& cplSiteName &
Comments
You must login to participate in this chat. Please login.

I have heard it said that your data analyst can be your best friend or your worst enemy. This, from an analyst. LOL.

 

@Nick thanks for sticking around and answering our questions today, and it was wonderful having you present at Upskill U today, we always learn a lot from you!

@Listeners - have a wonderful weekend, thanks so much for tuning in today and posting your questions. We'll see you back here on Wednesday, April 19 for Building a Centralized Analytics Team w/Sarah Obermayer, AT&T.

Good question about analytics teams. Virtualization is going to make it increasingly easy to deploy network functions (firewalls, etc.) in an agile manner. So the ability to predict the effects of configuration changes will become increasingly important.

This requires an important combination of skillsets: domain knowledge about networking and security + machine learning/statistics/data science.

SDN is the "control" part of the control loop.  Predictive models can act as input to an SDN controller. It's very much along the lines of our discussion regarding MANO and how it relates to predictive analytics.

@Nick here's another Q - What about predictive models for SDN optimization (traffic performance)? 

@Nick  what are some of the top skillsets needed for analytics teams to thrive as the industry moves toward a virtualized ecosystem?

Have a great weekend Nick and Kelsey ==and Happy Holidays to all celebrating.

What about predictive models for SDN optimization (traffic performance)? 

 

Great session, thanks Nick, Kelsey and everyone.Have a nice weekend

Thanks it was a great discussion.

Thank you and happy holidays!

Thanks!  What traffic performance enhancement? 

 

Thanks, everyone!  This was great fun, as always.  Hope you all found it useful.

Great lecture! Glad to have to Nick back again!

 

@dfperson: If employment at will, then I would say there is always the fear on the part of the employee that termination can seem capricious. That would probably affect the employee-employer economic relationship in one way or another.

Very true JohnGordon that loss of confidence can result in loss of current business and loss of new customers.

With employee prediction, is there a fear that companies will jump the gun and just move to terminating an employee? #minorityreport

@Managing12642: Good point that we have to take into consideration the intangible of reputation loss, as well as the actual cost of an attack and the return on investment connected with creating mechanisms to prevent the attacks in the first place.

@johonGordon, yes mainly + creating value as the most critical of attacks is the reputation if a leakage occurs and breach of security, not only from outside...

Thanks.

Hardware and physical media faults seem to be low-hanging fruit for predictive analytics. What is the state of the research in this area?

@Managing 12642: Monetizing attacks is an interesting question--you mean estimating the cost of the attack, and the investment cost in preventing them?

Employee prediction is interesting-- it opens up so many privacy issues.

The monitors/guards have to be a few steps ahead of these bad hombrés.

Other and possible last question: Predictive analytics can also be "monetizing attacks" from a CAPEX-OPEX or only prevention attacks related?

Nearly time for Q&A, get your questions in now!

On slide 36: "Requires extensive logging (prohibitive)" I am guessing that collecting the data is less of a problem than analyzing it.

The camera vulnerability was used for Ddos around the holidays.

@danielcawry: "Forensics is interesting; I don't think we have enough of that today with existing tools." I hope hiring picks up in that area.

thanks for the response Nick about NFV-SDN maturity!

My hope is IoT providers take this stuff seriously; we've seen some manufacturers not do that already. 

not yet but they're heading in the right direction

Like the idea of isolation tech it an help eliminate vulnerabilites

LOL elang at "lots of room for interesting mistakes."  You have your finger on the pulse of it, indeed!

Not Yet. But are heading there

not yet but they're heading in the right direction

IoT is still so new; I think we're going to see some major breaches before these systems get hardened properly. 

No; not yet but they're heading in the right direction and there's lots of room for some interesting mistakes

I'm not sure I'd lump Red Hat and Oracle in the same sentence...let alone together in that context...but I get it.

not yet but they're heading in the right direction

Forensics is interesting; I don't think we have enough of that today with existing tools. 

Not yet. Too much data and securing all is considered costly.

Not yet but headed in the right direction

not yet but they're heading in the right direction

Not yet...but (of course, just as they try, the bad guys keep getting worse).

Why don't you use a "sandbox" to test those "what if" scenarios=

Poll answer: "No."  Just "No."  Almost nobody knows what they're doing.  They're too busy arguing about best practices if not all but ignoring security issues.

Heading in the right direction! But will take time!

 

 No; not yet but they're heading in the right direction

2nd poll question reply: not yet, but headed in right direction

Not yet but it appease that they are moving in the right direction.

 

As companies become increasingly interested in real-time business intelligence from IoT device data, are service providers doing enough to secure IoT app data on their networks? Possible responses are: No; not yet but they're heading in the right direction, or yes.

@danielcrwrey All of this predictive stuff (models, regression analysis, machine learning, etc.) are all AI. Combing through this volume of data needs AI.

How much could AI be used for predictive analytics? Or is that too far off to implement today?

