major updates

This commit is contained in:
2023-11-11 11:58:29 -07:00
parent 59dbccc06b
commit c004edde5d
36 changed files with 0 additions and 597 deletions

View File

@@ -0,0 +1,19 @@
# Business Challenge:
Many businesses utilize hardware with advanced capabilities while overlooking the vast functionality these devices can deliver to their business due to a lack of knowledge or expertise about what is possible. The outcome of this typically means lower diverse hardware sales and missed opportunities to provide further services that improve customer experiences, and higher customer satisfaction.
## Solution:
## Solution Architecture:
To address this challenge, a solution architect provided by TBX will work with your end customer to design a custom solution that leverages the capabilities of their Meraki hardware. All deliverables will be provided in a timely manner and in a format agreed upon by the client and the API developer. Any changes to the deliverables or the project scope will be communicated promptly and agreed upon by both parties before proceeding.
The solution would involve the following components:
- Consultation
- Source code using the Meraki API library
- API documentation utilizing the Meraki API library
- Example of API usage using the Meraki API library
- Test results and report using the Meraki API library
- Deployment plan
- Support and maintenance plan utilizing the Meraki API library

37
work/tbx/JD.md Normal file
View File

@@ -0,0 +1,37 @@
Job Title: Senior Solutions Engineer
Job Summary:
We are seeking an experienced Senior Solutions Engineer to join our team. The ideal candidate will have a solid technical background, excellent communication and interpersonal skills, and experience with networking, presales, solutions engineering, and project management. In addition, the candidate should have extensive experience with the Meraki Python Library and be able to develop customized scripts for the Meraki product line and their documented APIs and webhooks.
Responsibilities:
Develop custom scripts using the Meraki Python Library to interact with the Meraki Dashboard API
Collaborate with the sales team to identify opportunities for customized Meraki Dashboard API solutions that meet the needs of clients and prospects
Develop and maintain relationships with key customers and partners
Manage multiple projects and priorities simultaneously
Conduct product demonstrations and proofs-of-concept to showcase the capabilities of customized software solutions
Act as a subject matter expert on technical aspects of customized software solutions during client-facing meetings and presentations
Develop and maintain coding standards and best practices to ensure consistency and maintainability of code across the organization.
Manage the source code repository, including creating and maintaining branches, managing merges, and resolving conflicts.
Ensure that code is appropriately versioned and labeled and that release notes are correctly supported and documented.
Develop and maintain tools and processes for code analysis, enforce code review processes and vulnerability scanning, and ensure that all code meets established security standards.
Develop and maintain wayfinding and mapping applications for indoor and outdoor environments using technologies such as Bluetooth beacons, Wi-Fi positioning, and GPS
Design and implement guest Wi-Fi solutions that provide a seamless and secure user experience, and integrate with other systems, such as CRM and marketing automation platforms
Develop and maintain asset-tracking solutions using RFID, BLE, and GPS technologies to help organizations track and manage their physical assets.
Develop and maintain video analytics solutions that analyze video feeds in real-time to detect and alert on events such as intrusions, accidents, and abnormal behavior.
Develop and maintain IoT solutions that integrate with the Meraki Dashboard API to enable the collection and analysis of data from sensors and other IoT devices.
Develop and maintain security solutions that integrate with Meraki Dashboard API to provide enhanced security features such as access control, intrusion detection and prevention, and security monitoring.
Develop and maintain customized software solutions for networking automation, wayfinding and mapping, guest Wi-Fi, asset tracking, video analytics, IoT, and security.
Requirements:
Bachelor's degree in Computer Science, Engineering, or a related field
5+ years of programming experience with expertise in Python and other scripting languages
3+ years of experience in networking, including LAN, WAN, VPN, and wireless networking technologies
3+ years of experience in programming, with a focus on network automation and the Meraki Dashboard API, wayfinding, and mapping, guest Wi-Fi, asset tracking, video analytics, IoT, and security
Expertise in Python programming language and experience with Meraki Python Library
Experience in presales, solution engineering, or technical consulting
Experience with web development technologies such as HTML, CSS, and JavaScript
Strong problem-solving skills and ability to work independently
Excellent communication skills with the ability to explain technical concepts to non-technical stakeholders
Job Summary:
We are seeking a Senior Solutions Engineer to join our dynamic team. The successful candidate will be responsible for developing and implementing customized software solutions, focusing on integrating networking and security protocols. This role will require a blend of programming expertise, networking experience, and presales and solution experience.

