Replay the live event: http://cs.co/90058rfjP
Learn from several DevNet engineers who are doing amazing things with Cisco APIs on products such as Cisco UCS Manager, Meraki, NX-OS, and Cisco Spark.
DevNet is Cisco’s rapidly growing developer program. It’s a free and fun way for you to stay on top of this major career transition: learn to code, innovate on Cisco platforms, test what you build, and share what you’ve learned with a community of your peers.
Register for the workshop today.
Resources:
Q&A from live event: http://cs.co/90018p6Wh
Watch the Cisco Developer Program full episode:
http://cs.co/90048rfbG
GitLab Remote Meetup: Enhance Your Kubernetes CI/CD Pipelines with GitLab & ...Nico Meisenzahl
Join Nico to learn how to enhance your Kubernetes CI/CD pipelines with GitLab FOSS/CE features as well as Open Source projects. Learn how GitLab can help you to better integrate your CI/CD pipelines with Kubernetes.
Nico will talk about newer GitLab FOSS/CE features like the Web Application Firewall for Kubernetes Ingress, Monitoring and Logging as well as Serverless with Knative. Besides this, you will also learn how Open Source projects like Kaniko and Kustomize can help you to streamline your pipelines.
Walk away with knowledge and best practices that will help you to enhance your own Kubernetes CI/CD Pipelines with Gitlab and Open Source!
GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...Nico Meisenzahl
Cloud native environments are a double edged sword - used right, the benefits are immense. However, it also introduces multiple entry points for example security breaches.
In this session, Nico will show how application vulnerabilities make it easy to hijack a Kubernetes cluster. He will also talk about why it's important to implement zero-trust to prevent data leaks and malicious workloads from being executed on a hijacked cluster.
In addition, you will learn how GitLab can protect you from being hijacked. Nico will talk about how to create more secure applications by using Static Application Security Testing (SAST) as well as how to secure your Kubernetes cluster with Container Host Security, Container Network Security or a Web Application Firewall.
ePOM - Fundamentals of Research Software Development - Integrated Development...Giuseppe Masetti
E-learning Python for Ocean Mapping (ePOM) project.
Complementary slides to the "Integrated Development Environment" module (part of the Fundamentals of Research Software Development training).
More details at https://www.hydroffice.org/epom
9 Software Development Tools Used by Experts | What Tools You Should Use to D...Gear Inc.
Good software development is always a huge undertaking. Over the last 10 years, we Gear Inc. have had the privilege to work on a vast array of projects. Here are some of the top tools that have helped us and may prove to make you more productive and efficient on your own projects.
#softwaredevelopment #appdev #tools #software
Containerisierte Anwendungen sind zu einem wesentlichen Bestandteil unseres täglichen Lebens geworden. Wir bauen diese mehrmals täglich, sowohl innerhalb unserer CI-Pipelines als auch lokal zu Debugging- und Testzwecken. Vor einigen Jahren konnten wir hierzu nur auf "docker build" zurückgreifen. Inzwischen gibt es jedoch viele alternative Projekte, die verschiedene Funktionen und Vorteile bieten.
Nico führt Sie in diesem Vortrag in die Evolution der Container-Builds ein. Sie erhalten Einblicke in Werkzeuge wie BuildKit, buildx, Kaniko, buildah, img und weitere. Neben den Unterschieden werden Sie auch die Vor- und Nachteile der einzelnen Tools kennenlernen.
Nach diesem Vortrag wissen Sie alles, was Sie benötigen, um Ihre Container Builds auf die nächsten Level zu heben.
GitLab Remote Meetup: Enhance Your Kubernetes CI/CD Pipelines with GitLab & ...Nico Meisenzahl
Join Nico to learn how to enhance your Kubernetes CI/CD pipelines with GitLab FOSS/CE features as well as Open Source projects. Learn how GitLab can help you to better integrate your CI/CD pipelines with Kubernetes.
Nico will talk about newer GitLab FOSS/CE features like the Web Application Firewall for Kubernetes Ingress, Monitoring and Logging as well as Serverless with Knative. Besides this, you will also learn how Open Source projects like Kaniko and Kustomize can help you to streamline your pipelines.
Walk away with knowledge and best practices that will help you to enhance your own Kubernetes CI/CD Pipelines with Gitlab and Open Source!
GitLab Commit DevOps: How GitLab Can Save your Kubernetes environment from Be...Nico Meisenzahl
Cloud native environments are a double edged sword - used right, the benefits are immense. However, it also introduces multiple entry points for example security breaches.
In this session, Nico will show how application vulnerabilities make it easy to hijack a Kubernetes cluster. He will also talk about why it's important to implement zero-trust to prevent data leaks and malicious workloads from being executed on a hijacked cluster.
In addition, you will learn how GitLab can protect you from being hijacked. Nico will talk about how to create more secure applications by using Static Application Security Testing (SAST) as well as how to secure your Kubernetes cluster with Container Host Security, Container Network Security or a Web Application Firewall.
ePOM - Fundamentals of Research Software Development - Integrated Development...Giuseppe Masetti
E-learning Python for Ocean Mapping (ePOM) project.
Complementary slides to the "Integrated Development Environment" module (part of the Fundamentals of Research Software Development training).
