Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...Joel W. King
This talk provides insight into how network security will evolve in the next five years; a zero-trust model enabled thorough telemetry streaming, analytics, and policy publishing, using automation to implement policy through APIs in cloud managed networks.
Meraki Virtual Hackathon: app for Splunk PhantomJoel W. King
The Meraki app for Splunk Phantom uses the Meraki dashboard API to locate end-user devices within one or more organizations, networks / devices, and to bind a configuration template to a specified network.
Enabling policy migration in the Data Center with AnsibleJoel W. King
This document discusses using Ansible to automate the migration of network policies from Cisco Tetration Analytics to a new Application Centric Infrastructure (ACI) fabric at World Wide Technology (WWT). Tetration provides visibility into application communication and generates network policies that can be extracted as variables for Ansible playbooks. This allows Ansible to programmatically configure the new ACI fabric with the migrated policies rather than manually creating them in the ACI GUI.
Using Tetration for application security and policy enforcement in multi-vend...Joel W. King
Network engineers increasingly must view the network as one big software system, which streams telemetry data from software sensors and network devices to an analytics engine.
To implement the whitelist-based segmentation and zero-trust policy model generated from the data analysis, automation is a requirement when dealing with tens of thousands of workloads and complex rules.
This session examines how Cisco Tetration Analytics combined with automation can be used to implement a zero-trust policy model on multi-vendor network fabrics, firewalls and application delivery controllers.
Starting with the API documentation, use Postman to query the APIs, then generate python code from
Postman, to showing how to python class and methods can be developed and tested in an IDE, and how to
incorporate that into a simple Ansible module which is used to create a VLAN programmatically.
This document discusses an enterprise automation strategy that puts individuals first. It proposes using Ansible playbooks and roles to define network configuration workflows, with credentials, playbooks, roles, and variables stored in version control like GitHub. The strategy advocates having one source of truth for configuration data in MongoDB or YAML/CSV files to programmatically define tasks, infrastructure requirements, and desired states for automating processes across ACI, F5, and other systems to achieve business outcomes.
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...Joel W. King
This talk provides insight into how network security will evolve in the next five years; a zero-trust model enabled thorough telemetry streaming, analytics, and policy publishing, using automation to implement policy through APIs in cloud managed networks.
Meraki Virtual Hackathon: app for Splunk PhantomJoel W. King
The Meraki app for Splunk Phantom uses the Meraki dashboard API to locate end-user devices within one or more organizations, networks / devices, and to bind a configuration template to a specified network.
Enabling policy migration in the Data Center with AnsibleJoel W. King
This document discusses using Ansible to automate the migration of network policies from Cisco Tetration Analytics to a new Application Centric Infrastructure (ACI) fabric at World Wide Technology (WWT). Tetration provides visibility into application communication and generates network policies that can be extracted as variables for Ansible playbooks. This allows Ansible to programmatically configure the new ACI fabric with the migrated policies rather than manually creating them in the ACI GUI.
Using Tetration for application security and policy enforcement in multi-vend...Joel W. King
Network engineers increasingly must view the network as one big software system, which streams telemetry data from software sensors and network devices to an analytics engine.
To implement the whitelist-based segmentation and zero-trust policy model generated from the data analysis, automation is a requirement when dealing with tens of thousands of workloads and complex rules.
This session examines how Cisco Tetration Analytics combined with automation can be used to implement a zero-trust policy model on multi-vendor network fabrics, firewalls and application delivery controllers.
Starting with the API documentation, use Postman to query the APIs, then generate python code from
Postman, to showing how to python class and methods can be developed and tested in an IDE, and how to
incorporate that into a simple Ansible module which is used to create a VLAN programmatically.
This document discusses an enterprise automation strategy that puts individuals first. It proposes using Ansible playbooks and roles to define network configuration workflows, with credentials, playbooks, roles, and variables stored in version control like GitHub. The strategy advocates having one source of truth for configuration data in MongoDB or YAML/CSV files to programmatically define tasks, infrastructure requirements, and desired states for automating processes across ACI, F5, and other systems to achieve business outcomes.
Are you ready for Microsoft Azure Sphere?Mirco Vanini
Azure Sphere is Microsoft's solution for highly securing IoT devices. It includes Azure Sphere certified chips, the Azure Sphere operating system, and the Azure Sphere Security Service. Together, these provide devices with 10 years of ongoing security updates directly from Microsoft. Azure Sphere aims to empower organizations to securely connect devices and build new IoT solutions with built-in security through its end-to-end platform. The current Azure Sphere development kit uses the MT3620 chip and provides tools to simplify and streamline IoT development.
This document provides an overview of Azure Sphere, a new solution from Microsoft for creating highly secured, connected microcontroller (MCU) devices. It discusses the opportunity and risks of IoT, introduces the seven properties of highly secured devices, and describes the key components of Azure Sphere including the secured MCU, secured operating system, and secured cloud services. It also covers the Azure Sphere developer tools and SDK, partner ecosystem, and provides a recap of the overall solution.
