際際滷shows by User: joelwking / http://www.slideshare.net/images/logo.gif 際際滷shows by User: joelwking / Fri, 12 Aug 2022 13:11:48 GMT 際際滷Share feed for 際際滷shows by User: joelwking DevNetCreate_2021_joelwking.pptx /slideshow/devnetcreate2021joelwkingpptx/252527425 devnetcreate2021joelwking-220812131149-fe9959da
I have over a thousand Powerpoint files on my laptops hard drive. The session examines using the MinIO Python SDK to upload and query presentation objects in the cloud. The Python libraries python-pptx, rake-nltk and Fuzzy Wuzzy are included to categorize and match keywords. ]]>

I have over a thousand Powerpoint files on my laptops hard drive. The session examines using the MinIO Python SDK to upload and query presentation objects in the cloud. The Python libraries python-pptx, rake-nltk and Fuzzy Wuzzy are included to categorize and match keywords. ]]>
Fri, 12 Aug 2022 13:11:48 GMT /slideshow/devnetcreate2021joelwkingpptx/252527425 joelwking@slideshare.net(joelwking) DevNetCreate_2021_joelwking.pptx joelwking I have over a thousand Powerpoint files on my laptops hard drive. The session examines using the MinIO Python SDK to upload and query presentation objects in the cloud. The Python libraries python-pptx, rake-nltk and Fuzzy Wuzzy are included to categorize and match keywords. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/devnetcreate2021joelwking-220812131149-fe9959da-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> I have over a thousand Powerpoint files on my laptops hard drive. The session examines using the MinIO Python SDK to upload and query presentation objects in the cloud. The Python libraries python-pptx, rake-nltk and Fuzzy Wuzzy are included to categorize and match keywords.
DevNetCreate_2021_joelwking.pptx from Joel W. King
]]>
32 0 https://cdn.slidesharecdn.com/ss_thumbnails/devnetcreate2021joelwking-220812131149-fe9959da-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BRKEVT-2311_joeking_pbr.pptx /slideshow/brkevt2311joekingpbrpptx/252527361 brkevt-2311joekingpbr-220812130240-3648e184
BRKEVT-2311 - Network Design and Implementation for IP Video Surveillance This session discusses the fundamentals of deploying IP video surveillance. It provides a foundation on selecting the type of IP cameras, the placement, field of view, resolution and frame rate to address the safety and security requirements of the organization.]]>

BRKEVT-2311 - Network Design and Implementation for IP Video Surveillance This session discusses the fundamentals of deploying IP video surveillance. It provides a foundation on selecting the type of IP cameras, the placement, field of view, resolution and frame rate to address the safety and security requirements of the organization.]]>
Fri, 12 Aug 2022 13:02:40 GMT /slideshow/brkevt2311joekingpbrpptx/252527361 joelwking@slideshare.net(joelwking) BRKEVT-2311_joeking_pbr.pptx joelwking BRKEVT-2311 - Network Design and Implementation for IP Video Surveillance This session discusses the fundamentals of deploying IP video surveillance. It provides a foundation on selecting the type of IP cameras, the placement, field of view, resolution and frame rate to address the safety and security requirements of the organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/brkevt-2311joekingpbr-220812130240-3648e184-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> BRKEVT-2311 - Network Design and Implementation for IP Video Surveillance This session discusses the fundamentals of deploying IP video surveillance. It provides a foundation on selecting the type of IP cameras, the placement, field of view, resolution and frame rate to address the safety and security requirements of the organization.
BRKEVT-2311_joeking_pbr.pptx from Joel W. King
]]>
28 0 https://cdn.slidesharecdn.com/ss_thumbnails/brkevt-2311joekingpbr-220812130240-3648e184-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduction to GraphQL using Nautobot and Arista cEOS /joelwking/introduction-to-graphql-using-nautobot-and-arista-ceos intrographqlnautobotceos-220801172326-285b0cc9
GraphQL is a query language for APIs and has been adopted by popular web services, including GitHub, ArangoDB and Nautobot, a network automation platform. This session introduces GraphQL and demonstrates using Nautobot as a Source of Truth for managing the configuration of Arista Containerized EOS (cEOS) routers using Ansible. Network engineers who wish to learn GraphQL for Nautobot, Ansible, and cEOS will benefit from this session. A sample code repository will be published for attendees. ]]>