More details at https://www.hydroffice.org/epom
9 Software Development Tools Used by Experts | What Tools You Should Use to D...Gear Inc.
Good software development is always a huge undertaking. Over the last 10 years, we Gear Inc. have had the privilege to work on a vast array of projects. Here are some of the top tools that have helped us and may prove to make you more productive and efficient on your own projects.
#softwaredevelopment #appdev #tools #software
Containerisierte Anwendungen sind zu einem wesentlichen Bestandteil unseres täglichen Lebens geworden. Wir bauen diese mehrmals täglich, sowohl innerhalb unserer CI-Pipelines als auch lokal zu Debugging- und Testzwecken. Vor einigen Jahren konnten wir hierzu nur auf "docker build" zurückgreifen. Inzwischen gibt es jedoch viele alternative Projekte, die verschiedene Funktionen und Vorteile bieten.
Nico führt Sie in diesem Vortrag in die Evolution der Container-Builds ein. Sie erhalten Einblicke in Werkzeuge wie BuildKit, buildx, Kaniko, buildah, img und weitere. Neben den Unterschieden werden Sie auch die Vor- und Nachteile der einzelnen Tools kennenlernen.
Nach diesem Vortrag wissen Sie alles, was Sie benötigen, um Ihre Container Builds auf die nächsten Level zu heben.
Nico will show how to hijack a Kubernetes cluster based on common attack vectors. You'll also learn why it's important to implement zero-trust to prevent data leaks and malicious workloads from being executed on a hijacked cluster.
Furthermore, he will show you how to protect your cluster from being taken over by sharing useful insights, configurations, and toolsets.
This talk is not intended to be an in-depth security talk, but to provide you with best practices and also make you aware of certain attack vectors and how to prevent them.
Summary of bigger changes out of 553 tickets that were fixed in the last 12 months. Discover a quick overview of the new projects that the Piwik team and community released.
Nico will show how to hijack a Kubernetes cluster based on common attack vectors. You'll also learn why it's important to implement zero-trust to prevent data leaks and malicious workloads from being executed on a hijacked cluster.
Furthermore, he will show you how to protect your cluster from being taken over by sharing useful insights, configurations, and toolsets.
This talk is not intended to be an in-depth security talk, but to provide you with best practices and also make you aware of certain attack vectors and how to prevent them.
Azure Meetup Hamburg: Production-Ready Terraform Deployments on AzureNico Meisenzahl
Infrastructure-as-code is key to keeping up with our rapidly changing world. In this talk, you will learn everything you need to get started with Terraform on Azure. Nico will show you all the fundamentals and best practices you need to know to use Terraform on Azure. Furthermore, you will learn how to scaffold a production-ready and secure Terraform project that you can use as a blueprint for your environments.
Join Nico and walk away with all the details you need to use Terraform in production!
Continuous Lifecycle: Enhance Your Compliance and Governance With Policy-Base...Nico Meisenzahl
Whether you want to get started with Governance or improve your current process, this talk will show you how to improve your compliance by implementing policy-based CI/CD (Continuous Integration / Continuous Delivery) with Open Policy Agent.
Nico will tell you all the details about Open Policy Agent and how you can easily integrate it into your existing CI/CD pipelines.
Join this session to learn all the details on how to stay compliant with project dependencies or control your Infrastructure and Kubernetes deployment pipelines.
Virtual GitLab Meetup: How Containerized Pipelines and Kubernetes Can Boost Y...Nico Meisenzahl
Learn how to eliminate any dependencies on your CI/CD build nodes and don’t bother yourself with multiple versions of your toolchain and any corresponding constraints. Walk away with knowledge and best practices that will help you to optimize your builds and deployments with containerized pipelines!
Use containerized GitLab CI/CD pipelines and Kaniko to move your build and deployment workloads into your Kubernetes cluster. Build your apps and infrastructure without any external dependencies and constraints. If you are building a Go project, deploying an app to Kubernetes or just building your infrastructure. It doesn’t matter, anything is possible!
Join Nico on a deep dive into the secrets of building hassle-free containerized build and deployment pipelines with GitLab CI/CD, Kubernetes and Kaniko.
Open Source Compliance at Orange, OW2online, June 2020OW2
Presentation by Nicolas Toussaint, Software Architect, Orange.
Abstract: Orange and Orange Business Services have turned to full open source solutions to tackle the complex problem of respecting the open source legal compliance constraints.
This talk presents the journey undertaken the past few years to build and improve the existing tooling and processes to make compliance validation possible, as well as allow overseeing progresses.
Nico will show how to hijack a Kubernetes cluster based on common attack vectors. You'll also learn why it's important to implement zero-trust to prevent data leaks and malicious workloads from being executed on a hijacked cluster.
Furthermore, he will show you how to protect your cluster from being taken over by sharing useful insights, configurations, and toolsets.
This talk is not intended to be an in-depth security talk, but to provide you with best practices and also make you aware of certain attack vectors and how to prevent them.
TechWiseTV Workshop: Digital Building SwitchesRobb Boyd
Replay the live event: http://cs.co/90078whdP
Review the Q&A from this event: http://cs.co/90078jrSS
Cisco Catalyst Digital Building Series Switches are new low-voltage Universal PoE switches, designed to converge LED lighting with HVAC, security, and other siloed systems used in commercial building applications. These switches are simple to install, safe from security threats typically associated with IoT endpoints, and, best of all, cost effective.