View File

@@ -0,0 +1,52 @@
# CenturyLink Cisco Quotes Data Analysis
This report presents an analysis of the CenturyLink Cisco quotes dataset, focusing on key aspects related to revenue.
## Time Range and Unique Counts
The dataset spans from July 26, 2016, to July 7, 2023. It includes:
- 194 unique quote contacts
- 8,862 unique quote names
- 7 unique quote statuses
- 2,459 unique end customers
## Revenue Distribution
The distribution of revenue shows that most of the revenues are quite low, with a few quotes generating higher revenues. Here are two representations of the distribution:
1. Using a logarithmic scale to manage the wide range of values:
![Distribution of Revenue (Log Scale)](revenue_distribution_log.png)
2. Excluding outliers defined using the Interquartile Range (IQR) method:
![Distribution of Revenue (Excluding Outliers)](revenue_distribution_no_outliers.png)
## Quote Status Distribution
![Distribution of Quote Statuses](quote_status_distribution.png)
In terms of quote statuses, most of the quotes have been won (15,826), followed by expired (3,659). There are relatively few quotes in process (26), under review (6), or being reprocessed (2). There are also 10 quotes that were lost.
## Revenue Analysis by Quote Status and Contact
Interestingly, the average revenue for "Lost" quotes is high, second only to "Expired" quotes. This might be worth further investigation to understand why high-revenue quotes are being lost.
![Average Revenue by Quote Status](avg_revenue_quote_status.png)
The revenues associated with different quote contacts vary significantly, with the top contacts bringing in considerably higher revenues. This could indicate differences in the types of customers or deals that different contacts are responsible for.
![Average Revenue by Quote Contact (Top 10)](avg_revenue_quote_contact.png)
## Top Customers in Terms of Revenue Generated
The top customers in terms of revenue generated are:
1. Undisclosed ("-"): \$1,900,361,000
2. USDA OCIO ITS TOB: \$154,582,100
3. HCA INFORMATION TECHNOLOGY & SERVICES INC: \$21,844,500
4. Department of Defense: \$20,483,950
5. State of Colorado: \$15,900,850
Please note that these insights are preliminary and might require more in-depth analysis for confirmation.

View File

@@ -0,0 +1,31 @@
# Key Insights for Account Executives
This document presents key insights derived from the CenturyLink Cisco Quotes and CenturyLink Disti Quotes datasets. The following points focus on aspects that account executives should consider, such as top revenues, top accounts, and top sales contacts.
## Top Revenues
1. The distribution of revenue shows that most of the revenues are quite low, with a few quotes generating very high revenues. This might suggest that the company has a few key clients that contribute significantly to the overall revenue. It's crucial to maintain strong relationships with these clients and explore opportunities for further business.
![Distribution of Revenue (Excluding Outliers)](revenue_distribution_no_outliers.png)
2. Interestingly, the average revenue for "Lost" quotes is high, second only to "Expired" quotes. This indicates that the company is potentially missing out on significant revenue opportunities. It would be worthwhile to investigate why these high-revenue quotes are being lost and develop strategies to improve the win rate.
![Average Revenue by Quote Status (Dataset 2)](new_avg_revenue_quote_status.png)
3. The average revenue is higher for the CDSD - Federal CenturyLink sales channel compared to the CenturyLink Distribution channel. If possible, increasing the number of quotes in the CDSD - Federal CenturyLink channel could lead to higher overall revenues.
![Average Revenue by Sales Channel](avg_revenue_sales_channel.png)
## Top Accounts
1. The top customers in terms of revenue generated are Undisclosed ("-"), USDA OCIO ITS TOB, HCA INFORMATION TECHNOLOGY & SERVICES INC, Department of Defense, and State of Colorado. These accounts are extremely valuable and should be handled with utmost priority. Understanding their needs and ensuring their satisfaction could lead to sustained and potentially increased revenue.
## Top Sales Contacts
1. The revenues associated with different quote contacts vary significantly. The top contacts, namely Richard Piorkowski, Heather Simpson, Joseph Maule, Jonathan Sullivan, and Taylor Mangum, bring in considerably higher revenues. This could indicate their expertise in handling large accounts or high-value deals. It might be beneficial for other account executives to learn from their strategies and techniques.
![Average Revenue by Quote Contact (Top 10, Dataset 2)](new_avg_revenue_quote_contact.png) 2. Most of the quotes are from the CenturyLink Distribution sales channel. However, the CDSD - Federal CenturyLink channel, despite having fewer quotes, generates higher average revenue per quote. This suggests that the CDSD - Federal CenturyLink channel deals with higher-value clients or projects. Account executives should consider this while planning and prioritizing their efforts.
![Distribution of Sales Channels](sales_channel_distribution.png)
Please note that these insights are preliminary and should serve as a starting point for further in-depth analysis.