GraphQL is a query language for APIs and has been adopted by popular web services, including GitHub, ArangoDB and Nautobot, a network automation platform. This session introduces GraphQL and demonstrates using Nautobot as a Source of Truth for managing the configuration of Arista Containerized EOS (cEOS) routers using Ansible. Network engineers who wish to learn GraphQL for Nautobot, Ansible, and cEOS will benefit from this session. A sample code repository will be published for attendees. ]]>
Mon, 01 Aug 2022 17:23:26 GMT /joelwking/introduction-to-graphql-using-nautobot-and-arista-ceos joelwking@slideshare.net(joelwking) Introduction to GraphQL using Nautobot and Arista cEOS joelwking GraphQL is a query language for APIs and has been adopted by popular web services, including GitHub, ArangoDB and Nautobot, a network automation platform. This session introduces GraphQL and demonstrates using Nautobot as a Source of Truth for managing the configuration of Arista Containerized EOS (cEOS) routers using Ansible. Network engineers who wish to learn GraphQL for Nautobot, Ansible, and cEOS will benefit from this session. A sample code repository will be published for attendees. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intrographqlnautobotceos-220801172326-285b0cc9-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> GraphQL is a query language for APIs and has been adopted by popular web services, including GitHub, ArangoDB and Nautobot, a network automation platform. This session introduces GraphQL and demonstrates using Nautobot as a Source of Truth for managing the configuration of Arista Containerized EOS (cEOS) routers using Ansible. Network engineers who wish to learn GraphQL for Nautobot, Ansible, and cEOS will benefit from this session. A sample code repository will be published for attendees.
Introduction to GraphQL using Nautobot and Arista cEOS from Joel W. King
]]>
248 0 https://cdn.slidesharecdn.com/ss_thumbnails/intrographqlnautobotceos-220801172326-285b0cc9-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NetDevOps Development Environments /slideshow/netdevops-development-environments/249475930 netdevopsdevelopmentenvironments-210624144944
One challenge for a network engineer learning the tools of the trade for programmable networks is how to set up a development environment. The environment must be ephemeral, consistent, and repeatable with the instructor, your teammates and your study partner. In this session, we demonstrate how to use Visual Studio Code along with Vagrant, Docker and cloud compute environments. We will share sample configurations in GitLab and also a number of Jupyter Notebooks which can be used as study aides for the Cisco DevNet Certification exams. ]]>

One challenge for a network engineer learning the tools of the trade for programmable networks is how to set up a development environment. The environment must be ephemeral, consistent, and repeatable with the instructor, your teammates and your study partner. In this session, we demonstrate how to use Visual Studio Code along with Vagrant, Docker and cloud compute environments. We will share sample configurations in GitLab and also a number of Jupyter Notebooks which can be used as study aides for the Cisco DevNet Certification exams. ]]>
Thu, 24 Jun 2021 14:49:43 GMT /slideshow/netdevops-development-environments/249475930 joelwking@slideshare.net(joelwking) NetDevOps Development Environments joelwking One challenge for a network engineer learning the tools of the trade for programmable networks is how to set up a development environment. The environment must be ephemeral, consistent, and repeatable with the instructor, your teammates and your study partner. In this session, we demonstrate how to use Visual Studio Code along with Vagrant, Docker and cloud compute environments. We will share sample configurations in GitLab and also a number of Jupyter Notebooks which can be used as study aides for the Cisco DevNet Certification exams. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/netdevopsdevelopmentenvironments-210624144944-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> One challenge for a network engineer learning the tools of the trade for programmable networks is how to set up a development environment. The environment must be ephemeral, consistent, and repeatable with the instructor, your teammates and your study partner. In this session, we demonstrate how to use Visual Studio Code along with Vagrant, Docker and cloud compute environments. We will share sample configurations in GitLab and also a number of Jupyter Notebooks which can be used as study aides for the Cisco DevNet Certification exams.
NetDevOps Development Environments from Joel W. King
]]>
190 0 https://cdn.slidesharecdn.com/ss_thumbnails/netdevopsdevelopmentenvironments-210624144944-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DevNet Associate : Python introduction /slideshow/devnet-associate-python-introduction-249464341/249464341 pythonintroduction-210623140450
Companion presentation to https://github.com/joelwking/devnet-sdk]]>