Our TechWiseTV webinar explores innovative solutions designed in collaboration with our partner community and how our enterprise customers are using these smart switches.
Cisco Network Insider: Three Ways to Secure your NetworkRobb Boyd
These are the slides from our Tuesday Jun 14, 2016 webinar featuring three building block technologies for quickly adding a ton of value to your security efforts.
Watch the Replay: http://bit.ly/1UhUZ1J
We covered:
- Identity Services Engine (ISE)- visibility and control…along with a solid set of sharing capabilities. Using ISE you can see the device types and control access to the network – and share what they see with Stealthwatch.
- Stealthwatch - Visibility with even more network elements…work in conjunction with ISE but adds behavioral analysis Using Stealthwatch you can see the behaviors of the devices and determine if they are infected with malware or ransomware – and then use the network to take action to contain from a single screen.
- Cisco Defense Orchestrator (CDO) - Cloud platform that analyzes security policy configurations for Cisco ASA Firewalls and OpenDNS. It identifies and resolves policy inconsistencies, models policy changes to validate their impact, and orchestrates policy changes to achieve consistency and clarity of your security posture.
Nico will show how to hijack a Kubernetes cluster based on common attack vectors. You'll also learn why it's important to implement zero-trust to prevent data leaks and malicious workloads from being executed on a hijacked cluster.
Furthermore, he will show you how to protect your cluster from being taken over by sharing useful insights, configurations, and toolsets.
This talk is not intended to be an in-depth security talk, but to provide you with best practices and also make you aware of certain attack vectors and how to prevent them.
Summary of bigger changes out of 553 tickets that were fixed in the last 12 months. Discover a quick overview of the new projects that the Piwik team and community released.
Nico will show how to hijack a Kubernetes cluster based on common attack vectors. You'll also learn why it's important to implement zero-trust to prevent data leaks and malicious workloads from being executed on a hijacked cluster.
Furthermore, he will show you how to protect your cluster from being taken over by sharing useful insights, configurations, and toolsets.
This talk is not intended to be an in-depth security talk, but to provide you with best practices and also make you aware of certain attack vectors and how to prevent them.
Azure Meetup Hamburg: Production-Ready Terraform Deployments on AzureNico Meisenzahl
Infrastructure-as-code is key to keeping up with our rapidly changing world. In this talk, you will learn everything you need to get started with Terraform on Azure. Nico will show you all the fundamentals and best practices you need to know to use Terraform on Azure. Furthermore, you will learn how to scaffold a production-ready and secure Terraform project that you can use as a blueprint for your environments.
Join Nico and walk away with all the details you need to use Terraform in production!
Continuous Lifecycle: Enhance Your Compliance and Governance With Policy-Base...Nico Meisenzahl
Whether you want to get started with Governance or improve your current process, this talk will show you how to improve your compliance by implementing policy-based CI/CD (Continuous Integration / Continuous Delivery) with Open Policy Agent.
Nico will tell you all the details about Open Policy Agent and how you can easily integrate it into your existing CI/CD pipelines.
Join this session to learn all the details on how to stay compliant with project dependencies or control your Infrastructure and Kubernetes deployment pipelines.
Virtual GitLab Meetup: How Containerized Pipelines and Kubernetes Can Boost Y...Nico Meisenzahl
Learn how to eliminate any dependencies on your CI/CD build nodes and don’t bother yourself with multiple versions of your toolchain and any corresponding constraints. Walk away with knowledge and best practices that will help you to optimize your builds and deployments with containerized pipelines!
Use containerized GitLab CI/CD pipelines and Kaniko to move your build and deployment workloads into your Kubernetes cluster. Build your apps and infrastructure without any external dependencies and constraints. If you are building a Go project, deploying an app to Kubernetes or just building your infrastructure. It doesn’t matter, anything is possible!
Join Nico on a deep dive into the secrets of building hassle-free containerized build and deployment pipelines with GitLab CI/CD, Kubernetes and Kaniko.
Open Source Compliance at Orange, OW2online, June 2020OW2
Presentation by Nicolas Toussaint, Software Architect, Orange.
Abstract: Orange and Orange Business Services have turned to full open source solutions to tackle the complex problem of respecting the open source legal compliance constraints.
This talk presents the journey undertaken the past few years to build and improve the existing tooling and processes to make compliance validation possible, as well as allow overseeing progresses.
Nico will show how to hijack a Kubernetes cluster based on common attack vectors. You'll also learn why it's important to implement zero-trust to prevent data leaks and malicious workloads from being executed on a hijacked cluster.
Furthermore, he will show you how to protect your cluster from being taken over by sharing useful insights, configurations, and toolsets.
This talk is not intended to be an in-depth security talk, but to provide you with best practices and also make you aware of certain attack vectors and how to prevent them.
TechWiseTV Workshop: Digital Building SwitchesRobb Boyd
Replay the live event: http://cs.co/90078whdP
Review the Q&A from this event: http://cs.co/90078jrSS
Cisco Catalyst Digital Building Series Switches are new low-voltage Universal PoE switches, designed to converge LED lighting with HVAC, security, and other siloed systems used in commercial building applications. These switches are simple to install, safe from security threats typically associated with IoT endpoints, and, best of all, cost effective.