Hi everyone! I'll be asking another poll question shortly and we're coming up on more Q&A so get your questions for Nick posted!

danielcawrey agreed I am sure it was unexpected but when there is so much at stake there is little room for error. Should have been thoroughly tested and staged before going live.

[email protected] hard to imagine they expected everything to fall like dominos but agree

This is always where problems arise - when you start changing parameters. 

danielcawrey very true and they should have had staging that identified the issue before it went live and took everyone down. They are too big for rookie mistakes.

Advanced analytics tools are needed to track cybersecurity threats across virtualized clouds

When you get to slide 30, could you spend an extra few moments explaining it? I could use the help with that one.

That Amazon issue was awful - too centralized!

Very iteresting appraoch in analyzing domain names is it fully automated?

Thanks for responding to the poll everyone, we'll get to the results at the end of the lecture and hear what Nick's thoughts are on this poll!

I am concerned about the maturity of SDN-NFV and how CSP´s and other key players are managing those coming attacks. What are your recommendations in terms of software vendors such as RedHat, Oracle,etc.. and tools around to predict DDOS or other attacks?

c.      Advanced analytics tools are needed to track cybersecurity threats across virtualized clouds

b.      The introduction of new management and orchestration (MANO) systems demands a greater role for integrated analytics across legacy and new support tools    

What is the biggest impact of SDN and NFV on big data analytics?

 

d.      Not much of a change at all, current analytics work just fine

 

 

a.      They drive a greater requirement for distributed analytics capabilities

 

 

c.      Advanced analytics tools are needed to track cybersecurity threats across virtualized clouds

b.      The introduction of new management and orchestration (MANO) systems demands a greater role for integrated analytics across legacy and new support tools    

1st listener poll reply: c.      Advanced analytics tools are needed to track cybersecurity threats across virtualized clouds

I don't feel strongly about this, but for the poll question, I'll go with A.

c.      Advanced analytics tools are needed to track cybersecurity threats across virtualized clouds

c.      Advanced analytics tools are needed to track cybersecurity threats across virtualized clouds

@Nick - Thanks!  :-) 

This stuff could really save IT some money if it works. 

c.      Advanced analytics tools are needed to track cybersecurity threats across virtualized clouds

@dfperson: It can also source of the attacks.

John i have noticed my spam filter is still pretty conservative and lots of spam gets through at differnt times other times none.

My answer: b.      The introduction of new management and orchestration (MANO) systems demands a greater role for integrated analytics across legacy and new support tools 

Network Configuration Automatation

dfperson, going to talk about more applications in the second half

What is the biggest impact of SDN and NFV on big data analytics?

a.      They drive a greater requirement for distributed analytics capabilities

b.      The introduction of new management and orchestration (MANO) systems demands a greater role for integrated analytics across legacy and new support tools    

c.      Advanced analytics tools are needed to track cybersecurity threats across virtualized clouds

d.      Not much of a change at all, current analytics work just fine

I thought headlamps are only for very narrowly qualified people? I got several buttons, but no headlamps or gift certificates.

This is like the weapon against botnets. I like it. 

What are the other applications for predictive analytics (beyond "predicting" attacks)? 

Headlamps? What were those for?

Predictions vs. forecasts. A good example is the 2016 Presidential election.

Hi everyone, if you're waiting on a headlamp, please email [email protected]

I guess spam bots overtook human interactions in online communication a while ago

@tbates I'll check on that today

I never got a headlamp from last years sessions either!

 

Registered access went south. Finally logged in

I never got a headlamp from last years sessions. :(

 

@[email protected]: I am guessing most spam filters operate at the end-user's computer, no? There is tagging earlier, but do users trust internet providers enough to let them delete supposed spam before delivery?

It's predictive in thinking ahead what might happen. 

All of this predictions is based on what had happened in the past, so not really predictive is it? Could the attack come from a legitimate domain?

Predictive analytics are interesting. Was just reading a Gartner report that preventive security like this is going to be a big market growth sector for IT security the next few years. 

Wow 70-90 percent is spam-- what happened to the spam filters!

@GAJ I'm in Chrome, IE should work too, you may need to try another browser

Anything sweet works for me for a dessert.

I have refreshed, exited and restarted, and nothing.

@GAJ it's started, try refreshing your browser

On slide 40, you mention that there are no good solutions yet for the problem of predicting "when an employee is a 'flight risk' or otherwise a risk for leaking data." Could you speculate on the likely most fruitful avenues to address this problem?

Hi, Has the bradcast started? I am not able to hear anything.

When does the program / audio start?

I'm going to need to make a list of these dessert suggestions :)

Mille-foilles or eclair

 

good afternoon all! nice to see a busy room

@John good one, sounds like Nick will get to that shortly

I apologize if I missed this from the slides, but what kind of unusual behavior in DNS lookups indicates that the activity is connected with impending spam distribution?

