Demystifying Machine Learning
|
|
- Jayson Patrick
- 5 years ago
- Views:
Transcription
1
2 Demystifying Machine Learning Dmitry Figol, WW Enterprise Sales Systems Engineer - CTHRST-1002
3 Agenda Machine Learning examples What is Machine Learning Types of Machine Learning Machine Learning in Networking CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 3
4 CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 4
5 CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 5
6 source: theguardian 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
7 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
8 digitaltrends.com 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
9 Google recaptcha CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 9
10 More examples YouTube, Spotify, Amazon recommender systems Speech recognition: Siri, Google Home, Alexa IBM Watson Google ranking results Facebook s facial recognition Many more CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 10
11 What is Machine Learning Machine learning is a collection of algorithms to make computers learn from and make decisions and predictions based on data CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 11
12 ML is not a silver bullet Dirty, missing data Not enough data Hard to convert unstructured data to mathematical values Hard to find a good model Do results make sense? Is it bug or expected result? Incorrect model? Data scientists are needed CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 12
13 All models are wrong but some are useful George Box, 1978 CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 13
14 Data in Machine Learning It is all about data Data should be cleaned Bad data leads to bad results Big data is required to get good results CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 14
15 Types of Machine Learning
16 Types of Machine Learning Supervised Learning Unsupervised Learning Reinforcement Learning Deep Learning CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 16
17 Supervised Learning Solves classification and regression problems based on labeled training data Classification: assign groups to input data based on previous data Regression: predicts real values to input data based on previous data CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 17
18 Classification example CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 18
19 Google recaptcha behind the scenes Uses Machine Learning to identify if your behavior is human If the behavior is suspicious, it shows a 3x3 grid of images (for example, street signs) Some of them Google knows are street signs Some of them Google thinks are street signs Some of them Google knows are not street signs Your choice helps to label images for Google self-driving cars CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 19
20 Data in Supervised learning Each data entry has features (x 1, x 2,.., x n ) and a label y Features represent different data characteristics, a label outcome/result Training data set contains records where a label is known Data is fed into the algorithm and the model is computed Model represents correlation of features to a label Machine can now predict labels for new feature values CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 20
21 Regression example A big number of network engineers filled in a survey with questions about their skills, experience, number of employees in their company, region and salary Skills, years of experience, information about company, region are features Salary is a label A model describing correlation of features to a label is found based on the survey data Now we can predict the salary for a person who didn t take a survey CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 21
22 Linear Regression The simplest supervised learning algorithm Linear relation between features and labels Intuition: find a model so that an error between all training labels and predicted labels is minimal Salary Salary vs experience Experience CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 22
23 Unsupervised Machine Learning Solves clustering and association problems based on unlabeled training data Clustering: discovering grouping in the data Association: finding rules about data CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 23
24 Reinforcement Learning Based on exploring the world Rewards for actions are known Start with random actions, record rewards with every action Build a policy by preferring actions that lead to higher rewards Continue improving the policy with every experience Examples: both AlphaGo and OpenAI played with themselves thousands of times until they learned strategies that are close to perfect in complex games CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 24
25 Deep Learning State of the art in Machine Learning Mostly for supervised learning Uses neural networks (the first application: to model brain neurons) More complex Requires more data Requires more time to train CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 25