Our TechWiseTV webinar explores innovative solutions designed in collaboration with our partner community and how our enterprise customers are using these smart switches.
Cisco Network Insider: Three Ways to Secure your NetworkRobb Boyd
These are the slides from our Tuesday Jun 14, 2016 webinar featuring three building block technologies for quickly adding a ton of value to your security efforts.
Watch the Replay: http://bit.ly/1UhUZ1J
We covered:
- Identity Services Engine (ISE)- visibility and control…along with a solid set of sharing capabilities. Using ISE you can see the device types and control access to the network – and share what they see with Stealthwatch.
- Stealthwatch - Visibility with even more network elements…work in conjunction with ISE but adds behavioral analysis Using Stealthwatch you can see the behaviors of the devices and determine if they are infected with malware or ransomware – and then use the network to take action to contain from a single screen.
- Cisco Defense Orchestrator (CDO) - Cloud platform that analyzes security policy configurations for Cisco ASA Firewalls and OpenDNS. It identifies and resolves policy inconsistencies, models policy changes to validate their impact, and orchestrates policy changes to achieve consistency and clarity of your security posture.
It’s All About Developers. Discover Cisco DevNet. - Jason Goecke - Codemotion...Codemotion
We believe developers come first when it comes to driving innovation. Come learn about Cisco’s developer program: DevNet. Join this keynote with Jason Goecke, General Manager at Cisco to discover what you can create, what you can get access to, and more!
Message from Arvicco, the Initiator of Ethereum Classic
"People self-select into communities based on values and principles.
Only those communities that clearly define their values and stick to them, come hell or high water, will be successful in the world of free and voluntary cooperation without coercion.
Welcome to Ethereum Classic, a blockchain community dedicated to the principles of openness, neutrality and immutability."
What is happening with Steem is part of a greater theme: the advent of crypto-based circular economies, based on a new system of work.
What is that greater context in which Steem fits perfectly?
What are the conditions for success?
What does this new value chain look like?
WSO2Con USA 2017: Building an Effective API ArchitectureWSO2
WSO2 API Manager is a solution that effectively reuses most of the WSO2 platform components to build an elegant, scalable software that performs the whole API management cycle. Understanding the various components of the solution and their interactions helps you to build an effective solution architecture that best suits your organizational needs. Knowing the available deployment options and best practises can benefit you in the long run when managing APIs and the applications that consume them. In this session we will look at
WSO2 API Manager components and their interactions
Advanced API security: Key management
Rate limiting API requests: Traffic management
Analytics: Batch, real-time and logs
Deployment patterns: HA and multi-datacenter deployment
WSO2Con USA 2017: Keynote - The Blockchain’s Digital DisruptionWSO2
Almost a decade ago, little-known open-source cryptocurrency called Bitcoin made its debut with little fanfare. Its underlying technological innovation has now caught the world’s attention; developers, startups, corporations, academic institutions, and governments are all examining what blockchain technology can solve. Currency, assets, identity, trade settlement, cross-border payments, privacy and regulation are areas being explored. This session will explore the past, present, and future of blockchain technology and how it may influence your business.
API and App Ecosystems - Build The Best: a deep diveCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. This presentation presents our perspective and guidance on full life-cycle management and governance of API's from defining with the customer in mind, building, publishing on a single platform, supporting and retiring API's for the business outcomes you're driving!
Every enterprise has a multitude of existing systems - including on-premise as well as cloud solutions - that perform critical functions. Integrating data and services across these systems is critical for an enterprise to successfully implement its digital transformation efforts. Therefore, most often than not, enterprise integration is at the heart of any organization’s digital transformation strategy.
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...WSO2
Verifone’s new flagship payment device “Carbon” comes along with a whole service platform for Estate Owners, merchants, and app developers. A developer SDK and platform allows third-party developers to create apps that can interact with the payment flow, and merchants can purchase these apps via an app store. Merchants can manage their devices and users via the device or via a web platform. Estate owners get an overview of all devices in their “estate” and can manage the devices, their merchants, and apps that they can provide to the merchants. The device consists of two parts – an Android tablet and a Unix-based payment terminal. Verifone decided to use WSO2’s mobile device management solution (EMM) to manage the Android tablet for installing apps, getting information about the current state of the devices, locking or rebooting the devices, installing security policies, etc. Our own terminal management system interacts with EMM on an API-only basis to manage the Android tablets. And the plan is to use EMM for a large-scale deployment of thousands of devices in the field.
This talk will introduce the features and use cases of Carbon, the motivation why we chose the open-source EMM over commercial alternatives, as well as the architecture of our device management via our own terminal management system and EMM APIs.
Innovation at Perforce never stops. Since the last MERGE conference, there have been continual updates across the board in response to user requests. In this session, we're going to look at what's new and take a peek at what's in the works so that you can start planning to exploit them when they're available.
ePOM - Fundamentals of Research Software Development - Code Version ControlGiuseppe Masetti
E-learning Python for Ocean Mapping (ePOM) project.
Complementary slides to the "Code Version Control" module (part of the Fundamentals of Research Software Development training).