Companion presentation to https://github.com/joelwking/devnet-sdk]]>
Wed, 23 Jun 2021 14:04:50 GMT /slideshow/devnet-associate-python-introduction-249464341/249464341 joelwking@slideshare.net(joelwking) DevNet Associate : Python introduction joelwking Companion presentation to https://github.com/joelwking/devnet-sdk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pythonintroduction-210623140450-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Companion presentation to https://github.com/joelwking/devnet-sdk
DevNet Associate : Python introduction from Joel W. King
]]>
217 0 https://cdn.slidesharecdn.com/ss_thumbnails/pythonintroduction-210623140450-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using Batfish for Network Analysis /joelwking/using-batfish-for-network-analysis rtp-meetup-batfish-210520151906
Refer to RTP Programmability and Automation Meetup Group: https://www.meetup.com/Cisco-Programmability-and-Automation-Meetup-Group/events/278002529/ As engineers embrace infrastructure-as-code, building in testing and sanity checks of the proposed changes becomes critical. Batfish is an open-source tool that does network configuration analysis. Some of the projects capabilities include analysis of system information, routing and forwarding tables, and ACLs. Batfish is written in python and is consumable in python, but also has Ansible modules available. ]]>

Refer to RTP Programmability and Automation Meetup Group: https://www.meetup.com/Cisco-Programmability-and-Automation-Meetup-Group/events/278002529/ As engineers embrace infrastructure-as-code, building in testing and sanity checks of the proposed changes becomes critical. Batfish is an open-source tool that does network configuration analysis. Some of the projects capabilities include analysis of system information, routing and forwarding tables, and ACLs. Batfish is written in python and is consumable in python, but also has Ansible modules available. ]]>
Thu, 20 May 2021 15:19:06 GMT /joelwking/using-batfish-for-network-analysis joelwking@slideshare.net(joelwking) Using Batfish for Network Analysis joelwking Refer to RTP Programmability and Automation Meetup Group: https://www.meetup.com/Cisco-Programmability-and-Automation-Meetup-Group/events/278002529/ As engineers embrace infrastructure-as-code, building in testing and sanity checks of the proposed changes becomes critical. Batfish is an open-source tool that does network configuration analysis. Some of the projects capabilities include analysis of system information, routing and forwarding tables, and ACLs. Batfish is written in python and is consumable in python, but also has Ansible modules available. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rtp-meetup-batfish-210520151906-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Refer to RTP Programmability and Automation Meetup Group: https://www.meetup.com/Cisco-Programmability-and-Automation-Meetup-Group/events/278002529/ As engineers embrace infrastructure-as-code, building in testing and sanity checks of the proposed changes becomes critical. Batfish is an open-source tool that does network configuration analysis. Some of the projects capabilities include analysis of system information, routing and forwarding tables, and ACLs. Batfish is written in python and is consumable in python, but also has Ansible modules available.
Using Batfish for Network Analysis from Joel W. King
]]>
614 0 https://cdn.slidesharecdn.com/ss_thumbnails/rtp-meetup-batfish-210520151906-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using Terraform to manage the configuration of a Cisco ACI fabric. /joelwking/using-terraform-to-manage-the-configuration-of-a-cisco-aci-fabric terraformautomationaciusersgroup-210514153323
Terraform is an open-source infrastructure as code software tool created by HashiCorp. It is written in GoLang. Cisco has developed an ACI terraform provider used to interact with the Cisco APIC. Network engineers define and provision the ACI infrastructure using a declarative configuration language known as HCL, HashiCorp Configuration Language. This session will begin with a short presentation on Terraform and how it can be used to manage resources in an ACI fabric. There is a companion GitLab repository (https://gitlab.com/joelwking/terraform_aci) which will be used as a demo environment. Attendees can download Vagrant and VirtualBox to their laptop and execute the demonstration using theCisco DevNet Always-on ACI sandbox.]]>