26 Deep Learning applications Speech and image recognition Natural language processing Machine translation (DeepL) Self-driving cars Many more CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 26
27 Machine Learning in Networking
28 The Network. Intuitive. Constantly learning, adapting and protecting. DNA Center Policy Automation Analytics L E A R N I N G Informed by Context Visibility into traffic and threat patterns Who, What, When, Where, How Powered by Intent I N T E N T Translate Business Intent to Network Policy Automate the management and provisioning millions of devices instantly C O N T E X T Intent-based Network Infrastructure S E C U R I T Y CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 29
29 Encrypted Traffic Analytics (ETA) Known malware traffic Known benign traffic Extract observable features in the data Employ machine learning techniques to build detectors Known malware sessions detected in encrypted traffic with 99% accuracy Identifying encrypted malware traffic with contextual flow data AISec 16 Blake Anderson, David McGrew (Cisco Fellow) CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 30
30 How it works Initial Data Packet Make the most of the unencrypted fields Sequence of Packet Lengths and Times Identify the content type through the size and timing of packets Threat Intelligence Map Who s who of the Internet s dark side Data exfiltration Self-Signed certificate C2 message Broad behavioral information about the servers on the Internet. CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 31
31 Malware detection with ETA Initial Data Packet Cloud-based machine learning Threat Intelligence Map Sequence of Packet Lengths and Times All three elements reinforce each other inside the analytics engine using them. CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 32
32 DNA Center Analytics Distributed Stream Processing Continuous processing, aggregating, correlating and analyzing data in motion Distributed analytics pipeline runtime and programming model Real-time or near real-time Analytics Operations: Time Machine Learning Time Series Series Analysis Analysis Complex Complex Event Event Processing Processing Machine Learning CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 33
33 Get Started with Machine Learning Machine Learning by Andrew Ng online course Coursera/Stanford Reinforcement Learning course by David Silver CS231n Convolutional Neural Networks for Visual Recognition - Stanford CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 34
34 Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How Find this session in the Cisco Events App Click Join the Discussion Install Webex Teams or go directly to the team space Enter messages/questions in the team space Webex Teams will be moderated by the speaker until June 18, cs.co/ciscolivebot#cthrst-1002 CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 35
35 Complete your online session evaluation Give us your feedback to be entered into a Daily Survey Drawing. Complete your session surveys through the Cisco Live mobile app or on Don t forget: Cisco Live sessions will be available for viewing on demand after the event at CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 36
36 Continue your education Demos in the Cisco campus Walk-in self-paced labs Meet the engineer 1:1 meetings Related sessions CTHRST Cisco and/or its affiliates. All rights reserved. Cisco Public 37
37 Thank you
38
Machine Learning with Python
DEVNET-2163 Machine Learning with Python Dmitry Figol, SE WW Enterprise Sales @dmfigol Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationHidden Figures: Securing what you cannot see
Hidden Figures: Securing what you cannot see TK Keanini, Distinguished Engineer Stealthwatch, Advanced Threat Solutions CID-0006 Hello My Name is TK Keanini Keanini (Pronounced Kay-Ah-Nee-Nee) TK: The
More informationNXOS in the Real World Using NX-API REST
NXOS in the Real World Using NX-API REST Adrian Iliesiu Corporate Development Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationGet Hands On With DNA Center APIs for Managing Intent
DEVNET-3620 Get Hands On With DNA Center APIs for Managing Intent Adam Radford Distinguished Systems Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationAPIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks
APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks Saurav Prasad Technical Marketing Engineer CTHNMS-1002 Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after
More informationRouting Underlay and NFV Automation with DNA Center
BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationHands On Exploration of NETCONF and YANG
Hands On Exploration of NETCONF and YANG Bryan Byrne, CCIE 25607 (R/S) Technical Solutions Architect Enterprise Networks @bryan25607 Agenda Introduction Module 1 YANG Data Modeling Module 2 Introduction
More informationBGP in the Enterprise for Fun and (fake) Profit: A Hands-On Lab
BGP in the Enterprise for Fun and (fake) Profit: A Hands-On Lab Michael Kowal, Principal Systems Engineer, @ciscomk Dash Thompson, Systems Engineer, @dash_thompson Abel Ramirez, Systems Engineer, @ramirezabel21
More informationIs your IT Infrastructure Ready for Machine Learning & Artificial Intelligence?