@deeh I'll follow-up with you after the course about headlamps

Good one @gnean, I'll ask Nick that shortly

@customer71167 pumpkin crumble...that sounds interesting. I'll have to look up a recipe

What sort of lead time can you get, when you "predict" a potential attack is about to happen?

 

@tony a little too windy out!

oh, favorite DESSERT, not ice cream.  I'm with the person who said "steak"!  Almost every time I go to a steakhouse and they ask what we want for dessert, I'm inclined to say, "Another filet."

Mint choc chip (WHITE. NOT GREEN.) is great and used to be my favorite ice cream.  Now I'm more about regular chocolate and certain combinations therewith (e.g., Neapolitan, chocolate peanut butter).

All of them, depending on time and situation

Not really a dessert person

hot fudge sundaes with peanuts

First test question: favorite dessert is cherries with yogurt.

Mint chocolate chip ice cream!

Hi everyone!  Hope everyone is excited for the talk today!

@kelsey Windy enough for you today?

 

@director yes, i'll check right after the show

Did anyone ever get a t-shirt, headlamp etc? I never received anything

 

Good morning/afternoon everyone!  Remember to turn up your volume on the computers.  At the top of the hour an audio player will pop up on your screen.  If you don't see it, try to press F5 to refresh your screen. Go ahead and download the slides from the link in the "Special Educational Materials" section located above the live chat. Be sure to post your questions, comments and thoughts on the message boards!

Hi Kelsey. I have attained "Summa cum laude" level. Though my id is appearing in "Honor roll", but I did not get my certificate.

Can you please check.

@managing audio comes on at the top of the hour, we aren't live just yet

Thanks Nick. can someone share the video or audio conference please?

@hdrew you can download the slides and follow along, and advance them on your end. Nick will let us know which slides he's on.

Hey, guys.  It's good to be back!

This quote from the presentation sounds like a great key for prevention: "Early lookup patternsfor a newly registered malicious domain differ significantly from the patterns for a legitimate domain"

We'll be going live at 1pm at which time there will be audio.

(Actually, there should be audio by computer, I'm told.)

There is audio, as well. There is a dial-in number, I believe.

Is there any audio or only chat?

I like the idea of looking for clues before or shortly after the spam attack, such as DNS query patterns.

reading the presentation, what about the visual webinar?

 

Good afternoon,ready to attend this interesting event

The subject appears to require a Watson-class of analysis. A mighty task, it seems. Or am I wrong?

thanks for the handout :)

 

Hi Everyone!  Ready for today's session!

The handout notes are great, packed with information, fourty-four pages' worth. Thank you.

Going live in about 25 minutes, start thinking about and posting any questions you have for Nick!

Nice and sunny here in London

Beautiful weather in Central Florida, although it's supposed to get chilly this weekend - as in 40s and 50s F.

Greetings and salutations everyone!

How's everyone doing this afternoon? It is chilly here in NC!

This looks like a great, much-needed Upskill U class. Can't wait.

Good morning @cindycindy, glad you'll be joining us today!

Hi everyone! Nick's slides are already available for download from the "Special Educational Materials" section located directly above the live chat window. Feel free to go ahead and take a look!

Looking forward to the lecture. Thanks!

Hope all y'all made it through that weather. C U in Class tomorrow. 

Yay! Upskill is back! Can't wait to hear this lecture with my favorite Upskill professor, Nick.

@elang4 do you have a link to the article to share? Thanks!

Looking forward to join this event.

He wrote an interesting paper on SDN 'The Road to SDN: An Intellectual History of Programmable Networks'. I found it looking up his publications (at Princeton) and because I was interested in SDN NFV based 'active networks'.

Best regards to all, ready to learn more

Including Adaptive Complexity Analysis for NFVs ??

Hi everyone!  Looking forward to the lecture next week.  Feel free to chat here with early questions or sub-topic requests.

Greetings and salutations everyone!

Hi @youngsmile8, @gliptak and @georgiacougar0 - great to see you all on the chat and glad you'll be joining us for this session! Any early questions for Nick?

Thanks for the session! Looking forward to it.

Can't wait to kick off our spring curriculum with Nick Feamster! While you wait for this live course, feel free to post a few questions here and tune in to on-demand sessions with Nick: Virtualization: Network Design & InfrastructureBig Data Analytics & IoTSecurity: The Plusses and Minuses of Open Source Software. Enjoy!



Featured Video
Upcoming Live Events
December 3-5, 2019, Vienna, Austria
December 3, 2019, New York, New York
March 16-18, 2020, Embassy Suites, Denver, Colorado
May 18-20, 2020, Irving Convention Center, Dallas, TX
All Upcoming Live Events
Partner Perspectives - content from our sponsors
How China's 5G Launch Will Gear Up the Global 5G Industry
By Daisy Zhu, Head of Marketing Operations, Huawei Wireless Network
5G Business Case Revisited
By Hayim Porat, CTO, ECI
All Partner Perspectives