Azure Sphere is a new solution from Microsoft that provides highly secured, connected microcontroller units (MCUs). It consists of specialized MCU chips secured by Microsoft technology, a secured operating system, and cloud security services. The solution aims to address security issues that have affected IoTs by implementing seven key properties for security, including hardware root of trust, small trusted computing base, and failure reporting. It offers long-term security updates through 2028. Microsoft is working with partners to implement Azure Sphere's security technology into their chips to help manufacturers create secure, connected devices.
The document provides an overview of Azure Sphere, a new solution from Microsoft for creating highly secured, connected microcontroller (MCU) devices. Azure Sphere includes secured MCUs with built-in Microsoft security technology, a secured operating system, and security provided by Microsoft's cloud services. It allows manufacturers to more easily create IoT devices that are protected against common security vulnerabilities and threats.
Protect Kubernetes Environments with Cisco Stealthwatch CloudRobb Boyd
Jeff Moncrief discusses how Stealthwatch Cloud provides visibility, threat identification, and network compliance for Kubernetes environments. Stealthwatch is deployed as a POD application on each node to create network telemetry of all POD to POD traffic and report it to Stealthwatch Cloud, giving complete visibility into traffic in the Kubernetes cluster. The solution deploys as a Pod and integrates with the node-level network layer to provide visibility, baselining, and anomaly detection into container and pod communications.
Cybersecurity is important in any software solution. It’s even more important in the Internet of Things. This session takes you through building and prototyping secure, Internet to Things solutions using Azure Sphere; the Linux-based, secured, connected, crossover microcontroller unit (MCU) from Microsoft. We’ll look at securing Azure Sphere devices, writing and deploying code, and communicating with Azure IoT Hub. You’ll leave this session better prepared to build more highly secured IoT solutions using Microsoft Azure.
Testing your PowerShell code with Pester - Florin LoghiadeITCamp
As Infrastructure as Code is growing more in popularity, system administrators and devs started writing more and more sophisticated systems code and scripts.
Testing code is something that devs have been doing this for a long time while system administrators just started adopting the idea. With the growing popularity of PowerShell, more and more system administrators and devs began to write PowerShell code for provisioning and configuring infrastructure either on-premises or in the cloud, but the biggest problem was that there was no useful framework to test that code when a breaking change occurred.
This is the concept of “I ran it, and it worked,” did it now?
Enter Pester.
Pester is a unit testing framework for PowerShell. It provides a few simple-to-use keywords that let you create tests for your scripts. Pester implements a test drive to isolate your test files, and it can replace almost any command in PowerShell with your implementation. This makes it an excellent framework for both Black-box and White-box testing.
In this presentation, you will learn what Pester is, how you can use pester as your daily driver when you’re writing scripts and how you can use Pester to make your life better when change happens.
Cisco Connect Halifax 2018 Application agility and programmability with cis...Cisco Canada
This document discusses Cisco's Application Centric Infrastructure (ACI) architecture. It provides an overview of Cisco's data center strategy, use cases for ACI including multicloud, security, analytics and automation. It then details the Cisco Nexus platforms that support ACI software including the 9348GC-FXP leaf switch. The document outlines benefits of ACI such as policy-driven operations, visibility and security capabilities. It also discusses ACI integration with orchestration platforms and containers.
Finding a scalable open-source IoT framework that reliably and securely connects your devices to the cloud while fitting your business needs, not dictating them, turns out to be a little more challenging than it first looks.
For a business or professional service, an IoT system needs to be able to offer four things
1) Scalability
Be able to scale the solution in a manner that doesn't have operating costs/bandwidth run out of control.
2) Be secure
Operate in a secure environment that prevents the system losing date or being hi-jacked.
3) Use open-standards throughout
Be based on open-source standards to avoid proprietary lock-in and allow the business to control its own destiny, contribute, collaborate, partner or quickly and easily find help in the community, if required.
4) Manage & Inter-operate
The framework must allow that allow remote day-to-day device management and interoperability with other sensors & systems
Find out more about how the Creator IoT Framework meets these challenges
This document discusses improving meeting experiences. It describes challenges with current meeting tools such as difficult scheduling, joining, and content sharing. It then introduces Cisco's single meeting engine and innovations to provide a simplified, video-first experience across devices. These include easy scheduling from any device, big join buttons, and seeing who is talking. The document also presents Cisco Spark and room devices that optimize meetings in all spaces with features like in-room controls and wireless content sharing. It concludes by encouraging readers to enhance their meeting experience through Cisco tools and services.
View IT operations as a flow of data (Sources of Truth) thru work-cells (automation processes) to deliver value to the customer.
There should be only one source of truth for every piece of configuration data.
Device configurations are poor source of truth.
