This commit is contained in:
2023-11-11 11:45:03 -07:00
parent 59817de0a3
commit 9fea7f6764
21 changed files with 0 additions and 341 deletions

View File

@@ -0,0 +1,19 @@
# Business Challenge:
Many businesses utilize hardware with advanced capabilities while overlooking the vast functionality these devices can deliver to their business due to a lack of knowledge or expertise about what is possible. The outcome of this typically means lower diverse hardware sales and missed opportunities to provide further services that improve customer experiences, and higher customer satisfaction.
## Solution:
## Solution Architecture:
To address this challenge, a solution architect provided by TBX will work with your end customer to design a custom solution that leverages the capabilities of their Meraki hardware. All deliverables will be provided in a timely manner and in a format agreed upon by the client and the API developer. Any changes to the deliverables or the project scope will be communicated promptly and agreed upon by both parties before proceeding.
The solution would involve the following components:
- Consultation
- Source code using the Meraki API library
- API documentation utilizing the Meraki API library
- Example of API usage using the Meraki API library
- Test results and report using the Meraki API library
- Deployment plan
- Support and maintenance plan utilizing the Meraki API library

37
work/JD.md Normal file
View File

@@ -0,0 +1,37 @@
Job Title: Senior Solutions Engineer
Job Summary:
We are seeking an experienced Senior Solutions Engineer to join our team. The ideal candidate will have a solid technical background, excellent communication and interpersonal skills, and experience with networking, presales, solutions engineering, and project management. In addition, the candidate should have extensive experience with the Meraki Python Library and be able to develop customized scripts for the Meraki product line and their documented APIs and webhooks.
Responsibilities:
Develop custom scripts using the Meraki Python Library to interact with the Meraki Dashboard API
Collaborate with the sales team to identify opportunities for customized Meraki Dashboard API solutions that meet the needs of clients and prospects
Develop and maintain relationships with key customers and partners
Manage multiple projects and priorities simultaneously
Conduct product demonstrations and proofs-of-concept to showcase the capabilities of customized software solutions
Act as a subject matter expert on technical aspects of customized software solutions during client-facing meetings and presentations
Develop and maintain coding standards and best practices to ensure consistency and maintainability of code across the organization.
Manage the source code repository, including creating and maintaining branches, managing merges, and resolving conflicts.
Ensure that code is appropriately versioned and labeled and that release notes are correctly supported and documented.
Develop and maintain tools and processes for code analysis, enforce code review processes and vulnerability scanning, and ensure that all code meets established security standards.
Develop and maintain wayfinding and mapping applications for indoor and outdoor environments using technologies such as Bluetooth beacons, Wi-Fi positioning, and GPS
Design and implement guest Wi-Fi solutions that provide a seamless and secure user experience, and integrate with other systems, such as CRM and marketing automation platforms
Develop and maintain asset-tracking solutions using RFID, BLE, and GPS technologies to help organizations track and manage their physical assets.
Develop and maintain video analytics solutions that analyze video feeds in real-time to detect and alert on events such as intrusions, accidents, and abnormal behavior.
Develop and maintain IoT solutions that integrate with the Meraki Dashboard API to enable the collection and analysis of data from sensors and other IoT devices.
Develop and maintain security solutions that integrate with Meraki Dashboard API to provide enhanced security features such as access control, intrusion detection and prevention, and security monitoring.
Develop and maintain customized software solutions for networking automation, wayfinding and mapping, guest Wi-Fi, asset tracking, video analytics, IoT, and security.
Requirements:
Bachelor's degree in Computer Science, Engineering, or a related field
5+ years of programming experience with expertise in Python and other scripting languages
3+ years of experience in networking, including LAN, WAN, VPN, and wireless networking technologies
3+ years of experience in programming, with a focus on network automation and the Meraki Dashboard API, wayfinding, and mapping, guest Wi-Fi, asset tracking, video analytics, IoT, and security
Expertise in Python programming language and experience with Meraki Python Library
Experience in presales, solution engineering, or technical consulting
Experience with web development technologies such as HTML, CSS, and JavaScript
Strong problem-solving skills and ability to work independently
Excellent communication skills with the ability to explain technical concepts to non-technical stakeholders
Job Summary:
We are seeking a Senior Solutions Engineer to join our dynamic team. The successful candidate will be responsible for developing and implementing customized software solutions, focusing on integrating networking and security protocols. This role will require a blend of programming expertise, networking experience, and presales and solution experience.