More details at https://www.hydroffice.org/epom
GitOps: Git come unica fonte di verità per applicazioni e infrastrutturasparkfabrik
GitOps è un nuovo metodo di CD che utilizza Git come unica fonte di verità per le applicazioni e per l'infrastruttura (declarative infrastructure / infrastructure as code), fornendo sia il controllo delle revisioni che il controllo delle modifiche. In questo talk vedremo i concetti alla base di CI/CD, ovvero Continuous Integration e Continuous Deployment (o anche Continuous Delivery), pratiche nello sviluppo software che permettono ai team di creare dei progetti collaborativi in modo rapido, efficiente e idealmente con meno errori. Infine vedremo come implementare un flusso di lavoro GitOps usando Github actions e ArgoCD.
Golang 101 for IT-Pros - Cisco Live Orlando 2018 - DEVNET-1808Cisco DevNet
This session is an introduction to Golang - the Go programming language - for IT Professionals. We'll explain how to setup a GO development environment, create a simple HTTP/2 Web API, and embed our code into a Docker container. We'll also go through the reasons why the language is so popular to create network applications by showing how the language is expressive, concise, clean, and efficient. Join this session if you've started writing Python scripts that consume Web APIs, and you now want to go to the next stage by creating your own APIs to expose or store Enterprise Data.
DEVNET-1808
https://www.ciscolive.com/us/learn/sessions/session-catalog/?search=DEVNET-1808
In one of our weekly training, we’ve talked about Git. Here is a quick overview of the main concepts, basic commands and branching strategy, how to work with Git, how to contribute to an OSS project, …
Open up your platform with Open Source and GitHubScott Graham
Use GitHub & open source to get your users involved in projects within your company. This presentation give a quick run down of what you need to know to get started.
Ever wondered about the new Cloud offerings out there? What is a PaaS? What is this thing called OpenShift?
Whether your business is running on applications based on Java EE6, PHP or Ruby, the cloud is turning out to be the perfect environment for developing your business. There are plenty of clouds and platform-as-a-services to choose from, but where to start?
Join us for an action-packed hour of power where we'll show you how to deploy your existing application written in the language of your choice - Java, Ruby, PHP, Perl or Python, with the framework of your choice - EE6, CDI, Seam, Spring, Zend, Cake, Rails, Sinatra, PerlDancer or Django to the OpenShift PaaS in just minutes. All this and without having to rewrite your app to get it to work the way the cloud provider thinks your app should work.
You can have your business applications running in the cloud on OpenShift Express in seconds, while also making use of the web browser do the heavy-lifting of provisioning clusters, deploying, monitoring and auto-scaling apps in OpenShift Flex.
If you want to learn about OpenShift PaaS and see how investing 45 mins of your time can change everything you thought you knew about putting your business applications in the cloud, this session is for you!
Webex Teams Widgets Technical Drill down - Cisco Live Orlando 2018 - DEVNET-3891Cisco DevNet
The React library for Webex Teams (formally Cisco Spark) allows developers to easily incorporate Cisco Cloud Collaboration capabitilies into your application.
Throughout this session, we'll describe the architecture of the Webex Widgets, and detail how to start from the existing React opensource project on github to create a customized version of the Webex Teams Widgets.
DEVNET-3891
https://www.ciscolive.com/us/learn/sessions/session-catalog/?search=DEVNET-3891
We will learn how to create repository, pushing, cloning and creating branches. Additionally we will talk about various workflows that are used by teams while collaborating in a project.
Do you know that open source contributions come in handy when we apply for our dream job? 樂
It out-stands your resume and keeps you at the top 朗.
We are very happy to introduce you to hacktoberfest 2021, a month-long celebration of open-source software. During this event, everyone can participate in events, contribute to open source projects and showcase their skills.
Kubernetes GitOps featuring GitHub, Kustomize and ArgoCDSunnyvale
A brief dissertation about using GitOps paradigm to operate an application on multiple Kubernetes environments thanks to GitHub, ArgoCD and Kustomize. A talk about this matters has been taken at the event #CloudConf2020
What is Git | What is GitHub | Git Tutorial | GitHub Tutorial | Devops Tutori...Edureka!
This DevOps Tutorial on what is Git & what is GitHub ( Git Blog series: https://goo.gl/XS1Vux ) will let you know all about Version Control System & Version Control Tools like Git. You will learn all the Git commands to create repositories on your local machine & GitHub, commit changes, push & pull files. Also you will get your hands on with some advanced operations in Git like branching, merging, rebasing etc. Below are the topics covered in this tutorial:
1. Version Control Introduction
2. Why version Control?
3. Version Control Tools
4. Git & GitHub
5. Case Study: Dominion enterprises
6. What is Git?
7. Features of Git
8. What is a Repository?
9. Git Operations and Commands
Similar to TechWiseTV Workshop: Cisco Developer Program (20)
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
In today’s agile work environment, customers need to collaborate in real time with partners, vendors, and customers, and they want the best collaboration tools possible. At the same time, they’re cognisant of potential accidental or intentional misuse of data and malicious attacks – and the ramifications they can have for their company’s finances and reputation.