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
The document discusses securing the Internet of Things. It begins by describing common constraints of IoT devices like limited RAM, flash, and CPU capabilities. It then summarizes lessons learned from real-world attacks on IoT systems, including limited software update mechanisms, missing key management, inappropriate access control, lack of communication security, and vulnerability to physical attacks. The document advocates following security best practices like integrating software updates, using modern OS concepts, automated key management, and considering physical attacks in threat analyses. It also describes ARM's contributions to improving IoT security through its mbed platform, libraries, and involvement in standards organizations.
Using Cisco pxGrid for Security Platform Integration: a deep diveCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. This session will cover: Functional and architectural basics of Cisco Platform Exchange Grid (pxGrid), the new publish/subscribe/query contextual information exchange framework for creating integration between DevNet Zone partner platforms and Cisco security products; Integration use-cases such as utilizing pxGrid for executing threat response actions on the network and using identity, endpoint device and user access privilege context to enhance our DevNet Zone partners analytics, forensics and reporting; First-hand developer perspective from DevNet Zone partner ID/IP who used pxGrid to integrate Ping Identity and Cisco Identity Services Engine.
This document provides an overview of blockchain technology from the perspectives of technology, business, and user experience. It explores key questions about distributed vs centralized ledgers, how blockchains work, how they are maintained, and how blockchain may impact businesses. The document discusses how blockchain hashes transactions into an immutable chain, preventing tampering. It provides examples of how blockchain could track the lifecycle of assets like cars and music to build trust and transparency across industries.
FIWARE Global Summit - FIWARE Implementation of IDS Reference Architecture Co...FIWARE
FIWARE components can be used to implement the core components of an Industrial Data Space (IDS), including the context broker and connectors. The FIWARE context broker and NGSI interfaces allow context information to be published, queried, and subscribed to, and can form the basis for communication between IDS connectors. Both organizations aim to have their specifications and architectures remain compatible so that a valid open source implementation of the IDS architecture can be built using FIWARE generic enablers.
This document provides an overview of CodeIgniter, a PHP framework. It discusses CodeIgniter's architecture including MVC structure, controllers, models and views. It also covers CodeIgniter's core features like routing, libraries, helpers and security features. Comparisons are made between CodeIgniter and other PHP frameworks like CakePHP and Zend. A demo of CodeIgniter is planned.
Are you ready for Microsoft Azure Sphere?Mirco Vanini
Azure Sphere is Microsoft's solution for highly securing IoT devices. It includes Azure Sphere certified chips, the Azure Sphere operating system, and the Azure Sphere Security Service. Together, these provide devices with 10 years of ongoing security updates directly from Microsoft. Azure Sphere aims to empower organizations to securely connect devices and build new IoT solutions with built-in security through its end-to-end platform. The current Azure Sphere development kit uses the MT3620 chip and provides tools to simplify and streamline IoT development.
This document provides an overview of Azure Sphere, a new solution from Microsoft for creating highly secured, connected microcontroller (MCU) devices. It discusses the opportunity and risks of IoT, introduces the seven properties of highly secured devices, and describes the key components of Azure Sphere including the secured MCU, secured operating system, and secured cloud services. It also covers the Azure Sphere developer tools and SDK, partner ecosystem, and provides a recap of the overall solution.
Azure Sphere is a new solution from Microsoft that provides highly secured, connected microcontroller units (MCUs). It consists of specialized MCU chips secured by Microsoft technology, a secured operating system, and cloud security services. The solution aims to address security issues that have affected IoTs by implementing seven key properties for security, including hardware root of trust, small trusted computing base, and failure reporting. It offers long-term security updates through 2028. Microsoft is working with partners to implement Azure Sphere's security technology into their chips to help manufacturers create secure, connected devices.
The document provides an overview of Azure Sphere, a new solution from Microsoft for creating highly secured, connected microcontroller (MCU) devices. Azure Sphere includes secured MCUs with built-in Microsoft security technology, a secured operating system, and security provided by Microsoft's cloud services. It allows manufacturers to more easily create IoT devices that are protected against common security vulnerabilities and threats.
Protect Kubernetes Environments with Cisco Stealthwatch CloudRobb Boyd
Jeff Moncrief discusses how Stealthwatch Cloud provides visibility, threat identification, and network compliance for Kubernetes environments. Stealthwatch is deployed as a POD application on each node to create network telemetry of all POD to POD traffic and report it to Stealthwatch Cloud, giving complete visibility into traffic in the Kubernetes cluster. The solution deploys as a Pod and integrates with the node-level network layer to provide visibility, baselining, and anomaly detection into container and pod communications.
Cybersecurity is important in any software solution. It’s even more important in the Internet of Things. This session takes you through building and prototyping secure, Internet to Things solutions using Azure Sphere; the Linux-based, secured, connected, crossover microcontroller unit (MCU) from Microsoft. We’ll look at securing Azure Sphere devices, writing and deploying code, and communicating with Azure IoT Hub. You’ll leave this session better prepared to build more highly secured IoT solutions using Microsoft Azure.