52
work/Lumen_Analysis.md Normal file
View File

@@ -0,0 +1,52 @@
# CenturyLink Cisco Quotes Data Analysis
This report presents an analysis of the CenturyLink Cisco quotes dataset, focusing on key aspects related to revenue.
## Time Range and Unique Counts
The dataset spans from July 26, 2016, to July 7, 2023. It includes:
- 194 unique quote contacts
- 8,862 unique quote names
- 7 unique quote statuses
- 2,459 unique end customers
## Revenue Distribution
The distribution of revenue shows that most of the revenues are quite low, with a few quotes generating higher revenues. Here are two representations of the distribution:
1. Using a logarithmic scale to manage the wide range of values:
![Distribution of Revenue (Log Scale)](revenue_distribution_log.png)
2. Excluding outliers defined using the Interquartile Range (IQR) method:
![Distribution of Revenue (Excluding Outliers)](revenue_distribution_no_outliers.png)
## Quote Status Distribution
![Distribution of Quote Statuses](quote_status_distribution.png)
In terms of quote statuses, most of the quotes have been won (15,826), followed by expired (3,659). There are relatively few quotes in process (26), under review (6), or being reprocessed (2). There are also 10 quotes that were lost.
## Revenue Analysis by Quote Status and Contact
Interestingly, the average revenue for "Lost" quotes is high, second only to "Expired" quotes. This might be worth further investigation to understand why high-revenue quotes are being lost.
![Average Revenue by Quote Status](avg_revenue_quote_status.png)
The revenues associated with different quote contacts vary significantly, with the top contacts bringing in considerably higher revenues. This could indicate differences in the types of customers or deals that different contacts are responsible for.
![Average Revenue by Quote Contact (Top 10)](avg_revenue_quote_contact.png)
## Top Customers in Terms of Revenue Generated
The top customers in terms of revenue generated are:
1. Undisclosed ("-"): \$1,900,361,000
2. USDA OCIO ITS TOB: \$154,582,100
3. HCA INFORMATION TECHNOLOGY & SERVICES INC: \$21,844,500
4. Department of Defense: \$20,483,950
5. State of Colorado: \$15,900,850
Please note that these insights are preliminary and might require more in-depth analysis for confirmation.

31
work/Lumen_Analysis_2.md Normal file
View File

@@ -0,0 +1,31 @@
# Key Insights for Account Executives
This document presents key insights derived from the CenturyLink Cisco Quotes and CenturyLink Disti Quotes datasets. The following points focus on aspects that account executives should consider, such as top revenues, top accounts, and top sales contacts.
## Top Revenues
1. The distribution of revenue shows that most of the revenues are quite low, with a few quotes generating very high revenues. This might suggest that the company has a few key clients that contribute significantly to the overall revenue. It's crucial to maintain strong relationships with these clients and explore opportunities for further business.
![Distribution of Revenue (Excluding Outliers)](revenue_distribution_no_outliers.png)
2. Interestingly, the average revenue for "Lost" quotes is high, second only to "Expired" quotes. This indicates that the company is potentially missing out on significant revenue opportunities. It would be worthwhile to investigate why these high-revenue quotes are being lost and develop strategies to improve the win rate.
![Average Revenue by Quote Status (Dataset 2)](new_avg_revenue_quote_status.png)
3. The average revenue is higher for the CDSD - Federal CenturyLink sales channel compared to the CenturyLink Distribution channel. If possible, increasing the number of quotes in the CDSD - Federal CenturyLink channel could lead to higher overall revenues.
![Average Revenue by Sales Channel](avg_revenue_sales_channel.png)
## Top Accounts
1. The top customers in terms of revenue generated are Undisclosed ("-"), USDA OCIO ITS TOB, HCA INFORMATION TECHNOLOGY & SERVICES INC, Department of Defense, and State of Colorado. These accounts are extremely valuable and should be handled with utmost priority. Understanding their needs and ensuring their satisfaction could lead to sustained and potentially increased revenue.
## Top Sales Contacts
1. The revenues associated with different quote contacts vary significantly. The top contacts, namely Richard Piorkowski, Heather Simpson, Joseph Maule, Jonathan Sullivan, and Taylor Mangum, bring in considerably higher revenues. This could indicate their expertise in handling large accounts or high-value deals. It might be beneficial for other account executives to learn from their strategies and techniques.
![Average Revenue by Quote Contact (Top 10, Dataset 2)](new_avg_revenue_quote_contact.png) 2. Most of the quotes are from the CenturyLink Distribution sales channel. However, the CDSD - Federal CenturyLink channel, despite having fewer quotes, generates higher average revenue per quote. This suggests that the CDSD - Federal CenturyLink channel deals with higher-value clients or projects. Account executives should consider this while planning and prioritizing their efforts.
![Distribution of Sales Channels](sales_channel_distribution.png)
Please note that these insights are preliminary and should serve as a starting point for further in-depth analysis.