Terraform is an open-source infrastructure as code software tool created by HashiCorp. It is written in GoLang. Cisco has developed an ACI terraform provider used to interact with the Cisco APIC. Network engineers define and provision the ACI infrastructure using a declarative configuration language known as HCL, HashiCorp Configuration Language. This session will begin with a short presentation on Terraform and how it can be used to manage resources in an ACI fabric. There is a companion GitLab repository (https://gitlab.com/joelwking/terraform_aci) which will be used as a demo environment. Attendees can download Vagrant and VirtualBox to their laptop and execute the demonstration using theCisco DevNet Always-on ACI sandbox.]]>
Fri, 14 May 2021 15:33:23 GMT /joelwking/using-terraform-to-manage-the-configuration-of-a-cisco-aci-fabric joelwking@slideshare.net(joelwking) Using Terraform to manage the configuration of a Cisco ACI fabric. joelwking Terraform is an open-source infrastructure as code software tool created by HashiCorp. It is written in GoLang. Cisco has developed an ACI terraform provider used to interact with the Cisco APIC. Network engineers define and provision the ACI infrastructure using a declarative configuration language known as HCL, HashiCorp Configuration Language. This session will begin with a short presentation on Terraform and how it can be used to manage resources in an ACI fabric. There is a companion GitLab repository (https://gitlab.com/joelwking/terraform_aci) which will be used as a demo environment. Attendees can download Vagrant and VirtualBox to their laptop and execute the demonstration using theCisco DevNet Always-on ACI sandbox. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/terraformautomationaciusersgroup-210514153323-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Terraform is an open-source infrastructure as code software tool created by HashiCorp. It is written in GoLang. Cisco has developed an ACI terraform provider used to interact with the Cisco APIC. Network engineers define and provision the ACI infrastructure using a declarative configuration language known as HCL, HashiCorp Configuration Language. This session will begin with a short presentation on Terraform and how it can be used to manage resources in an ACI fabric. There is a companion GitLab repository (https://gitlab.com/joelwking/terraform_aci) which will be used as a demo environment. Attendees can download Vagrant and VirtualBox to their laptop and execute the demonstration using theCisco DevNet Always-on ACI sandbox.
Using Terraform to manage the configuration of a Cisco ACI fabric. from Joel W. King
]]>
616 0 https://cdn.slidesharecdn.com/ss_thumbnails/terraformautomationaciusersgroup-210514153323-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cisco IP Video Surveillance Design Guide /slideshow/cisco-ip-video-surveillance-design-guide/244529102 ipvsdg-210316184234
Cisco Validated Design: Building Architectures to Solve Business Problems]]>

Cisco Validated Design: Building Architectures to Solve Business Problems]]>
Tue, 16 Mar 2021 18:42:34 GMT /slideshow/cisco-ip-video-surveillance-design-guide/244529102 joelwking@slideshare.net(joelwking) Cisco IP Video Surveillance Design Guide joelwking Cisco Validated Design: Building Architectures to Solve Business Problems <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ipvsdg-210316184234-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cisco Validated Design: Building Architectures to Solve Business Problems
Cisco IP Video Surveillance Design Guide from Joel W. King
]]>
158 0 https://cdn.slidesharecdn.com/ss_thumbnails/ipvsdg-210316184234-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Meraki Virtual Hackathon: app for Splunk Phantom /slideshow/meraki-virtual-hackathon-vy-2020/234726585 merakivirtualhackathonfy20wwt-200529144435
The Meraki app for Splunk Phantom uses the Meraki dashboard API to locate end-user devices within one or more organizations, networks / devices, and to bind a configuration template to a specified network.]]>

The Meraki app for Splunk Phantom uses the Meraki dashboard API to locate end-user devices within one or more organizations, networks / devices, and to bind a configuration template to a specified network.]]>
Fri, 29 May 2020 14:44:35 GMT /slideshow/meraki-virtual-hackathon-vy-2020/234726585 joelwking@slideshare.net(joelwking) Meraki Virtual Hackathon: app for Splunk Phantom joelwking The Meraki app for Splunk Phantom uses the Meraki dashboard API to locate end-user devices within one or more organizations, networks / devices, and to bind a configuration template to a specified network. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/merakivirtualhackathonfy20wwt-200529144435-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Meraki app for Splunk Phantom uses the Meraki dashboard API to locate end-user devices within one or more organizations, networks / devices, and to bind a configuration template to a specified network.
Meraki Virtual Hackathon: app for Splunk Phantom from Joel W. King
]]>
312 0 https://cdn.slidesharecdn.com/ss_thumbnails/merakivirtualhackathonfy20wwt-200529144435-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Business Ready Teleworker Design Guide /slideshow/business-ready-teleworker-design-guide/230816356 businessreadyteleworkerdesignguide-200324194523
Initial Business Ready Teleworker Design Guide (Cisco Validated Design Guide) - authors: David Mindel and Joel W. King]]>