Testing your PowerShell code with Pester - Florin LoghiadeITCamp
As Infrastructure as Code is growing more in popularity, system administrators and devs started writing more and more sophisticated systems code and scripts.
Testing code is something that devs have been doing this for a long time while system administrators just started adopting the idea. With the growing popularity of PowerShell, more and more system administrators and devs began to write PowerShell code for provisioning and configuring infrastructure either on-premises or in the cloud, but the biggest problem was that there was no useful framework to test that code when a breaking change occurred.
This is the concept of “I ran it, and it worked,” did it now?
Enter Pester.
Pester is a unit testing framework for PowerShell. It provides a few simple-to-use keywords that let you create tests for your scripts. Pester implements a test drive to isolate your test files, and it can replace almost any command in PowerShell with your implementation. This makes it an excellent framework for both Black-box and White-box testing.
In this presentation, you will learn what Pester is, how you can use pester as your daily driver when you’re writing scripts and how you can use Pester to make your life better when change happens.
Cisco Connect Halifax 2018 Application agility and programmability with cis...Cisco Canada
This document discusses Cisco's Application Centric Infrastructure (ACI) architecture. It provides an overview of Cisco's data center strategy, use cases for ACI including multicloud, security, analytics and automation. It then details the Cisco Nexus platforms that support ACI software including the 9348GC-FXP leaf switch. The document outlines benefits of ACI such as policy-driven operations, visibility and security capabilities. It also discusses ACI integration with orchestration platforms and containers.
Finding a scalable open-source IoT framework that reliably and securely connects your devices to the cloud while fitting your business needs, not dictating them, turns out to be a little more challenging than it first looks.
For a business or professional service, an IoT system needs to be able to offer four things
1) Scalability
Be able to scale the solution in a manner that doesn't have operating costs/bandwidth run out of control.
2) Be secure
Operate in a secure environment that prevents the system losing date or being hi-jacked.
3) Use open-standards throughout
Be based on open-source standards to avoid proprietary lock-in and allow the business to control its own destiny, contribute, collaborate, partner or quickly and easily find help in the community, if required.
4) Manage & Inter-operate
The framework must allow that allow remote day-to-day device management and interoperability with other sensors & systems
Find out more about how the Creator IoT Framework meets these challenges
This document discusses improving meeting experiences. It describes challenges with current meeting tools such as difficult scheduling, joining, and content sharing. It then introduces Cisco's single meeting engine and innovations to provide a simplified, video-first experience across devices. These include easy scheduling from any device, big join buttons, and seeing who is talking. The document also presents Cisco Spark and room devices that optimize meetings in all spaces with features like in-room controls and wireless content sharing. It concludes by encouraging readers to enhance their meeting experience through Cisco tools and services.
View IT operations as a flow of data (Sources of Truth) thru work-cells (automation processes) to deliver value to the customer.
There should be only one source of truth for every piece of configuration data.
Device configurations are poor source of truth.
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
The document discusses securing the Internet of Things. It begins by describing common constraints of IoT devices like limited RAM, flash, and CPU capabilities. It then summarizes lessons learned from real-world attacks on IoT systems, including limited software update mechanisms, missing key management, inappropriate access control, lack of communication security, and vulnerability to physical attacks. The document advocates following security best practices like integrating software updates, using modern OS concepts, automated key management, and considering physical attacks in threat analyses. It also describes ARM's contributions to improving IoT security through its mbed platform, libraries, and involvement in standards organizations.
Using Cisco pxGrid for Security Platform Integration: a deep diveCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. This session will cover: Functional and architectural basics of Cisco Platform Exchange Grid (pxGrid), the new publish/subscribe/query contextual information exchange framework for creating integration between DevNet Zone partner platforms and Cisco security products; Integration use-cases such as utilizing pxGrid for executing threat response actions on the network and using identity, endpoint device and user access privilege context to enhance our DevNet Zone partners analytics, forensics and reporting; First-hand developer perspective from DevNet Zone partner ID/IP who used pxGrid to integrate Ping Identity and Cisco Identity Services Engine.
This document provides an overview of blockchain technology from the perspectives of technology, business, and user experience. It explores key questions about distributed vs centralized ledgers, how blockchains work, how they are maintained, and how blockchain may impact businesses. The document discusses how blockchain hashes transactions into an immutable chain, preventing tampering. It provides examples of how blockchain could track the lifecycle of assets like cars and music to build trust and transparency across industries.
FIWARE Global Summit - FIWARE Implementation of IDS Reference Architecture Co...FIWARE
FIWARE components can be used to implement the core components of an Industrial Data Space (IDS), including the context broker and connectors. The FIWARE context broker and NGSI interfaces allow context information to be published, queried, and subscribed to, and can form the basis for communication between IDS connectors. Both organizations aim to have their specifications and architectures remain compatible so that a valid open source implementation of the IDS architecture can be built using FIWARE generic enablers.