26
work/flash(1).md Normal file
View File

@@ -0,0 +1,26 @@
**Open opportunities (Top deals)**
T-Mobile - Brandon any myself are meeting with Mark Haase, the manager of the product offering group, this week. We're meeting his team Thursday and Friday to learn of the new product offerings TMO is looking to launch.
**Passion for Learning (trainings and conferences)**
Fortinet NSE5 Network Security Analyst
Cisco CCNA/CCNP certificaions for Enterprice and Security
CCIE Security is the end goal
Met with Alex Hoecht a Technical Solutions Architect at WWT to learn how he's setting up automation tasks using SaleForce data. I'm going to start an effort of carrying on his effort using TBX data to make this functionallity useful to the TBX line of business
**Internal Activities**
WWT GSP Mobility, Cloud and Edge GTM
EE201: SD-WAN
ATSM
Steph/Emerging Touch Point
TBX Team Meeting
Jason & Moe 1:1
Report Automation
WWT | Fortinet Office Hours
Weekly Internal Emerging Accounts Meeting- Charter/Comcast
Weekly Internal Emerging Accounts Meeting- Lumen/Eplus
While in Seattle I'm going to the WWT office to meet with Scott Lauridsen and the local team. Was informed that they're working out of a conference room on Wednesday and they invited me to come join them for a meet and greet.
**Travel planning**
T-Mobile - Seattle 7/26-28
Cisco Impact - Las Vegas

26
work/flash.md Normal file
View File

@@ -0,0 +1,26 @@
**Open opportunities (Top deals)**
T-Mobile - Brandon any myself are meeting with Mark Haase, the manager of the product offering group, this week. We're meeting his team Thursday and Friday to learn of the new product offerings TMO is looking to launch.
**Passion for Learning (trainings and conferences)**
Fortinet NSE5 Network Security Analyst
Cisco CCNA/CCNP certificaions for Enterprice and Security
CCIE Security is the end goal
Met with Alex Hoecht a Technical Solutions Architect at WWT to learn how he's setting up automation tasks using SaleForce data. I'm going to start an effort of carrying on his effort using TBX data to make this functionallity useful to the TBX line of business
**Internal Activities**
WWT GSP Mobility, Cloud and Edge GTM
EE201: SD-WAN
ATSM
Steph/Emerging Touch Point
TBX Team Meeting
Jason & Moe 1:1
Report Automation
WWT | Fortinet Office Hours
Weekly Internal Emerging Accounts Meeting- Charter/Comcast
Weekly Internal Emerging Accounts Meeting- Lumen/Eplus
While in Seattle I'm going to the WWT office to meet with Scott Lauridsen and the local team. Was informed that they're working out of a conference room on Wednesday and they invited me to come join them for a meet and greet.
**Travel planning**
T-Mobile - Seattle 7/26-28
Cisco Impact - Las Vegas