Initial Business Ready Teleworker Design Guide (Cisco Validated Design Guide) - authors: David Mindel and Joel W. King]]>
Tue, 24 Mar 2020 19:45:23 GMT /slideshow/business-ready-teleworker-design-guide/230816356 joelwking@slideshare.net(joelwking) Business Ready Teleworker Design Guide joelwking Initial Business Ready Teleworker Design Guide (Cisco Validated Design Guide) - authors: David Mindel and Joel W. King <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/businessreadyteleworkerdesignguide-200324194523-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Initial Business Ready Teleworker Design Guide (Cisco Validated Design Guide) - authors: David Mindel and Joel W. King
Business Ready Teleworker Design Guide from Joel W. King
]]>
323 0 https://cdn.slidesharecdn.com/ss_thumbnails/businessreadyteleworkerdesignguide-200324194523-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data manipulation for configuration management using Ansible /slideshow/data-manipulation-for-configuration-management-using-ansible/228652771 datamanipulationmeetupversionfinaljoelking-200219192654
Ansible Durham Meetup 19 February 2020]]>

Ansible Durham Meetup 19 February 2020]]>
Wed, 19 Feb 2020 19:26:53 GMT /slideshow/data-manipulation-for-configuration-management-using-ansible/228652771 joelwking@slideshare.net(joelwking) Data manipulation for configuration management using Ansible joelwking Ansible Durham Meetup 19 February 2020 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/datamanipulationmeetupversionfinaljoelking-200219192654-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ansible Durham Meetup 19 February 2020
Data manipulation for configuration management using Ansible from Joel W. King
]]>
169 0 https://cdn.slidesharecdn.com/ss_thumbnails/datamanipulationmeetupversionfinaljoelking-200219192654-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DevNet Study Group: Using a SDK /slideshow/devnet-study-group-using-a-sdk/223067670 usingasdk-200122163915
Training session for the World Wide Technology DevNet Study Group on Using a Software Development Kit (SDK).]]>

Training session for the World Wide Technology DevNet Study Group on Using a Software Development Kit (SDK).]]>
Wed, 22 Jan 2020 16:39:15 GMT /slideshow/devnet-study-group-using-a-sdk/223067670 joelwking@slideshare.net(joelwking) DevNet Study Group: Using a SDK joelwking Training session for the World Wide Technology DevNet Study Group on Using a Software Development Kit (SDK). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/usingasdk-200122163915-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Training session for the World Wide Technology DevNet Study Group on Using a Software Development Kit (SDK).
DevNet Study Group: Using a SDK from Joel W. King
]]>
124 0 https://cdn.slidesharecdn.com/ss_thumbnails/usingasdk-200122163915-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Foray into Ansible Content Collections /slideshow/foray-into-ansible-content-collections/206473338 forayintoansiblecontentcollections-191216195206
Overview on building and using Ansible Content Collections. To quote - https://www.wwt.com/article/ansiblefest-2019-retrospective Red Hat has announced Ansible Content Collections, a new packaging format for managing and consuming modules, plugins, roles, documentation and playbooks. This new package format, which leverages Ansible Galaxy, makes it easier for the community to consume this content without waiting for the next Ansible release. ]]>

Overview on building and using Ansible Content Collections. To quote - https://www.wwt.com/article/ansiblefest-2019-retrospective Red Hat has announced Ansible Content Collections, a new packaging format for managing and consuming modules, plugins, roles, documentation and playbooks. This new package format, which leverages Ansible Galaxy, makes it easier for the community to consume this content without waiting for the next Ansible release. ]]>
Mon, 16 Dec 2019 19:52:06 GMT /slideshow/foray-into-ansible-content-collections/206473338 joelwking@slideshare.net(joelwking) Foray into Ansible Content Collections joelwking Overview on building and using Ansible Content Collections. To quote - https://www.wwt.com/article/ansiblefest-2019-retrospective Red Hat has announced Ansible Content Collections, a new packaging format for managing and consuming modules, plugins, roles, documentation and playbooks. This new package format, which leverages Ansible Galaxy, makes it easier for the community to consume this content without waiting for the next Ansible release. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/forayintoansiblecontentcollections-191216195206-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Overview on building and using Ansible Content Collections. To quote - https://www.wwt.com/article/ansiblefest-2019-retrospective Red Hat has announced Ansible Content Collections, a new packaging format for managing and consuming modules, plugins, roles, documentation and playbooks. This new package format, which leverages Ansible Galaxy, makes it easier for the community to consume this content without waiting for the next Ansible release.
Foray into Ansible Content Collections from Joel W. King
]]>
144 2 https://cdn.slidesharecdn.com/ss_thumbnails/forayintoansiblecontentcollections-191216195206-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Analytics for Application Security and Policy Enforcement in Cloud Managed Networks /slideshow/analytics-for-application-security-and-policy-enforcement-in-cloud-managed-networks/142078460 analyticsforapplicationsecurityandpolicyenforcementincloudmanagednetworksjoelwking-190425044009
This talk provides insight into how network security will evolve in the next five years; a zero-trust model enabled thorough telemetry streaming, analytics, and policy publishing, using automation to implement policy through APIs in cloud managed networks.]]>