Cisco provides best-in-class collaboration tools with true end-to-end encryption that enable secure cross-company collaboration. Find out more about the six considerations for collaboration security and the new Cisco Webex Extended Security Pack – which provides a full-functionality Cisco Cloudlock cloud access security broker for Webex Teams with native Webex anti-malware capabilities powered by Cisco Talos ClamAV.
Resources:
TechWiseTV: http://cs.co/9009DzrjN
TechWiseTV Workshop - Q&A - Cisco Catalyst 9600: Deep Dive and Design Conside...Robb Boyd
Cisco Catalyst 9600 Series Switches are the next-generation purpose-built 40/100G modular core/aggregation platform, providing resiliency at scale with the industry’s most comprehensive security while allowing the business to grow at a low total operational cost.
The Cisco Catalyst 9606R is a 6-slot 8RU chassis ready to support a wired switching capacity of up to 25.6 Tbps, with up to 6.4 Tbps of bandwidth per slot. Some salient features of the Cisco Catalyst 9606R chassis are:
- Supports a nonblocking 40/100G Quad Small Form-Factor Pluggable (QSFP+, QSFP28) line card
- Supports a line-rate 1/10/25G SFP and Enhanced SFP (SFP, SFP+, SFP28) line card
- Optimized for the enterprise with efficient side-to-side airflow
- Front accessibility for all removable components, such as the supervisor, line cards, power supply, and fan tray
- Dual accessible fan tray for easy removal
- Embedded RFID tag for easy asset tracking
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsRobb Boyd
Cisco Catalyst 9600 Series Switches are the next-generation purpose-built 40/100G modular core/aggregation platform, providing resiliency at scale with the industry’s most comprehensive security while allowing the business to grow at a low total operational cost.
The Cisco Catalyst 9606R is a 6-slot 8RU chassis ready to support a wired switching capacity of up to 25.6 Tbps, with up to 6.4 Tbps of bandwidth per slot. Some salient features of the Cisco Catalyst 9606R chassis are:
- Supports a nonblocking 40/100G Quad Small Form-Factor Pluggable (QSFP+, QSFP28) line card
- Supports a line-rate 1/10/25G SFP and Enhanced SFP (SFP, SFP+, SFP28) line card
- Optimized for the enterprise with efficient side-to-side airflow
- Front accessibility for all removable components, such as the supervisor, line cards, power supply, and fan tray
- Dual accessible fan tray for easy removal
- Embedded RFID tag for easy asset tracking
Resources:
TechWiseTV: http://cs.co/9009DzrjN
With users expecting an immersive experience, and with IoT becoming the new mobile, we are more dependent on Wi-Fi than ever before. The Cisco Catalyst 9100 Access Points, powered by Wi-Fi 6 (802.11ax) technology and supporting Cisco’s intent-based networking architecture, are ready for the growing user expectations, IoT devices, and next-generation cloud-driven applications. Cisco’s first Wi-Fi 6 access point can handle the increased mobile traffic as well as support IoT at scale. It has superior RF innovations and will expand wireless access with intelligence to provide a secure, reliable, high-quality wireless experience for all networks.
TechWiseTV Workshop - Q&A - Application Hosting on the Cisco Catalyst 9000 Sw...Robb Boyd
Enterprise networks are now dealing with massive volumes of data, with a critical need to collect and analyze this data to respond faster and deliver insightful context. Traditional approaches, in which data is processed in remote servers, will no longer work. Data can burden the network unless some context is known. Edge computing can greatly reduce the data sent to the cloud or a remote server. Collecting and analyzing the data at the edge and making decisions locally rather than in centralized servers significantly reduces the latency and bandwidth of the network.
Powered by an x86 CPU, the application hosting solution on the Cisco Catalyst 9000 switching family provides the intelligence required at the edge. Native Docker engine support on the switches will enable users to build and bring their own applications without additional packaging. Cisco DNA Center will provide consistent workflows to manage the entire application lifecycle across multiple Cisco Catalyst 9000 switches through the App Hosting dashboard.
With users expecting an immersive experience, and with IoT becoming the new mobile, we are more dependent on Wi-Fi than ever before. The Cisco Catalyst 9100 Access Points, powered by Wi-Fi 6 (802.11ax) technology and supporting Cisco’s intent-based networking architecture, are ready for the growing user expectations, IoT devices, and next-generation cloud-driven applications. Cisco’s first Wi-Fi 6 access point can handle the increased mobile traffic as well as support IoT at scale. It has superior RF innovations and will expand wireless access with intelligence to provide a secure, reliable, high-quality wireless experience for all networks.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9006ELWE6
TechWiseTV: http://cs.co/9009DzrjN
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesRobb Boyd
Watch the REPLAY right now: http://bit.ly/2YoLbt3
Enterprise networks are now dealing with massive volumes of data, with a critical need to collect and analyze this data to respond faster and deliver insightful context. Traditional approaches, in which data is processed in remote servers, will no longer work. Data can burden the network unless some context is known. Edge computing can greatly reduce the data sent to the cloud or a remote server. Collecting and analyzing the data at the edge and making decisions locally rather than in centralized servers significantly reduces the latency and bandwidth of the network.