36
work/lumen.md Normal file
View File

@@ -0,0 +1,36 @@
# Analysis of Lumen YE Pipeline 2023 Data
The data contains information about different opportunities, their sizes, associated deal ID and quote numbers, the requestors for each opportunity, any additional comments, and the status and booking information.
## Data Cleaning and Processing
The raw data required some cleaning and processing. The 'Size' column was cleaned to remove the dollar sign and comma, and then converted to a float for numerical operations. The 'Deal ID' and 'Quote #' columns were filled with 0 for missing values and converted to integers. The 'Priority', 'Status', and 'Booked?' columns were filled with 'Unknown' for missing values.
## Data Statistics
Here are some basic statistics from the data:
- There are 16 unique opportunities.
- There are 7 unique requestors.
- The total size of all opportunities is approximately \$11,179,974.
- The largest opportunity size is approximately \$2,013,258.
- The smallest opportunity size is approximately \$162,567.
- The average opportunity size is approximately \$621,110.
## Data Insights
From the data, we can derive several insights:
1. **Top Opportunities by Size**: The top 5 opportunities by total size are BAUSCH HEALTH, CHARTER MANUFACTURING, FIRST FINANCIAL BANCORP, XPO LOGISTICS INC, and POLSINELLI PC. The bar plot below shows these top opportunities:
![Top 5 Opportunities by Size](top_opportunities.png)
2. **Top Requestors by Total Size of Opportunities**: The top 5 requestors by total size of opportunities they handle are Tony Ng, Ben Koenig, Ricky Hale, Jim Schmidt, and Warren Wilson. The bar plot below shows these top requestors:
![Top 5 Requestors by Total Size of Opportunities](opportunities_per_requestor.png)
3. **Number of Opportunities per Requestor**: Ben Koenig, Tony Ng, and Jim Schmidt have the most opportunities, with Ben handling 5 and Tony and Jim each handling 3. Ricky Hale, Warren Wilson, and Barbara Hall each handle 2 opportunities, and Douglas Scott handles 1 opportunity. The bar plot below shows the number of opportunities per requestor:
![Number of Opportunities per Requestor](top_requestors.png)
Based on these insights, it seems that the opportunities associated with "BAUSCH HEALTH", "CHARTER MANUFACTURING", and "FIRST FINANCIAL BANCORP" are quite substantial and may be worth focusing on. Similarly, the requestors "Tony Ng", "Ben Koenig", and "Ricky Hale" manage significant total sizes of opportunities and might be key players in this context.

52
work/lumen2.md Normal file
View File

@@ -0,0 +1,52 @@
# CenturyLink Cisco Quotes Data Analysis
This data analysis is based on a dataset containing quote details from CenturyLink for Cisco products.
## Dataset Overview
The dataset contains 20,082 unique quotes. Each quote includes details such as the quote creation date, quote number, quote contact, quote name, quote status, quote value (sum of extended rev buy curr), and the end customer name.
## Key Insights
### 1. High Value Quotes
The dataset includes a wide range of quote values, from a minimum of $0 to a maximum of approximately $405 million. This large range suggests that some quotes are for significantly higher values than others. Identifying the characteristics of these high-value quotes could provide insights for generating more such quotes in the future.
![Histogram of Quote Values](quote_status_distribution.png)
### 2. Quote Status
The majority of quotes (15,826 out of 20,082) are in the 'WON' status. However, a significant number (3,659) are also in the 'EXPIRED' status. Understanding the reasons why these quotes expired could provide insights for improving the quote conversion rate.
![Distribution of Quote Statuses](quote_value_distribution.png)
### 3. Top Customers
Certain customers have significantly higher total quote values than others. The top customer, represented by '-', has a total quote value of approximately $1.9 billion. Other notable customers include 'USDA OCIO ITS TOB' and 'HCA INFORMATION TECHNOLOGY & SERVICES INC'. Focusing on these high-value customers could be beneficial for business growth.
![Top 10 Customers by Total Quote Value](top_customers_quote_value.png)
### 4. Quote Value Distribution
The distribution of quote values is skewed, with a mean of $122,493 and a median of $1,947.65. This suggests that while most quotes are of lower value, there are a few quotes with very high values that increase the mean.
### 5. Time Trends
The total quote value fluctuates over time, with significant spikes on certain dates. Understanding the reasons for these fluctuations could help in predicting future trends and optimizing the timing of quote generation.
![Trend of Quote Values Over Time](quote_value_trend.png)
### 6. Missing/Unspecified Data
A large amount of quote value is associated with '-' in the 'End Customer Name' field. This could represent missing data, and understanding why this data is missing could be important for improving data collection and analysis processes.
## Recommendations
Based on the above insights, here are some recommendations:
1. Investigate the characteristics of high-value quotes to understand how to generate more such quotes.
2. Analyze expired quotes to identify any common factors that could be addressed to improve the quote conversion rate.
3. Focus on high-value customers and understand their needs and preferences to maintain and expand business relationships with them.
4. Consider stratifying the quote value distribution for more detailed insights and to inform the pricing strategy.
5. Analyze the time trends in more detail to identify any seasonal patterns or other time-related factors that influence quote values.
6. Improve data collection and cleaning processes to minimize the amount of missing or unspecified data.