This document provides an overview of CodeIgniter, a PHP framework. It discusses CodeIgniter's architecture including MVC structure, controllers, models and views. It also covers CodeIgniter's core features like routing, libraries, helpers and security features. Comparisons are made between CodeIgniter and other PHP frameworks like CakePHP and Zend. A demo of CodeIgniter is planned.
Content Strategy and Developer Engagement for DevPortalsAxway
Slides from Write the Docs Ottawa Meet Up at Shopify HQ in Canada, June 24, 2019
We’ll walk through 5 scenarios and concrete ways of reaching a developer community for frictionless and increased engagement.
What is the Secure Supply Chain and the Current State of the PHP Ecosystemsparkfabrik
In this talk I’ll present the current state of the software supply chain, the big global recent events (SolarWinds, log4shell, codecov, packagist) and the state of the PHP and Drupal ecosystem, the threats and the mitigations that can be applied using tools like Sigstore, Syft, and Grype for digital signatures, SBOM generation, and automatic vulnerability scanning and how to use them for real-world projects to gain unprecedented levels of knowledge of your digital artifacts.
There will be also a demo of the mentioned tools in action to implement a secure supply chain pipeline for your Drupal projects.
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...sparkfabrik
This document discusses the secure software supply chain and current state of the PHP ecosystem. It begins with introductions and defines a software supply chain as a network involved in creating and delivering a product to consumers. It then discusses threats in modern software supply chains like dependencies and demonstrates building a software bill of materials (SBOM) to analyze dependencies. It also covers recent supply chain attacks on PHP infrastructure and tools like Composer and PEAR. Finally, it recommends mitigations like using signed container images to verify integrity and provenance and generating SBOMs to detect vulnerabilities.
This document discusses Backstage, an open platform for building developer portals created by Spotify. It summarizes that Backstage unifies all tooling, services, apps, data and docs with a single consistent UI to make sense of a company's entire software ecosystem. It provides speed, chaos control and scalability. Backstage lets developers easily create and manage software, and explore their company's full software ecosystem to enable collaboration.
Securing APIs with Open Standards provides tips for securing APIs from the Synack Red Team. It discusses using OpenAPI definitions to document APIs, embracing open box testing, and balancing security and adoption through developer relations. It also demonstrates how insecure user input validation can allow access to private data stored in AWS S3 buckets and how Salesforce record IDs can be brute forced to enable unauthorized access if not properly secured. The presentation emphasizes designing APIs with security in mind, adopting standards like OpenAPI, and balancing security testing with developer onboarding.
The most hated thing a developer can imagine is writing documentation. But on the other hand nothing can compare with a well sorted documentation, in case you want to change or extend something or just want to get into the topic again. We all know, there is no major way how to do documentation, but there a number of principles and todos which makes it much easier for you. This talk is not about tools, like phpDocumentor, nor is it about promoting a special way of documentation. It is about some of the thoughts you should have gone through, before and when writing documentation.
Backstage l'Internal Developer Portal Open Source per una migliore Developer ...Commit University
Backstage is an open source platform for building developer portals that unifies all tooling, services, apps, data, and documentation with a single consistent UI. It allows developers to focus on their work by providing a centralized location to create software, manage what they own, and explore the entire software ecosystem. Backstage has a customizable, extensible plugin architecture built with modern technologies to make it easy to develop for and contribute to developer portals in a cloud-agnostic, vendor-neutral way.
The DevOps paradigm - the evolution of IT professionals and opensource toolkitMarco Ferrigno
This document discusses the DevOps paradigm and tools. It begins by defining DevOps as focusing on communication and cooperation between development and operations teams. It then discusses concepts like continuous integration, delivery and deployment. It provides examples of tools used in DevOps like Docker, Kubernetes, Ansible, and monitoring tools. It discusses how infrastructure has evolved to be defined through code. Finally, it discusses challenges of security in DevOps and how DevOps works aligns with open source principles like meritocracy, metrics, and continuous improvement.
This document summarizes the DevOps paradigm and tools. It discusses how DevOps aims to improve communication and cooperation between development and operations teams through practices like continuous integration, delivery, and deployment. It then provides an overview of common DevOps tools for containers, cluster management, automation, CI/CD, monitoring, and infrastructure as code. Specific tools mentioned include Docker, Kubernetes, Ansible, Jenkins, and AWS CloudFormation. The document argues that adopting open source principles and emphasizing leadership, culture change, and talent growth are important for successful DevOps implementation.
The document provides an overview of Open Stack cloud services. It discusses key aspects of Open Source, cloud computing, hypervisors, Open Stack, and compares Open Stack to other cloud platforms like CloudStack and Eucalyptus. The document highlights that Open Stack provides the features required for IaaS cloud services, but some integration work is needed to commercialize it. It also notes that while the platforms differ in codebase and hypervisor support, choosing a good management layer allows portability between platforms.
