Tail-f Systems owns the copyright to this document from February 13, 2015. The document discusses operational data providers. It provides copyright information but no other contextual details in the content provided.
Synopsis: An introduction for software engineers to working with the fundamental data types and structures used by the ConfD C APIs. The confd_value_t structure is introduced. How to determine how YANG data model types map to confd_value_t types and the appropriate macros for manipulating a confd_value_t. Value arrays and tagged value arrays are also introduced.
Module 7: Installation and Getting StartedTail-f Systems
Synopsis: This module introduces the basics of working with ConfD hands-on. Topics covered include installation of ConfD, a tour of what is where in the installation (docs, examples, etc.), setting environment variables for working with ConfD, a high-level tour of ConfD documentation, where to get started in the examples set, and building and running a first example.
Synopsis: Introduction to working with the NETCONF northbound interface in ConfD. Configuration of NETCONF using the confd.conf configuration file. NETCONF log and NETCONF trace log. Use of netconf-console for basic NETCONF testing.
Webinar: Applying REST to Network Management – An Implementor’s View Tail-f Systems
This webinar gives an introduction to the principles of REST, shows how it can be used to expose programmable APIs on network elements and provides some real world examples from our implementation.
The principles of Representational State Transfer (REST) have gained a strong following since they were described by Roy Fielding in his doctoral dissertation written in 2000. REST’s strength lies in its scalability and generality, allowing it to be used for many types of applications.
The industry has already seen a number of implementations of network management applications that use REST interfaces on the infrastructure management layer, notably OpenStack Quantum and the Sun Cloud API. As a vendor to the vendors, we’ve seen a significant increase in interest around having REST interfaces exposed directly on the network element, be they hardware based or virtual.
http://www.tail-f.com
Synopsis: A high-level technical introduction to ConfD. Introduction to ConfD architecture, data model driven paradigm, core engine features and northbound interfaces.
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Systems
This Webinar is on the OF-CONFIG specification and how it applies to large scale OpenFlow switch management.
If you are interested in the management of OpenFlow switches and want to find out more about available specifications and tools to build and deploy such solutions, this webinar provides a useful overview.
Webinar Agenda:
-Step-by-step walkthrough of the OpenFlow Management and Configuration Protocol
-Demonstration of how to use of the YANG language to define the structure and semantics of OpenFlow switch configurations
-The role of NETCONF in implementing OF-CONFIG
Advantages of this approach to network device manufacturers and network operations teams needing to quickly develop and deploy state-of-the-art management solutions
-Short overview of Tail-f Systems’ applicable products and tools
http://www.tail-f.com
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
Synopsis: An introduction for software engineers to working with the fundamental data types and structures used by the ConfD C APIs. The confd_value_t structure is introduced. How to determine how YANG data model types map to confd_value_t types and the appropriate macros for manipulating a confd_value_t. Value arrays and tagged value arrays are also introduced.
Module 7: Installation and Getting StartedTail-f Systems
Synopsis: This module introduces the basics of working with ConfD hands-on. Topics covered include installation of ConfD, a tour of what is where in the installation (docs, examples, etc.), setting environment variables for working with ConfD, a high-level tour of ConfD documentation, where to get started in the examples set, and building and running a first example.
Synopsis: Introduction to working with the NETCONF northbound interface in ConfD. Configuration of NETCONF using the confd.conf configuration file. NETCONF log and NETCONF trace log. Use of netconf-console for basic NETCONF testing.
Webinar: Applying REST to Network Management – An Implementor’s View Tail-f Systems
This webinar gives an introduction to the principles of REST, shows how it can be used to expose programmable APIs on network elements and provides some real world examples from our implementation.
The principles of Representational State Transfer (REST) have gained a strong following since they were described by Roy Fielding in his doctoral dissertation written in 2000. REST’s strength lies in its scalability and generality, allowing it to be used for many types of applications.
The industry has already seen a number of implementations of network management applications that use REST interfaces on the infrastructure management layer, notably OpenStack Quantum and the Sun Cloud API. As a vendor to the vendors, we’ve seen a significant increase in interest around having REST interfaces exposed directly on the network element, be they hardware based or virtual.
http://www.tail-f.com
Synopsis: A high-level technical introduction to ConfD. Introduction to ConfD architecture, data model driven paradigm, core engine features and northbound interfaces.
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Systems
This Webinar is on the OF-CONFIG specification and how it applies to large scale OpenFlow switch management.
If you are interested in the management of OpenFlow switches and want to find out more about available specifications and tools to build and deploy such solutions, this webinar provides a useful overview.
Webinar Agenda:
-Step-by-step walkthrough of the OpenFlow Management and Configuration Protocol
-Demonstration of how to use of the YANG language to define the structure and semantics of OpenFlow switch configurations
-The role of NETCONF in implementing OF-CONFIG
Advantages of this approach to network device manufacturers and network operations teams needing to quickly develop and deploy state-of-the-art management solutions
-Short overview of Tail-f Systems’ applicable products and tools
http://www.tail-f.com
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
Synopsis: A tutorial on the NETCONF protocol. The operations of the core NETCONF protocol are taught. This is followed by examination of traces of NETCONF sessions.
Summary slides of current Network OS status overview as of 16, Oct. 2015.
Comparison of two major Open Network OS: "OpenSwitch (ops)" and "Open Network Linux (ONL)".
» Read more at http://www.tail-f.com/education/what-is-netconf/
» Watch the Tail-f Why NETCONF video at
http://www.youtube.com/watch?v=H-BvpHd49-o&list=PLGSa_0wjZ-GgoReC1SNmgSHi2k4KUGPgo&index=1
NETCONF is a protocol defined by the IETF to "install, manipulate, and delete the configuration of network devices". NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
Synopsis: Part 1 of a tutorial on the YANG data modeling language. The basics of YANG are taught in this module. More advanced YANG statements are taught in Part 2.
Synopsis: Part 2 of a tutorial on the YANG data modeling language. The basics of YANG were taught in Part 1. More advanced YANG statements are taught in this module.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Synopsis: A tutorial on the NETCONF protocol. The operations of the core NETCONF protocol are taught. This is followed by examination of traces of NETCONF sessions.
Summary slides of current Network OS status overview as of 16, Oct. 2015.
Comparison of two major Open Network OS: "OpenSwitch (ops)" and "Open Network Linux (ONL)".
» Read more at http://www.tail-f.com/education/what-is-netconf/
» Watch the Tail-f Why NETCONF video at
http://www.youtube.com/watch?v=H-BvpHd49-o&list=PLGSa_0wjZ-GgoReC1SNmgSHi2k4KUGPgo&index=1
NETCONF is a protocol defined by the IETF to "install, manipulate, and delete the configuration of network devices". NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
Synopsis: Part 1 of a tutorial on the YANG data modeling language. The basics of YANG are taught in this module. More advanced YANG statements are taught in Part 2.
Synopsis: Part 2 of a tutorial on the YANG data modeling language. The basics of YANG were taught in Part 1. More advanced YANG statements are taught in this module.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.