BRKPAR-2955 Is your IT Infrastructure Ready for Machine Learning & Artificial Intelligence? Hoseb Dermanilian, EMEA BDM, NetApp Arnaud BASSALER, CSE, Cisco Systems Agenda Introduction AI, Machine Learning
More informationAn Introduction to Monitoring Encrypted Network Traffic with "Joy"
An Introduction to Monitoring Encrypted Network Traffic with "Joy" Philip Perricone (SE) Bill Hudson (TL) Blake Anderson (TL) David McGrew (Fellow) Cisco Spark How Questions? Use Cisco Spark to communicate
More informationDeep Neural Networks for Hackers: Methods, Applications, and Open Source Tools. Joshua Saxe, Chief Data Scientist, Sophos
Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools Joshua Saxe, Chief Data Scientist, Sophos About your speaker Your speaker s team @ Sophos You Security Data Science Machine
More informationCisco Spark Messaging APIs - Integration Platforms as a Service Real World Use-Cases
DEVNET-2023 Cisco Spark Messaging APIs - Integration Platforms as a Service Real World Use-Cases David Staudt DevNet Developer Evangelist / Principal Engineer Cisco Spark How Questions? Use Cisco Spark
More informationMagical Chatbots with Cisco Spark and IBM Watson
DEVNET-2321 Magical Chatbots with Cisco Spark and IBM Watson Lauren Ramgattie, Technical Marketing Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationIntroduction to Cisco IoT Tools for Developers IoT 101
Introduction to Cisco IoT Tools for Developers IoT 101 Mike Maas, Technical Evangelist, IoT, DevNet Angela Yu, Technical Leader DEVNET-1068 Agenda The Cisco IoT System Distributing IoT Applications Developer
More informationPSOACI Tetration Overview. Mike Herbert
Tetration Overview Mike Herbert Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion
More informationHow to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption
How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist April 2018 New
More informationIntroducing Cisco Network Assurance Engine
BRKACI-2403 Introducing Cisco Network Assurance Engine Intent Based Networking for Data Centers Sundar Iyer, Distinguished Engineer Head Cisco Network Assurance Engine Team Dhruv Jain, Director of Product
More informationDevOps CICD for VNF a NetOps Approach
DevOps CICD for VNF a NetOps Approach Renato Fichmann Senior Solutions Architect Cisco Advanced Services Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1.
More informationIntroduction Challenges with using ML Guidelines for using ML Conclusions
Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed
More informationEnterprise Recording and Live Streaming Architecture with VBrick
Enterprise Recording and Live Streaming Architecture with VBrick Terry French Technical Manager - International - VBrick Systems Inc BRKCOL-2111 Agenda Enterprise Video Overview VBrick Core Components
More informationCisco Enterprise Agreement
PSODGT-1076 Cisco Enterprise Agreement John Marshall, Global Director: Cisco Enterprise Agreement strategy Vinay Nichani, WW Software Sales Cisco Spark How Questions? Use Cisco Spark to communicate with
More informationDNA Automation Services Offerings
DNA Automation Services Offerings Jamie Owen, Solutions Architect, Cisco Advanced Services Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationCisco UCS Director and ACI Advanced Deployment Lab
Cisco UCS Director and ACI Advanced Deployment Lab Michael Zimmerman, TME Vishal Mehta, TME Agenda Introduction Cisco UCS Director ACI Integration and Key Concepts Cisco UCS Director Application Container
More informationCisco Container Platform
Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click
More informationBenefits of SDN Modeling and Analytics tool for complex Service Provider Network
Benefits of SDN Modeling and Analytics tool for complex Service Provider Network George Backer, Senior Director, Charter Communications Manish Jani, Senior Architect, Cisco Systems BRKNMS-1010 BRKNMS-1010
More informationCisco Firepower NGIPS Tuning and Best Practices
Cisco Firepower NGIPS Tuning and Best Practices John Wise, Security Instructor High Touch Delivery, Cisco Learning Services CTHCRT-2000 Cisco Spark How Questions? Use Cisco Spark to communicate with the
More informationDevNet Workshop-Hands-on with CloudCenter and Jenkins
DevNet Workshop-Hands-on with CloudCenter and Jenkins Tuan Nguyen, Technical Marketing Engineer, CPSG Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find