Eclipse Che - A Revolutionary IDE for Distributed & Mainframe DevelopmentDevOps.com
Eclipse Che introduces a new kind of developer tool that runs directly on Kubernetes and is accessible through a web-based IDE. The container architecture enables easy and rapid onboarding of new team members while eliminating workstation maintenance costs and limitations, all while leveraging a VS Code-like experience. The release of Che 7.0 by the open source community goes further by making the developer environment consistent, repeatable and reproducible. Now available for mainframe-based code with the Che4z subproject, teams can collaborate on cross-platform applications and bridge the distributed/mainframe divide.
The panel with discuss how the Eclipse Che IDE and workspace server drive developer productivity and improve overall software delivery.
Conf42-Python-Building Apache NiFi 2.0 Python Processors
https://www.conf42.com/Python_2024_Tim_Spann_apache_nifi_2_processors
Building Apache NiFi 2.0 Python Processors
Abstract
Let’s enhance real-time streaming pipelines with smart Python code. Adding code for vector databases and LLM.
Summary
Tim Spann: I'm going to be talking today, be building Apache 9520 Python processors. One of the main purposes of supporting Python in the streaming tool Apache Nifi is to interface with new machine learning and AI and Gen AI. He says Python is a real game changer for Cloudera.
You're just going to add some metadata around it. It's a great way to pass a file along without changing it too substantially. We really need you to have Python 310 and again JDK 21 on your machine. You got to be smart about how you use these models.
There are a ton of python processors available. You can use them in multiple ways. We're still in the early world of Python processors, so now's the time to start putting yours out there. Love to see a lot of people write their own.
When we are parsing documents here, again, this is the Python one I'm picking PDF. Lots of different things you could do. If you're interested on writing your own python code for Apache Nifi, definitely reach out and thank.
How to Successfully Master the PHP Development Tools.pdfEnterprise Wired
In this comprehensive guide, we'll explore essential PHP development tools that can elevate your coding workflow and help you build robust, scalable, and efficient PHP applications.
Managing Open Source Software Supply ChainsnexB Inc.
Heather Meeker and Michael Herzog discuss the latest trends in open source compliance for supply chain activities: the key legal issues for supply chain management as well as the latest automation tools and projects for open source management.
Agenda
• Legal issues for supply chain management
• Best practices to avoid claims and reduce risk
• Latest automation tools and projects for open source compliance management
FIWARE Wednesday Webinars - How to Debug IoT AgentsFIWARE
How to Debug IoT Agents Webinar - 17th April 2019
Corresponding webinar recording: https://youtu.be/FRqJsywi9e8
Chapter: IoT Agents
Difficulty: 3
Audience: Any Technical
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
How to debug IoT Agents - investigating what goes wrong and how to fix it.
I have over a thousand Powerpoint files on my laptop’s hard drive. The session examines using the MinIO Python SDK to upload and query presentation objects in the cloud. The Python libraries python-pptx, rake-nltk and Fuzzy Wuzzy are included to categorize and match keywords.
BRKEVT-2311 - Network Design and Implementation for IP Video Surveillance
This session discusses the fundamentals of deploying IP video surveillance. It provides a foundation on selecting the type of IP cameras, the placement, field of view, resolution and frame rate to address the safety and security requirements of the organization.
Introduction to GraphQL using Nautobot and Arista cEOSJoel W. King
GraphQL is a query language for APIs and has been adopted by popular web services, including GitHub, ArangoDB and Nautobot, a network automation platform. This session introduces GraphQL and demonstrates using Nautobot as a Source of Truth for managing the configuration of Arista Containerized EOS (cEOS) routers using Ansible.
Network engineers who wish to learn GraphQL for Nautobot, Ansible, and cEOS will benefit from this session. A sample code repository will be published for attendees.
One challenge for a network engineer learning the ‘tools of the trade’ for programmable networks is how to set up a development environment.
The environment must be ephemeral, consistent, and repeatable with the instructor, your teammates and your study partner.
In this session, we demonstrate how to use Visual Studio Code along with Vagrant, Docker and cloud compute environments. We will share sample configurations in GitLab and also a number of Jupyter Notebooks which can be used as study aides for the Cisco DevNet Certification exams.
DevNet Associate : Python introductionJoel W. King
The document provides an introduction to Python programming and resources for learning Python. It discusses installing Python on personal computers or using containers. It also summarizes using Jupyter notebooks for Python, debugging Python code in VS Code, and additional learning resources like Coursera courses and DevNet labs. Key takeaways are that the session provides a foundation for learning Python concepts and using additional resources for more in-depth learning.
Refer to RTP Programmability and Automation Meetup Group:
https://www.meetup.com/Cisco-Programmability-and-Automation-Meetup-Group/events/278002529/
As engineers embrace infrastructure-as-code, building in testing and sanity checks of the proposed changes becomes critical. Batfish is an open-source tool that does network configuration analysis. Some of the project’s capabilities include analysis of system information, routing and forwarding tables, and ACLs. Batfish is written in python and is consumable in python, but also has Ansible modules available.
