All Demonstrations are on the 4th Floor
OESS 2.0 & Cloud Connect Portal
- Tuesday: 1:00-1:30 p.m.
- Wednesday: 1:00-1:30 p.m.
Presenter: AJ Ragusa, GlobalNOC, Matt Zekauskas, Internet2
A demonstration of an Open Exchange Software Suite (OESS) and the Internet2 Cloud Connect portal, including L3VPN with the three major cloud providers (AWS, Azure and GCP). Additionally, there will be discussion about Entities and ACLs in OESS to control your Internet2 resources.
NGI Prototype: Envisioning the Future Network
- Tuesday: 9:50-10:20 a.m.
- Wednesday: 3:30-4:00 p.m.
Presenter: Karl Newell, Internet2
We'll showcase features of the Next Generation Infrastructure (Segment Routing, EVPN, streaming telemetry), how those can be used to deliver existing and new services.
Considering Alternatives to BGPMon
- Wednesday: 9:50-10:20 a.m.
Presenter: Adair Thaxton, Internet2
An overview of the ARTEMIS BGP hijack monitoring tool, an alternative to BGPMon.
Spoofer - What it is and Why it's Important for MANRS
- Tuesday: 3:30-4:00 p.m.
Presenter: Adair Thaxton, Internet2
We in the Security Working Group decided that running Spoofer would be a goal for our participants this year. Preventing spoofed addresses from leaving your network is a requirement for MANRS, and Spoofer allows you to verify that you're doing it correct. demonstration of the Internet2 cloud intelligence solution that allows tracking, modeling and visualizing of Internet2 Network usage. Through reports and queries, Deepfield allows drilling down and looking at specific traffic or use case information.
Community Virtual and Augmented Reality Center
- Tuesday: 8:00 a.m.-4:00 p.m.
Virtual and augmented reality technologies are an important emerging space for the research and education community. It is difficult to describe the impact of these technologies without firsthand experience - seeing is believing. Visit the Community VR/AR Center to try virutal and augmented realities for yourself, including the Oculus Rift, HTC Vive, Microsoft Hololens, Magic Leap One, Oculus Quest, and more. These experiences are made possible through the efforts of the University of Cincinnati Center for Simulations & Virtual Environments Research and the Internet2 Metaverse Working Group.
Solution Previews of the InCommon Trusted Access Platform (InCommon Room)
- Tuesday & Wednesday: 9:50 a.m.- 10:20 a.m.
Software Demo: Identity and Access Lifecycle Management
See how the community-developed InCommon Trusted Access Platform can provide solutions for typical work flows, such as onboarding, providing access to resources, and changing or removing that access as a person's role changes. The demonstration will use a human resources system as an example, showing a streamlined approach to creating an identity and then providing and removing access through the use of groups and roles.
Speakers: Keith Hazelton, Internet2 and Ethan Kromhout, UNC Chapel Hill
- Tuesday: 1:00 p.m. - 1:30 p.m.
- Wednesday: 3:30 p.m. - 4:00 p.m.
Software Demo: Shibboleth Identity Provider Graphical User Interface
A long-awaited graphic user interface (GUI) for the Shibboleth Identity Provider software is now available for community testing. Stop by for a look at how the new GUI dashboard can simplify the management of your IdP, including integration with service providers. New to Shibboleth? See how the dashboard provides more flexibility and significantly reduces the need for training for you and others in your organization.
Speakers: Mike Grady, Unicon
- Tuesday: 3:30 p.m. - 4:00 p.m.
- Wednesday: 1:00 p.m. - 1:30 p.m.
Software Demo: Internet2 Community Guest System Solution
An increasing number of organizations are interested in a guest system - where constituent groups like alumni, pre-college students attending campus, and others can bring their own identities and still be provided access to appropriate resources. Internet2 had a similar need - providing community members access to collaboration resources. Using the InCommon Trusted Access Platform software components, Internet2 staff and community members developed a guest system that uses a registry, roles, and groups. See this system in action and how it might meet your needs.
Speakers: Chris Hubing, Internet2 and Paul Caskey, Internet2