More informationUsing Workload Automation to Optimize Hybrid Cloud Estates
BRKPAR-4121 Using Workload Automation to Optimize Hybrid Cloud Estates Ben Nye Using Workload Automation to Optimize Hybrid Cloud Estates Ben Nye CEO Key Drivers Digital Transformation Proliferation of
More informationEncrypted Traffic Analytics
Encrypted Traffic Analytics Introduction The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using
More informationAn Introduction to Developing for Cisco Kinetic
An Introduction to Developing for Cisco Kinetic Krishna Chengavalli Technical Marketing Engineer IoT Software Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationNext generation branch with SD-WAN and NFV
Next generation branch with SD-WAN and NFV Kiran Ghodgaonkar, Senior Manager, Enterprise Marketing Mani Ganeson, Senior Product Manager PSOCRS-2004 @ghodgaonkar Cisco Spark How Questions? Use Cisco Spark
More informationTetration Hands-on Lab from Deployment to Operations Support
LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate
More informationIpswitch: The New way of Network Monitoring and how to provide managed services to its customers
BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda
More informationCisco SD-Access Hands-on Lab
LTRCRS-2810 Cisco SD-Access Hands-on Lab Larissa Overbey - Technical Marketing Engineer, Cisco Derek Huckaby - Technical Marketing Engineer, Cisco https://cisco.box.com/v/ltrcrs-2810-bcn2018 Password:
More informationDeploying Cloud-Agnostic Applications with Cisco CloudCenter
LTRCLD-2303 Deploying Cloud-Agnostic Applications with Cisco CloudCenter Zack Kielich CloudCenter Product Manager Vince Motto Sr. Technical Leader Andrew Horrigan Consulting Engineer Matt Tarkington Consulting
More informationOrange: Cisco & Orange: a human touch for a digital experience
BRKPAR-4667 Orange: Cisco & Orange: a human touch for a digital experience Pierre louis Biaggi, SVP Head of Connectivity Business Unit, Orange Business Services Eric Masseboeuf, Collaboration Head of Business
More informationGit, Atom, virtualenv, oh my! Learn about dev tools to live by!
BRKDEV-2633 Git, Atom, virtualenv, oh my! Learn about dev tools to live by! Ashley Roach, Principal Engineer Evangelist Agenda Introduction Why are developer tools useful? What s in the toolbelt? Tool
More informationSIEM Product Comparison
SIEM Product Comparison SIEM Technology Space SIEM market analysis of the last 3 years suggest: Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013) Only products with technology
More informationMachine Learning in Digital Security
Machine Learning in Digital Security White Paper www.seqrite.com Table of Contents 1. Introduction 2. Introduction to Machine Learning 3. Machine Learning usage in Security Industry 4. Clustering Samples
More informationCisco Tetration Analytics
Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:
More informationCloudCenter for Developers
DEVNET-1198 CloudCenter for Developers Conor Murphy, Systems Engineer Data Centre Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationDNA Assurance. Predict Network Failures Before They Become Issues
PSOEWN-4360 DNA Assurance Predict Network Failures Before They Become Issues Damodar Banodkar, Product Manager, Enterprise Group Bill Rubino, Product Marketing, Enterprise Group Manuel Ortiz, Senior Wireless
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationVirtualized Video Processing: Video Infrastructure Transformation Yoav Schreiber, Product Marketing Manager, Service Provider Video BRKSPV-1112
Toonces LOOK OUT! Virtualized Video Processing: Video Infrastructure Transformation Yoav Schreiber, Product Marketing Manager, Service Provider Video BRKSPV-1112 Agenda Video Industry Evolution and Challenges
More informationCS 4510/9010 Applied Machine Learning. Deep Learning. Paula Matuszek Fall copyright Paula Matuszek 2016
CS 4510/9010 Applied Machine Learning 1 Deep Learning Paula Matuszek Fall 2016 Beyond Simple Neural Nets 2 In the last few ideas we have seen some surprisingly rapid progress in some areas of AI Image
More information2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco ACI App Center Fabrice Servais, Software Engineer, Data Center Networking, Cisco Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationModel-Driven Telemetry and Analytics