This talk provides insight into how network security will evolve in the next five years; a zero-trust model enabled thorough telemetry streaming, analytics, and policy publishing, using automation to implement policy through APIs in cloud managed networks.]]>
Thu, 25 Apr 2019 04:40:09 GMT /slideshow/analytics-for-application-security-and-policy-enforcement-in-cloud-managed-networks/142078460 joelwking@slideshare.net(joelwking) Analytics for Application Security and Policy Enforcement in Cloud Managed Networks joelwking This talk provides insight into how network security will evolve in the next five years; a zero-trust model enabled thorough telemetry streaming, analytics, and policy publishing, using automation to implement policy through APIs in cloud managed networks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/analyticsforapplicationsecurityandpolicyenforcementincloudmanagednetworksjoelwking-190425044009-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This talk provides insight into how network security will evolve in the next five years; a zero-trust model enabled thorough telemetry streaming, analytics, and policy publishing, using automation to implement policy through APIs in cloud managed networks.
Analytics for Application Security and Policy Enforcement in Cloud Managed Networks from Joel W. King
]]>
384 4 https://cdn.slidesharecdn.com/ss_thumbnails/analyticsforapplicationsecurityandpolicyenforcementincloudmanagednetworksjoelwking-190425044009-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Enabling policy migration in the Data Center with Ansible /slideshow/enabling-policy-migration-in-the-data-center-with-ansible/141119217 ansiblemeetupapril2019final-190417191121
At AnsibleFest Austin 2018, we demonstrated using Ansible to extract policy from Cisco Tetration Analytics and expose it as variables to playbooks. The internal World Wide Technology IT department is migrating from a traditional Nexus fabric to Application Centric Infrastructure (ACI). This talk describes how Ansible is used to migrate policy to, and automate the configuration of, the new data center fabric. ]]>

At AnsibleFest Austin 2018, we demonstrated using Ansible to extract policy from Cisco Tetration Analytics and expose it as variables to playbooks. The internal World Wide Technology IT department is migrating from a traditional Nexus fabric to Application Centric Infrastructure (ACI). This talk describes how Ansible is used to migrate policy to, and automate the configuration of, the new data center fabric. ]]>
Wed, 17 Apr 2019 19:11:21 GMT /slideshow/enabling-policy-migration-in-the-data-center-with-ansible/141119217 joelwking@slideshare.net(joelwking) Enabling policy migration in the Data Center with Ansible joelwking At AnsibleFest Austin 2018, we demonstrated using Ansible to extract policy from Cisco Tetration Analytics and expose it as variables to playbooks. The internal World Wide Technology IT department is migrating from a traditional Nexus fabric to Application Centric Infrastructure (ACI). This talk describes how Ansible is used to migrate policy to, and automate the configuration of, the new data center fabric. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ansiblemeetupapril2019final-190417191121-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> At AnsibleFest Austin 2018, we demonstrated using Ansible to extract policy from Cisco Tetration Analytics and expose it as variables to playbooks. The internal World Wide Technology IT department is migrating from a traditional Nexus fabric to Application Centric Infrastructure (ACI). This talk describes how Ansible is used to migrate policy to, and automate the configuration of, the new data center fabric.
Enabling policy migration in the Data Center with Ansible from Joel W. King
]]>
812 2 https://cdn.slidesharecdn.com/ss_thumbnails/ansiblemeetupapril2019final-190417191121-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using Tetration for application security and policy enforcement in multi-vendor environments. /slideshow/using-tetration-for-application-security-and-policy-enforcement-in-multivendor-environments/121564126 networkpolicypublisher-181102154111
Network engineers increasingly must view the network as one big software system, which streams telemetry data from software sensors and network devices to an analytics engine. To implement the whitelist-based segmentation and zero-trust policy model generated from the data analysis, automation is a requirement when dealing with tens of thousands of workloads and complex rules. This session examines how Cisco Tetration Analytics combined with automation can be used to implement a zero-trust policy model on multi-vendor network fabrics, firewalls and application delivery controllers. ]]>