Powered by an x86 CPU, the application hosting solution on the Cisco Catalyst 9000 switching family provides the intelligence required at the edge. Native Docker engine support on the switches will enable users to build and bring their own applications without additional packaging. Cisco DNA Center will provide consistent workflows to manage the entire application lifecycle across multiple Cisco Catalyst 9000 switches through the App Hosting dashboard.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9001EIbih
TechWiseTV: http://cs.co/9009DzrjN
Today’s WAN is a messy place. Users are more distributed. Internet of Things (IoT) devices want to connect. Applications are moving from the data center to the cloud. And not just one cloud, but multiple clouds. More businesses have realized that their traditional WAN architecture has become an impediment to achieving successful digital transformations. As organizations rearchitect their networks to enable software-defined WAN, they need consistent security across branches, clouds, and users.
That’s where Cisco SD-WAN Security comes in. As a leader in both SD-WAN and network security, Cisco integrates a full security stack and highly secure SD-WAN fabric to protect branch users, connected devices, and application usage at all direct Internet access breakouts and all traffic across the WAN. Cisco SD-WAN Security delivers four new layers of protection:
• Enterprise firewall with AppAware
• Intrusion prevention
• URL filtering
• Advanced Malware Protection along with cloud sandbox capabilities with Threat Grid
• DNS/web layer security
To learn more about SD-WAN Security and to see a demo, join Robb Boyd and Cisco product experts for this special TechWiseTV Live episode.
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
TechWiseTV's Cisco Container Platform live workshop took place on July 18th.
For the first time in the industry, a single family of fixed, stackable, and modular switches are running on the same IOS-XE operating system along with a common ASIC.
Cisco’s Catalyst 9200 rounds out the lower end of its incredible Catalyst 9000 family of switches. The 9200 is designed for small, medium, and branch deployments, providing greater modularity, redundancy, and stackability than the Catalyst 2960 it replaces.
Register now.
TechWiseTV's Cisco Container Platform live workshop took place on July 17th. Explore new features of the Cisco Container Platform that make deploying and managing clusters more secure, versatile, and intuitive than ever before. This way, you can focus on running applications, not the underlying infrastructure.
Register now.
TechWiseTV Workshop: Improving Performance and Agility with Cisco HyperFlexRobb Boyd
Find out how organizations like yours are deriving business value from the HyperFlex HCI solution. Join us for a deep dive and Q&A at the TechWiseTV workshop.
TechWiseTV Hyperflex 4.0 Episode: http://cs.co/9009EW2Td
Today’s multicloud WAN environment is not only complicated–it can expose your business to an ever–expanding threat landscape. Learn how to provide consistent security across clouds, branches, and users. http://bit.ly/2DWBBX8
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
A new addition to the Catalyst 9000 family, the Cisco Catalyst 9800 Series Wireless Controllers are the next generation of controllers that bridge Cisco’s intent-based networking portfolio. Powered by the Cisco IOS XE operating system, the 9800 Series Wireless Controllers are always on, secure, and can be deployed anywhere.
Software updates with no disruptions and rolling access point upgrades completely change the definition of “always on.” “Secure” translates to increased threat detections in encrypted traffic and automated macro and micro segmentation. Finally, the ability to deploy in either a private or public cloud promises you the freedom that no other controller currently offers.
In this session we’ll cover the following aspects of Catalyst 9800:
Overview of the Cisco Catalyst 9800 Series Wireless Controller and its features and functionalities
Cisco Catalyst 9800 security, always-on functionality, and the ability to be deployed anywhere, and why these features create a stronger, more efficient wireless network
How the new 9800 controllers fit into the Cisco Catalyst family
Q&A
Protect Kubernetes Environments with Cisco Stealthwatch CloudRobb Boyd
TechWiseTV Workshop airing live on Wednesday Feb 13, 2019. Catch the replay (and more) at www.techwisetv.com
Description:
Kubernetes is the go-to orchestration solution for automating and scaling a container deployment, be it on premises or in the public cloud. While Kubernetes helps organizations reduce costs and become more agile, it can be difficult to gain east-west visibility into network traffic within containers. This creates visibility gaps that threats could use to avoid detection
Cisco Stealthwatch Cloud provides visibility, analytics, threat detection, and policy monitoring within containers, pods, and nodes. It easily integrates with Kubernetes deployments on premises, in private clouds, or in a public cloud, including Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure.
Stealthwatch Cloud provides an unprecedented level of access into inter-pod and intra-pod communications with your distributed containerized applications.
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsRobb Boyd
Learn more on getting hands-on with Cisco DNA Center Platform APIs. Join us as we go over the brand new DNA Center Platform and show you how to start integrating and developing your own applications on DNA Center. The possibilities are endless!
Watch the replay: http://cs.co/9000DCie4
In today’s digital economy, getting ahead means crunching a lot of data. That’s why businesses of all sizes and industries are investing in high-performance computing. However, the last thing IT needs is another tech silo to manage.
Fortunately, the new Cisco UCS C4200 Series chassis and C125 M5 server node help you scale out compute-intensive workloads with ease—with the network fabric you already have. This TechWiseTV Workshop will get you up to speed fast.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9006DAVPC
TechWiseTV: http://cs.co/9009DzrjN
Watch the replay: http://cs.co/9000DCie4
In today’s digital economy, getting ahead means crunching a lot of data. That’s why businesses of all sizes and industries are investing in high-performance computing. However, the last thing IT needs is another tech silo to manage.