Model-Driven Telemetry and Analytics Steven Barth & Cristina Precup Software Systems Engineers Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationResilient WAN and Security for Distributed Networks with Cisco Meraki MX
Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Daghan Altas, Director of Product Management BRKSEC-2900 Agenda Problem Cisco CNG Live network creation demo (45m) Product Brief
More informationAlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment
BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug
More informationManaging The Digital Network Workforce Transformation
ITM-1018 Managing The Digital Network Workforce Transformation Carine Bongaerts IT Manager Network Services Agenda Introduction New Skills and Mindset Change Operating Model Change - DevOps Delivery Model
More informationYour API Toolbelt Tools and techniques for testing, monitoring, and troubleshooting REST API requests
DEVNET-1631 Your API Toolbelt Tools and techniques for testing, monitoring, and troubleshooting REST API requests Adam Kalsey, Spark Developer Relations Cisco Spark How Questions? Use Cisco Spark to communicate
More informationInternet of Things Field Network Director
Internet of Things Field Network Director Prithvi Manduva, IoT Escalation Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationCisco DNA Center and Italtel Netwrapper Evolution: Network and Applications come together
BRKPAR-4980 Cisco DNA Center and Italtel Netwrapper Evolution: Network and Applications come together Stefano Boero Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the
More informationBattle between hackers and machine learning. Alexey Lukatsky Cybersecurity Business Consultant April 03, 2019
Battle between hackers and machine learning Alexey Lukatsky Cybersecurity Business Consultant April 03, 2019 Google: facts and numbers Real Cisco Big Data for Security Training Set Why is Machine Learning
More informationPouya Kousha Fall 2018 CSE 5194 Prof. DK Panda
Pouya Kousha Fall 2018 CSE 5194 Prof. DK Panda 1 Observe novel applicability of DL techniques in Big Data Analytics. Applications of DL techniques for common Big Data Analytics problems. Semantic indexing
More informationImperva Incapsula Website Security
Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as
More informationDecision models for the Digital Economy
Decision Camp 2017 Birbeck, University of London Decision models for the Digital Economy Vijay Bandekar InteliOps Inc. Agenda Problem Statement Proposed Solution Case studies and results Key takeaways
More informationPSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco
PSOACI-4592 Why ACI: An overview and a customer (BBVA) perspective TJ Bijlsma César Martinez Joaquin Crespo Technology Officer DC EMEAR Cisco Lead Architect BBVA Lead Architect BBVA Cisco Spark How Questions?
More informationTRex Realistic Traffic Generator
DEVNET-1120 TRex Realistic Traffic Generator Hanoch Haim, Principal Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco
More informationINTRODUCTION TO ARTIFICIAL INTELLIGENCE
v=1 v= 1 v= 1 v= 1 v= 1 v=1 optima 2) 3) 5) 6) 7) 8) 9) 12) 11) 13) INTRDUCTIN T ARTIFICIAL INTELLIGENCE DATA15001 EPISDE 7: MACHINE LEARNING TDAY S MENU 1. WHY MACHINE LEARNING? 2. KINDS F ML 3. NEAREST
More informationWhy data science is the new frontier in software development
Why data science is the new frontier in software development And why every developer should care Jeff Prosise jeffpro@wintellect.com @jprosise Assertion #1 Being a programmer is like being the god of your
More informationSourcefire Network Security Analytics: Finding the Needle in the Haystack
Sourcefire Network Security Analytics: Finding the Needle in the Haystack Mark Pretty Consulting Systems Engineer #clmel Agenda Introduction The Sourcefire Solution Real-time Analytics On-Demand Analytics
More informationAutomating Cisco Spark with Cloud Integration Cisco DevNet Webinar Series
Automating Cisco Spark with Cloud Integration Cisco DevNet Webinar Series Speaker: David Staudt DevNet Developer Evangelist, Principal Engineer Hostess: Kara Sullivan Cisco Networking Academy 18 April
More informationConnected Mobile Experiences (CMX) Aligning Use Cases and Technology