Network engineers increasingly must view the network as one big software system, which streams telemetry data from software sensors and network devices to an analytics engine. To implement the whitelist-based segmentation and zero-trust policy model generated from the data analysis, automation is a requirement when dealing with tens of thousands of workloads and complex rules. This session examines how Cisco Tetration Analytics combined with automation can be used to implement a zero-trust policy model on multi-vendor network fabrics, firewalls and application delivery controllers. ]]>
Fri, 02 Nov 2018 15:41:11 GMT /slideshow/using-tetration-for-application-security-and-policy-enforcement-in-multivendor-environments/121564126 joelwking@slideshare.net(joelwking) Using Tetration for application security and policy enforcement in multi-vendor environments. joelwking Network engineers increasingly must view the network as one big software system, which streams telemetry data from software sensors and network devices to an analytics engine. To implement the whitelist-based segmentation and zero-trust policy model generated from the data analysis, automation is a requirement when dealing with tens of thousands of workloads and complex rules. This session examines how Cisco Tetration Analytics combined with automation can be used to implement a zero-trust policy model on multi-vendor network fabrics, firewalls and application delivery controllers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/networkpolicypublisher-181102154111-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Network engineers increasingly must view the network as one big software system, which streams telemetry data from software sensors and network devices to an analytics engine. To implement the whitelist-based segmentation and zero-trust policy model generated from the data analysis, automation is a requirement when dealing with tens of thousands of workloads and complex rules. This session examines how Cisco Tetration Analytics combined with automation can be used to implement a zero-trust policy model on multi-vendor network fabrics, firewalls and application delivery controllers.
Using Tetration for application security and policy enforcement in multi-vendor environments. from Joel W. King
]]>
724 6 https://cdn.slidesharecdn.com/ss_thumbnails/networkpolicypublisher-181102154111-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using Ansible Tower to implement security policies and telemetry streaming for hybrid clouds /slideshow/using-ansible-tower-to-implement-security-policies-and-telemetry-streaming-for-hybrid-clouds/117138995 ansiblefest2018joelkingtetrationfinal-180928183143
Network analytics provides insight to the traffic flow between applications and endpoints. Telemetry data is streamed in real-time from software sensors and network devices to big-data clusters. Implementing the policy to create a whitelist-based segmentation and zero-trust model requires automation when dealing with tens of thousands of workloads and complex rules. This session examines how Cisco Tetration Analytics provides an accurate inventory of devices, software packages and version information to detect software vulnerabilities and implement a zero-trust policy model on network fabrics, firewalls and application delivery controllers. ]]>

Network analytics provides insight to the traffic flow between applications and endpoints. Telemetry data is streamed in real-time from software sensors and network devices to big-data clusters. Implementing the policy to create a whitelist-based segmentation and zero-trust model requires automation when dealing with tens of thousands of workloads and complex rules. This session examines how Cisco Tetration Analytics provides an accurate inventory of devices, software packages and version information to detect software vulnerabilities and implement a zero-trust policy model on network fabrics, firewalls and application delivery controllers. ]]>
Fri, 28 Sep 2018 18:31:43 GMT /slideshow/using-ansible-tower-to-implement-security-policies-and-telemetry-streaming-for-hybrid-clouds/117138995 joelwking@slideshare.net(joelwking) Using Ansible Tower to implement security policies and telemetry streaming for hybrid clouds joelwking Network analytics provides insight to the traffic flow between applications and endpoints. Telemetry data is streamed in real-time from software sensors and network devices to big-data clusters. Implementing the policy to create a whitelist-based segmentation and zero-trust model requires automation when dealing with tens of thousands of workloads and complex rules. This session examines how Cisco Tetration Analytics provides an accurate inventory of devices, software packages and version information to detect software vulnerabilities and implement a zero-trust policy model on network fabrics, firewalls and application delivery controllers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ansiblefest2018joelkingtetrationfinal-180928183143-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Network analytics provides insight to the traffic flow between applications and endpoints. Telemetry data is streamed in real-time from software sensors and network devices to big-data clusters. Implementing the policy to create a whitelist-based segmentation and zero-trust model requires automation when dealing with tens of thousands of workloads and complex rules. This session examines how Cisco Tetration Analytics provides an accurate inventory of devices, software packages and version information to detect software vulnerabilities and implement a zero-trust policy model on network fabrics, firewalls and application delivery controllers.
Using Ansible Tower to implement security policies and telemetry streaming for hybrid clouds from Joel W. King
]]>
890 4 https://cdn.slidesharecdn.com/ss_thumbnails/ansiblefest2018joelkingtetrationfinal-180928183143-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Super-NetOps Source of Truth /slideshow/supernetops-source-of-truth-110053045/110053045 super-netopssourceoftruthfinalf5agility18-180816024733
View IT operations as a flow of data (Sources of Truth) thru work-cells (automation processes) to deliver value to the customer. There should be only one source of truth for every piece of configuration data. Device configurations are poor source of truth.]]>