Using Terraform to manage the configuration of a Cisco ACI fabric.Joel W. King
Terraform is an open-source infrastructure as code software tool created by HashiCorp. It is written in GoLang. Cisco has developed an ACI terraform provider used to interact with the Cisco APIC. Network engineers define and provision the ACI infrastructure using a declarative configuration language known as HCL, HashiCorp Configuration Language.
This session will begin with a short presentation on Terraform and how it can be used to manage resources in an ACI fabric. There is a companion GitLab repository (https://gitlab.com/joelwking/terraform_aci) which will be used as a demo environment. Attendees can download Vagrant and VirtualBox to their laptop and execute the demonstration using the Cisco DevNet Always-on ACI sandbox.
Cisco IP Video Surveillance Design GuideJoel W. King
This document provides a summary of Cisco's IP Video Surveillance Design Guide, which outlines best practices and configurations for deploying Cisco's IP video surveillance solution. The guide covers components of an IP video surveillance system, planning and design considerations, product selection, implementation and configuration guidance. It includes examples of network diagrams, router configurations, and quality of service configurations to optimize video surveillance traffic.
Data manipulation for configuration management using AnsibleJoel W. King
This presentation explores techniques and best practices for ingesting, manipulating, and storing configuration management data for managing multi-cloud infrastructure deployments using Ansible. The presentation focuses on techniques to ingest, manipulate, and optimize configuration management data to drive automation processes. It also examines using relational, NoSQL, and graph databases as well as sequential files for configuration management data. The speaker's background is typically focused on network and security automation use cases using Ansible.
Foray into Ansible Content CollectionsJoel W. King
Overview on building and using Ansible Content Collections.
To quote - https://www.wwt.com/article/ansiblefest-2019-retrospective
Red Hat has announced Ansible Content Collections, a new packaging format for managing and consuming modules, plugins, roles, documentation and playbooks. This new package format, which leverages Ansible Galaxy, makes it easier for the community to consume this content without waiting for the next Ansible release.
Using Ansible Tower to implement security policies and telemetry streaming fo...Joel W. King
Network analytics provides insight to the traffic flow between applications and endpoints. Telemetry data is streamed in real-time from software sensors and network devices to big-data clusters. Implementing the policy to create a whitelist-based segmentation and zero-trust model requires automation when dealing with tens of thousands of workloads and complex rules.
This session examines how Cisco Tetration Analytics provides an accurate inventory of devices, software packages and version information to detect software vulnerabilities and implement a zero-trust policy model on network fabrics, firewalls and application delivery controllers.
The document discusses using structured data and automation to manage network configuration changes. It recommends storing configuration data in a centralized source of truth like a database to enable programmatic changes. The demonstration shows retrieving firewall configuration data from a database, using it to update firewall rules to support new F5 VIPs, and storing the results back in the database along with audit records. Maintaining structured, machine-readable data in a source of truth allows network changes to be reliably and repeatably implemented through automation.
Introduction to Git for Network Engineers (Lab Guide)Joel W. King
This document provides an introduction to using Git and GitHub for network engineers to manage network configuration files. It describes setting up a GitHub account and installing Git locally. It then walks through various Git commands like configuring global settings, creating a repository, adding and committing files, branching, merging, undoing changes, and cleaning up. The goal is to provide hands-on experience with revision control of network configuration files using Git and GitHub.
Introduction to Git for Network EngineersJoel W. King
Git is a version control system that was created by Linus Torvalds to manage source code for Linux. It allows for collaboration on projects with features like tracking changes, reverting mistakes, and branching to experiment without breaking working code. Network engineers should learn Git as networks are becoming more programmable through tools like Ansible that use configuration files that should be version controlled. Git provides benefits like scalability, working offline with local repositories, and branching to experiment safely.
This talk, What is Code?, explores the relationship between in-house developed software, open source software, development of workflow, training / labs, consulting and system integration.
From 70 Networking Tasks to a Single Click by WWT: Building an F5 Solution wi...Joel W. King
Automating specific tasks can be easy, but what about when they are part of a larger and more complex solution deployment?
World Wide Technology has partnered with Ansible and F5 Networks to develop an automated workflow to provision, license, and configure a pair of F5 BIG-IP devices via Ansible Tower.
Hear from their experiences while they provide best practices and lessons learned from the project.
Learn To Think Like A Computer ScientistJoel W. King
The security operations center (SOC) wishes to query Tetration for flows between two points in time spanning several months. Tetration only allows querying maximum time range of 1 day per request.
If a user wants to query a longer time range, they need to split that time range into 1 day time periods and query separately for each period.
This talk describes an algorithm to solve this problem and shows several solutions in multiple programming languages.
Integrating Ansible Tower with security orchestration and cloud managementJoel W. King
Ansible Durham Meetup, 13 July 2017.
Our guest speaker will be Joel W. King, Principal Architect at World Wide Technology. His focused is on enterprise Software-Defined Networking and network programmability.