View File

@@ -0,0 +1,15 @@
1. Define the problem: Start by defining the problem that your product solves. This could be a technical issue or a business challenge. Clearly explain why your product is the best solution.
2. Highlight the key features: List the key features of your product and explain how they address the problem. Use visuals such as diagrams and infographics to illustrate your points.
3. Discuss the benefits: Describe the benefits of your product in detail. This could include increased efficiency, cost savings, or improved customer satisfaction. Use case studies or customer testimonials to demonstrate how your product has benefited others.
4. Show the technical specifications: Provide technical details about your product, such as its size, weight, power consumption, and compatibility with other systems. Include any technical diagrams or schematics that help explain the workings of the product.
5. Explain the implementation process: Explain how your product will be installed or implemented, including any required training or technical support. Provide a clear timeline and budget for the implementation process.
6. Address any objections: Anticipate any objections that potential customers might have and address them in the document. This could include concerns about cost, compatibility with existing systems, or potential downtime during implementation.
7. Provide a call-to-action: End the document with a clear call-to-action, such as scheduling a demo or contacting a sales representative. Provide contact information and any additional resources that might be helpful for potential customers.
#Work

13
work/use case example.md Normal file
View File

@@ -0,0 +1,13 @@
ABC Corp is a mid-sized business that provides IT services to other businesses. They rely heavily on cloud-based tools and services, such as Microsoft Office 365, Salesforce, and Amazon Web Services, to provide their services. They also use communication tools such as email, instant messaging, and video conferencing to communicate with their clients.
ABC Corp was experiencing frequent cyber attacks, such as phishing attempts and malware infections, which were affecting their ability to provide reliable and secure services to their clients. They realized that they needed a robust cybersecurity solution to protect their network infrastructure, cloud-based tools and services, and communication tools from these cyber threats.
ABC Corp decided to implement the Fortinet product line, including FortiGate firewalls, FortiMail email security gateway, and FortiWeb web application firewall, to provide advanced threat protection and network security. They also implemented FortiSIEM for real-time threat detection and analysis.
After implementing the Fortinet product line, ABC Corp saw a significant improvement in their cybersecurity posture. They were able to detect and prevent cyber attacks before they caused any damage, ensuring that their clients' data and systems were secure. The FortiMail email security gateway helped them filter out spam and phishing attempts, reducing the number of malicious emails that their employees received. The FortiWeb web application firewall helped them protect their e-commerce platform and other web-based applications from cyber threats.
Additionally, FortiSIEM provided real-time threat detection and analysis, allowing ABC Corp to respond quickly to potential security incidents. The FortiToken two-factor authentication solution also provided an additional layer of security to user logins, ensuring that only authorized users had access to sensitive data.
Overall, the Fortinet product line helped ABC Corp maintain a safe and reliable infrastructure, enabling them to provide their clients with reliable and secure IT services. The robust cybersecurity solutions provided by Fortinet allowed them to operate their cloud-based tools and services, communication tools, and e-commerce platform with greater confidence and security, protecting their business and their clients from cyber threats.
#work #Fortinet