Connected Mobile Experiences (CMX) Aligning Use Cases and Technology Jagdish Girimaji, Manager, Product Marketing Daryl Coon, Product Manager, Product and Solutions Marketing PSOEWN-3246 Agenda Introduction
More informationCisco Spark. Questions? Use Cisco Spark to communicate with the speaker after the session. How
Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly
More informationBuild a system health check for Db2 using IBM Machine Learning for z/os
Build a system health check for Db2 using IBM Machine Learning for z/os Jonathan Sloan Senior Analytics Architect, IBM Analytics Agenda A brief machine learning overview The Db2 ITOA model solutions template
More informationApplied Advanced Network Telemetry: ETA and Beyond
BRKSEC-2809 Applied Advanced Network Telemetry: ETA and Beyond TK Keanini, Principal Engineer Blake Anderson, Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationPnP Deep Dive Hands-on with APIC-EM and Prime Infrastructure
LTRNMS-2007 PnP Deep Dive Hands-on with APIC-EM and Prime Infrastructure Thomas Gerneth, Julian Mueller,Tobias Huelsdau Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after
More informationAn Aflac Case Study: Moving a Security Program from Defense to Offense
SESSION ID: CXO-W11 An Aflac Case Study: Moving a Security Program from Defense to Offense Tim Callahan SVP & Global CISO Aflac Threat Landscape Selected losses > 30,000 records (updated 10/15/16) Security
More informationndpi & Machine Learning A future concrete idea
ndpi & Machine Learning A future concrete idea 1. Conjunction between DPI & ML 2. Introduction to Tensorflow and ConvNet project Traffic classification approaches Category Classification methodology Attribute(s)
More informationMachine Learning in WAN Research
Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network
More informationThink & Work like a Data Scientist with SQL 2016 & R DR. SUBRAMANI PARAMASIVAM (MANI)
Think & Work like a Data Scientist with SQL 2016 & R DR. SUBRAMANI PARAMASIVAM (MANI) About the Speaker Dr. SubraMANI Paramasivam PhD., MCT, MCSE, MCITP, MCP, MCTS, MCSA CEO, Principal Consultant & Trainer
More informationPrivacy Requirements Scoping
DEVNET-2016 Privacy Requirements Scoping Jonathan Fox, Director, Privacy Engineering, Cisco Lisa Bobbitt, Privacy Architect, Cisco Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationThe S in IoT is for Security Owning all the Things
Raja Mukerji Co-Founder, ExtraHop Networks @rajamukerji The S in IoT is for Security Owning all the Things Why Now? Topics of Discussion Why should you care about the Internet of Things? What challenges
More informationGoogle GSuite Intro Demo of GSuite and GCP integration
Google GSuite Intro Demo of GSuite and GCP integration May 2017 Sara Djelassi - Sales Steve Mansfield - PSO 7 Cloud products with 1 billion users ML is core to differentiating Google services Search Search
More informationMachine Learning in WAN Research
Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network
More informationAMP for Endpoints & Threat Grid
AMP for Endpoints & Threat Grid Response & Prevention Dean De Beer & Eric Hulse BRKSEC-2029 AMP Threat Grid Malware Analysis Engines & Techniques A little background Malware Analysis & Threat Intelligence
More informationSelf Programming Networks
Self Programming Networks Is it possible for to Learn the control planes of networks and applications? Operators specify what they want, and the system learns how to deliver CAN WE LEARN THE CONTROL PLANE
More informationDEVNET Introduction to Git. Ashley Roach Principal Engineer Evangelist
DEVNET-1080 Introduction to Git Ashley Roach Principal Engineer Evangelist Twitter: @aroach Email: asroach@cisco.com Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the
More informationHands-On with IoT Standards & Protocols
DEVNET-3623 Hands-On with IoT Standards & Protocols Casey Bleeker, Developer Evangelist @geekbleek Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationThe Transformation of Media & Broadcast Video Production to a Professional Media Network
The Transformation of Media & Broadcast Video Production to a Professional Media Network Subha Dhesikan, Principal Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after
More informationSimplifying Collaboration Deployments with Prime Collaboration
Simplifying Collaboration Deployments with Prime Collaboration Jose Gregorio Linero Welcker, Technical Solutions Architect Latam MCO CCIE Collaboration # 24857 Cisco Spark How Questions? Use Cisco Spark