View IT operations as a flow of data (Sources of Truth) thru work-cells (automation processes) to deliver value to the customer. There should be only one source of truth for every piece of configuration data. Device configurations are poor source of truth.]]>
Thu, 16 Aug 2018 02:47:33 GMT /slideshow/supernetops-source-of-truth-110053045/110053045 joelwking@slideshare.net(joelwking) Super-NetOps Source of Truth joelwking View IT operations as a flow of data (Sources of Truth) thru work-cells (automation processes) to deliver value to the customer. There should be only one source of truth for every piece of configuration data. Device configurations are poor source of truth. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/super-netopssourceoftruthfinalf5agility18-180816024733-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> View IT operations as a flow of data (Sources of Truth) thru work-cells (automation processes) to deliver value to the customer. There should be only one source of truth for every piece of configuration data. Device configurations are poor source of truth.
Super-NetOps Source of Truth from Joel W. King
]]>
804 2 https://cdn.slidesharecdn.com/ss_thumbnails/super-netopssourceoftruthfinalf5agility18-180816024733-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Super-NetOps Source of Truth /slideshow/supernetops-source-of-truth/109835686 super-netopssourceoftruth-180814150104
Backup copy prior to leaving for airport]]>

Backup copy prior to leaving for airport]]>
Tue, 14 Aug 2018 15:01:04 GMT /slideshow/supernetops-source-of-truth/109835686 joelwking@slideshare.net(joelwking) Super-NetOps Source of Truth joelwking Backup copy prior to leaving for airport <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/super-netopssourceoftruth-180814150104-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Backup copy prior to leaving for airport
Super-NetOps Source of Truth from Joel W. King
]]>
94 4 https://cdn.slidesharecdn.com/ss_thumbnails/super-netopssourceoftruth-180814150104-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduction to Git for Network Engineers (Lab Guide) /slideshow/introduction-to-git-for-network-engineers-lab-guide/105567258 introductiontogitfornetworkengineers-180712155224
Introduction to Git for Network Engineers (Lab Guide)]]>

Introduction to Git for Network Engineers (Lab Guide)]]>
Thu, 12 Jul 2018 15:52:24 GMT /slideshow/introduction-to-git-for-network-engineers-lab-guide/105567258 joelwking@slideshare.net(joelwking) Introduction to Git for Network Engineers (Lab Guide) joelwking Introduction to Git for Network Engineers (Lab Guide) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/introductiontogitfornetworkengineers-180712155224-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Introduction to Git for Network Engineers (Lab Guide)
Introduction to Git for Network Engineers (Lab Guide) from Joel W. King
]]>
429 4 https://cdn.slidesharecdn.com/ss_thumbnails/introductiontogitfornetworkengineers-180712155224-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-joelwking-48x48.jpg?cb=1695825211 programmable.networks@gmail.com | (919) 886-5635 | @joel_w_king A network solutions architect in a programmable network world must be capable of more than designing and building computer networks. I have experience in network solutions engineering with a broad IT infrastructure background including compute and storage. I am equally adept presenting the concept of Software Defined everything to a group of CTOs or conducting a workshop on developing Ansible Python modules for network automation. I have developed content and was a highly rated speaker at CiscoLive! and NetApp Insight, and more recently for NPUG Network Programmability Users Group, Ansible Meetups and the se... https://cdn.slidesharecdn.com/ss_thumbnails/devnetcreate2021joelwking-220812131149-fe9959da-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/devnetcreate2021joelwkingpptx/252527425 DevNetCreate_2021_joel... https://cdn.slidesharecdn.com/ss_thumbnails/brkevt-2311joekingpbr-220812130240-3648e184-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/brkevt2311joekingpbrpptx/252527361 BRKEVT-2311_joeking_pb... https://cdn.slidesharecdn.com/ss_thumbnails/intrographqlnautobotceos-220801172326-285b0cc9-thumbnail.jpg?width=320&height=320&fit=bounds joelwking/introduction-to-graphql-using-nautobot-and-arista-ceos Introduction to GraphQ...