Cisco Innovation Labs Tour
6:40
Cisco Innovation Labs Tour
Related Videos
In DevNet Create 2021
-
Play video Secure CN - Securing Cloud Native Applications
Secure CN - Securing Cloud Native Applications
Cloud-native application security involves balancing the benefits of cloud services in accelerating development while at the same time handling security in an adverse environment with more attack surfaces and opportunities for data breaches.
20:09
-
Play video Kafka real-time data streaming for Network Engineers
Kafka real-time data streaming for Network Engineers
Apache Kafka is an open-source framework implementation of a high-throughput, low-latency data streaming service. Originally developed by LinkedIn, it is now open-sourced and used by large and small companies worldwide.
19:41
-
Play video Watch how streaming telemetry, open-source tooling, and APIs turn into an amazing BBQ setup. DevNet Snack Minute Episode 42.
Watch how streaming telemetry, open-source tooling, and APIs turn into an amazing BBQ setup. DevNet Snack Minute Episode 42.
Join Matt and Kareem as they chat with Developer Advocate Quinn Snyder, as he demonstrates using streaming telemetry concepts and open-source tooling, along with some handy APIs, to achieve perfect data-driven outcomes and delicious meal results.
16:46
-
Play video Automate the Network with WEB GUI PYnetwork
Automate the Network with WEB GUI PYnetwork
It is a Web based Network Automation tool, Backend - flask, front-end React and Material UI and database is sqlite.
9:37
-
Play video Automated ESXi Installs
Automated ESXi Installs
Ever installed ESXi so many times that yellow console screen is burned into your eyes? Using basic DevNet concepts like Python, a Web Page, and APIs, this code enables mass ESXi deployments on Cisco Platforms without logging into an ESXi console.
8:17
-
Play video Shift Left Security: How Developers can Assume Responsibility on their Apps
Shift Left Security: How Developers can Assume Responsibility on their Apps
Cloud applications/microservices architecture require a shift left in responsibilities, both deployments and security aspects.
18:44