More informationMACHINE LEARNING Example: Google search
MACHINE LEARNING Lauri Ilison, PhD Data Scientist 20.11.2014 Example: Google search 1 27.11.14 Facebook: 350 million photo uploads every day The dream is to build full knowledge of the world and know everything
More informationCisco SD-Access Building the Routed Underlay
Cisco SD-Access Building the Routed Underlay Rahul Kachalia Sr. Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationCloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN
BRKCRS-2113 Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN Sumanth Kakaraparthi Product Leader SD-WAN Manan Shah Director Of Product Management Cisco Spark How Questions? Use Cisco Spark
More informationPopular SIEM vs aisiem
Popular SIEM vs aisiem You cannot flip a page in any Cybersecurity magazine, or scroll through security blogging sites without a mention of Next Gen SIEM. You can understand why traditional SIEM vendors
More informationExperiments with Tensor Flow
Experiments with Tensor Flow 06.07.2017 Roman Weber (Geschäftsführer) Richard Schmid (Senior Consultant) A Smart Home? 2 WEBGATE WELTWEIT WebGate USA Boston WebGate Support Center Brno, Tschechische Republik
More informationCustomer s journey into the private cloud with Cisco Enterprise Cloud Suite
Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Peter Charpentier, Senior Solution Architect, Cisco AS Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationAI for Everyone. Ian Massingham Chief Evangelist
AI for Everyone Ian Massingham Chief Evangelist (EMEA) @IanMmmm ianm@amazon.com Artificial Intelligence & Deep Learning At Amazon Thousands Of Employees Across The Company Focused on AI Discovery & Search
More informationTransforming the Network for the Digital Business
Transforming the Network for the Digital Business Driven by Software Defined Platforms Hugo Padilla Prad Enterprise Networks Digital Acceleration Team CCIE Emeritus #12444 Cisco Forum Kiev, November 14
More informationUnderstanding HTTPS to Decrypt it
Understanding HTTPS to Decrypt it James Everett Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join
More informationSpark SDK Video - Overview and Coding Demo
DEVNET-2026 Spark SDK Video - Overview and Coding Demo Olivier Proffit - Sr. Product Manager David Staudt DevNet Developer Evangelist Cisco Spark How Questions? Use Cisco Spark to communicate with the
More informationIntelligent WAN Sumanth Kakaraparthi Principal Product Manager PSOCRS-2010
Intelligent WAN Sumanth Kakaraparthi Principal Product Manager PSOCRS-2010 Agenda Challenges Architectures Cisco IWAN Proof Points Challenges Application landscape is changing Applications Are Moving to
More information2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
2018 Cisco and/or its affiliates. All rights reserved. Cisco Public PSODCN-1030 Intent Based Systems Deliver Automation Dave Malik Cisco Fellow and Chief Architect Advanced Services @dmalik2 2018 Cisco
More informationIncident Response Agility: Leverage the Past and Present into the Future
SESSION ID: SPO1-W03 Incident Response Agility: Leverage the Past and Present into the Future Torry Campbell CTO, Endpoint and Management Technologies Intel Security The Reality we Face Reconnaissance
More informationCatalyst 9K High Availability Lab
LTRCRS-2090 Catalyst 9K High Availability Lab Minhaj Uddin Technical Marketing Engineering Sai Zeya Technical Marketing Engineering Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationTISA Methodology Threat Intelligence Scoring and Analysis
TISA Methodology Threat Intelligence Scoring and Analysis Contents Introduction 2 Defining the Problem 2 The Use of Machine Learning for Intelligence Analysis 3 TISA Text Analysis and Feature Extraction
More informationData Science Training
Data Science Training R, Predictive Modeling, Machine Learning, Python, Bigdata & Spark 9886760678 Introduction: This is a comprehensive course which builds on the knowledge and experience a business analyst
More informationGet Started with Cisco DNA Center
About Cisco DNA Center, on page 1 Log In, on page 1 Default Home Page, on page 2 Use Search, on page 4 Where to Start, on page 5 About Cisco DNA Center Cisco Digital Network Architecture (DNA) offers centralized,
More information