measurement at APNICEnd User DNS Measurement at APNIC
End User DNS Measurement at APNIC
 
APRICOT 2017 conference network
APRICOT 2017 conference networkAPRICOT 2017 conference network
APRICOT 2017 conference network
 
BGP Shutdown Communication
BGP Shutdown CommunicationBGP Shutdown Communication
BGP Shutdown Communication
 
APNIC 43 Vote of Thanks
APNIC 43 Vote of ThanksAPNIC 43 Vote of Thanks
APNIC 43 Vote of Thanks
 
IPv6 Readiness Measurement BoF Report
IPv6 Readiness Measurement BoF ReportIPv6 Readiness Measurement BoF Report
IPv6 Readiness Measurement BoF Report
 
DMARC and mailing list
DMARC and mailing listDMARC and mailing list
DMARC and mailing list
 
Running a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root ZoneRunning a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root Zone
 
IPv6 Deployment Status in Bangladesh
IPv6 Deployment Status in BangladeshIPv6 Deployment Status in Bangladesh
IPv6 Deployment Status in Bangladesh
 
NAT64/DNS64 experiments, warnings and one useful tool
NAT64/DNS64 experiments, warnings and one useful toolNAT64/DNS64 experiments, warnings and one useful tool
NAT64/DNS64 experiments, warnings and one useful tool
 
APIX Report
APIX ReportAPIX Report
APIX Report
 
IPv6 Deployment: Case of Sudan/SudREN
IPv6 Deployment: Case of Sudan/SudRENIPv6 Deployment: Case of Sudan/SudREN
IPv6 Deployment: Case of Sudan/SudREN
 
APNIC 44 Update
APNIC 44 UpdateAPNIC 44 Update
APNIC 44 Update
 
The trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route serversThe trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route servers
 
Fukuoka University Public NTP Service Deployment Use case
Fukuoka University Public NTP Service Deployment Use caseFukuoka University Public NTP Service Deployment Use case
Fukuoka University Public NTP Service Deployment Use case
 

Similar to The Age of Data-Driven Network Operations

Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Barry Greene
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and PatchingEmmanuel Udeagha B.
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowAlienVault
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Jorge Orchilles
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Islam Azeddine Mennouchi
 
Advanced malware analysis training session3 botnet analysis part2
Advanced malware analysis training session3 botnet analysis part2Advanced malware analysis training session3 botnet analysis part2
Advanced malware analysis training session3 botnet analysis part2Cysinfo Cyber Security Community
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringDevOps.com
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
 

Similar to The Age of Data-Driven Network Operations (20)

Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
encase enterprise
 encase enterprise  encase enterprise
encase enterprise
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to Know
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013
 
Advanced malware analysis training session3 botnet analysis part2
Advanced malware analysis training session3 botnet analysis part2Advanced malware analysis training session3 botnet analysis part2
Advanced malware analysis training session3 botnet analysis part2
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network Monitoring
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Regan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&akRegan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&ak
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 

More from APNIC

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAPNIC
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsAPNIC
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemAPNIC
 

More from APNIC (20)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & Development
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry System
 

Recently uploaded

Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 

Recently uploaded (20)

Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 

The Age of Data-Driven Network Operations