Fortunately, the new Cisco UCS C4200 Series chassis and C125 M5 server node help you scale out compute-intensive workloads with ease—with the network fabric you already have. This TechWiseTV Workshop will get you up to speed fast.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9006DAVPC
TechWiseTV: http://cs.co/9009DzrjN
The fourth-generation Cisco ASR 9000 Aggregation Services Routers series is our best yet. Not only does it sport high-density, 100-GE-port line cards; it also offers a flexible, pay-as-you-grow consumption model. Service providers can now use only the bandwidth they need and increase it at any time to meet traffic demands.
Learn the business and technical considerations of our latest ASR 9000, including:
• The pay-as-you-grow consumption model commercial terms
• Software license portability and permitting capacity
• Real-life customer case studies
Resources:
Watch the related TechWiseTV episode: http://cs.co/9008Dfyik
TechWiseTV: http://cs.co/9009DzrjN
TechWiseTV Workshop: Q&A Cisco Hybrid Cloud Platform for Google CloudRobb Boyd
Cisco and Google Cloud experts join TechWiseTV to demonstrate how you can use the Cisco Hybrid Cloud Platform for Google Cloud as a DevOps platform that works consistently across data center and public cloud environments. You’ll learn how to take advantage of containers, microservices, public cloud toolsets, and other modern cloud development innovations while having the flexibility to deploy your applications wherever they run best.
With integrated connectivity, security, management, and control, your applications will operate consistently from prem to cloud and back again.
Resources:
Watch the replay: http://cs.co/9007DawLd
TechWiseTV: http://cs.co/9009DzrjN
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
When stars align: studies in data quality, knowledge graphs, and machine lear...
TechWiseTV Workshop: Cisco Developer Program
1.
2. Amanda Whaley | @mandywhaley
@CiscoDevNet
February 2, 2017
Techwise TV
What Can you build with
Cisco APIs?
3. Digital Transformation
Host-to-Host
Communication
WWW
Voice and Video
over IP
Digital Video
and HDTV
Mobile devices
& apps
Social
networking
Digital Transformations 1990-2010
Internet of Things
Big Data &
Real-time
Streaming
Analytics
Software Defined
Networking
Cloud &
Data Center
Digital Convergence
4. Mobile Developer
App Developer
Web Developer
Cloud Developer
“Developers” are driving today’s Digital Transformation
In the past,
“Developer” meant
Mobile Developer
App Developer
Cloud Developer
Web Developer
Today
“Developer” means
Software
Developers
Data Developer
Data Analysts
Solution Architect
Network Engineer
IT/NW Admin/Operator
IT
Professionals
Sales Engineer
OT Operator
OT
Professionals
5. What is DevNet?
Developer
as the
customer
Catalyze &
Accelerate
Digitization
Vibrant
Developer
Ecosystem
Cisco’s portfolio as a Platform for Innovation
IoT SDN Cloud Collaboration Open SourceSecurity Data Center DevOps Service
DevNet is Cisco’s Developer
Community and Innovation Ecosystem
6. DevNet Vision
Help developers build solutions and
grow their careers.
We evangelize and provide tools needed to use CiscoAPIs and platforms
Learn Code Inspire Connect
12. DISTRIBUTED VERSION CONTROL
• Opens up to new workflows: git flow
• Each system has an exact replica of the repo as other collaborators.
12
https://git-scm.com/images/about/workflow-b@2x.png
13. GIT CONFIG
• So you can be held accountable, configure git
13
$ git config --global user.name "Your Name Comes Here"
$ git config --global user.email you@yourdomain.example.com
14. GIT INIT
• Initializes a project directory with a hidden directory /.git/
14
$ tar xzf project.tar.gz
$ cd project
$ git init
15. GIT ADD
• Add any files in your repository to git “stage”
15
$ git add .
https://git-scm.com/images/about/index1@2x.png
17. GIT COMMIT
• Store your changes into a commit
• Saves all of your changes together / save point
• Commit does NOT push
17
$ git commit –m ’Initial commit’
19. CLONING PROJECTS (SSH OR HTTPS)
• No password
• Set up SSH key on remote server (e.g. ssh-keygen)
19
$ git clone git@github.com:aroach/upgraded-guacamole.git
$ git clone https://github.com/aroach/upgraded-guacamole.git
24. Infrastructure Architecture
1. Interacts with bot in Spark
Room
• /Meraki Orgs
• /Mearki Networks
• /Mearki devices
• /Mearki switch
Cisco Spark Cloud
Service
2. Post Notification to
registered Webbooks'
Target URL
3. Parse message
and GET info from
Meraki API
4. Return JSON Data
5. Post
Response
Spark Bot Code
• Cloud Hosted or
• Hosted On Local machine
Spark
User
25. All the resources for todays demos…
http://bit.ly/2kg4H8B
developer.cisco.com
Cisco DevNet | @CiscoDevNet
#DevNet
Amanda Whaley | @mandywhaley
JacobAdams | @jacob200ok
Hank Preston| @hfpreston
Ashley Roach| @aroach
John McDonough | @Johnamcdonough
Kareem Iskander | @kareem_isk