He will talk about how Ansible Tower, through the northbound APIs, is integrated into the security orchestration platform Phantom Cyber, and using the same code base, extends infrastructure provisioning to Cisco CloudCenter (formerly CliQr), an application-centric public and private cloud management solution.
Goodbye CLI, hello API: Leveraging network programmability in security incid...Joel W. King
Automation and Orchestration has been the purview of cloud computing and system administration, but now is increasingly important to security operations and network administration. By automating the data collection and corrective action component of incident response, significant time savings can be realized. Corrective actions often need be applied to multiple assets in the organization and automation improves consistency and time savings as well. This talk describes how security and IT orchestration can be integrated through code reuse and integration with APIs.
We demonstrate how Phantom and Ansible can be integrated to automate the incident response data collection, corrective action, and notification.
Ansible Tower provides a visual dashboard and API to manage Ansible automation. The Phantom app for Ansible Tower allows Phantom to consume Ansible modules and playbooks without needing to write custom apps. It provides a remote triggered blackhole solution that uses Ansible playbooks launched from Phantom to configure routers to block malicious IPs. This allows leveraging existing Ansible content while providing a native Phantom solution.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
2. Definition and examples of
Software Development Kit
SDK
Build a demonstration
environment
‘the setup’
Explore the
Meraki Python SDK
A software development kit (SDK) is a collection of software development tools in one installable package. They
ease creation of applications by having compiler, debugger and perhaps a software framework. They are
normally specific to a hardware platform and operating system combination.
From Wikipedia, the free encyclopedia
3. What is the Difference Between an API and an SDK? https://nordicapis.com/what-is-the-difference-between-an-api-and-an-sdk/
What is an API? https://www.mulesoft.com/resources/api/what-is-an-api
API (Application Programming Interface) SDK (Software Development Kit)
set of tools, libraries, relevant documentation,
code samples, processes, and or guides.
an interface that allows software
to interact with other software.
DATA
PROCESS
typically HTTP and REST
documented and
versioned
security, monitoring,
performance, scale
designed for consumption
by target audience
https://cobra.readthedocs.io/en/latest/index.html
documentation
code samples
tools
solution reference
underlying libraries
graphql.org
4. meraki-sdk 1.5.0 Python client library for Meraki Dashboard API
acicobra-3.2_3i-py2.7.egg Cisco APIC Python SDK
tetpyclient Tetration API SDK
Phantom_Ingest Python library for Phantom Cyber Ingest API
http://aci-demo.sandbox.wwtatc.local/cobra/_downloads/
pip install meraki-sdk
https://github.com/joelwking/Phantom-Cyber/tree/master/REST_ingest
pip install tetpyclient
5. API (Application Programming Interface) SDK (Software Development Kit)
Tetration
API server
Python package kafka-python, a high-level message consumer of Kafka brokers
from kafka import KafkaConsumer
https://github.com/joelwking/ansible-tetration/blob/master/library/tetration_network_policy.py
from tetpyclient import RestClient
https://github.com/joelwking/ansible-tetration/blob/master/library/tetration_application.py
TetPyClient is the Tetration Analytics SDK API for Python, which allows
Python developers to use the Tetration REST API (called OpenAPI).
Requests is an elegant and
simple HTTP library for Python,
built for human beings.
Kafka has four core APIs:
producer, consumer,
streams and connector
Tetration
TCP443TCP443
web browser
6. Help on package tetpyclient:
NAME
tetpyclient
FILE
/usr/local/lib/python2.7/dist-packages/tetpyclient/__init__.py
DESCRIPTION
# Copyright 2017 Cisco Systems or its affiliates. All Rights Reserved.
#
# Licensed under the Cisco API License (the "License"). You
# may not use this file except in compliance with the License. A copy of
# the License is located at
#
# http://www.cisco.com/c/en/us/about/legal/end-user-license-and-cloud-
terms/cloud-services-acceptable-use-policy.html
#
# or in the "license" file accompanying this file. This file is
# distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
CONDITIONS OF
# ANY KIND, either expressed or implied. See the License for the specific
# language governing permissions and limitations under the License.
PACKAGE CONTENTS
tetpyclient
DATA
__all__ = ['tetpyclient']
__author__ = 'Tetration Analytics'
__version__ = '1.0.7'
VERSION
1.0.7
AUTHOR
Tetration Analytics
$ pydoc tetpyclient
$ cd /usr/local/lib/python2.7/dist-packages/tetpyclient/
$ vi tetpyclient.py
>>> import tetpyclient
>>> help(tetpyclient)
>>> dir(tetpyclient)
['MultiPartOption', 'RestClient', '__all__', '__author__',
'__builtins__', '__doc__', '__file__', '__name__', '__package__',
'__path__', '__version__', 'tetpyclient']
>>> help(tetpyclient.RestClient)
https://pypi.org/project/tetpyclient/