41
work/tbx/SOW.md Normal file
View File

@@ -0,0 +1,41 @@
Role: Python Programmer/Network Engineer
# Program Description
TBX's bespoke API development for Meraki is a program that focuses on delivery, customization, and customer service for creating various API and webhook functions within the Meraki ecosystem. As a Python programmer, you will be responsible for developing and customizing APIs and webhooks that meet the specific needs of our clients.
## Responsibilities
- Develop and maintain Python scripts for various API and webhook functions within the Meraki ecosystem
- Customize existing APIs and webhooks to meet the specific needs of clients
- Collaborate with the development team to ensure that API and webhook functions are integrated seamlessly into the Meraki ecosystem
- Troubleshoot and debug issues with API and webhook functions
- Document code and processes for future reference
- Communicate with clients to gather requirements and provide updates on development progress
- Provide exceptional customer service to clients, ensuring that all issues are addressed in a timely and professional manner
## Deliverables
- Fully functional Python scripts for API and webhook functions within the Meraki ecosystem
- Customized APIs and webhooks that meet the specific needs of clients
- Documentation of code and processes
- Regular updates on development progress to clients
- Exceptional customer service to clients, ensuring that all issues are addressed in a timely and professional manner
API source code using the Meraki API library: The API source code will be developed using the Meraki API library and Python programming language. The code will be well-documented and follow best practices for maintainability and scalability. The code will be delivered in a repository hosted on a version control platform such as GitHub.
API documentation utilizing the Meraki API library: The API documentation will be created using the Meraki API library and will be clear and concise. The documentation will include details about the API endpoints, their usage, and response structures. The documentation will also include examples of how to use the API.
Example of API usage using the Meraki API library: An example of how to use the API will be provided, utilizing the Meraki API library. The example will demonstrate how to make calls to the API endpoints, handle responses, and parse data returned by the API.
Test results and report using the Meraki API library: The API will be tested thoroughly using the Meraki API library to ensure that it meets the requirements and is scalable. The test results and a report detailing the tests conducted and their results will be provided. The report will include any issues found during testing and how they were addressed.
Deployment plan utilizing the Meraki API library: A deployment plan will be developed, utilizing the Meraki API library. The plan will include details about the server infrastructure required to run the API, the deployment process, and any necessary configuration steps.
Support and maintenance plan utilizing the Meraki API library: A support and maintenance plan will be developed, utilizing the Meraki API library. The plan will outline how support requests will be handled, how maintenance will be performed, and any necessary updates or upgrades to the API. The plan will also include contact information for support and a list of supported features.
All deliverables will be provided in a timely manner and in a format agreed upon by the client and the API developer. Any changes to the deliverables or the project scope will be communicated promptly and agreed upon by both parties before proceeding.
## Timeline
The timeline for the project will be determined by the specific needs of each client. The Python programmer will be responsible for working with clients to establish a timeline and deliverables that meet their specific requirements. Regular progress updates will be provided to clients throughout the development process

28
work/tbx/Weekly Flash.md Normal file
View File

@@ -0,0 +1,28 @@
**Open opportunities (Top deals)**  
Charter - Participated in few internal meetings around lauching an API program. Working on a HLD document for us to use when we pitch this to the Charter product team. I'll have first draft completed today 2/22 by close of business
Lumen - Assisted with building out multiple BoMs dealing with Nexus and UCS devices for a refresh project - working on getting details on this deal so I can offer some assistance
** Passion for Learning (trainings and conferences) 
Fortinet NSE5 Network Security Analyst  
FortiAnalyzer exam - Scheduled 2/27/23
FortiManager exam - TBD  
**Internal Activities**  
Internal Emerging Accounts Meeting- Lumen/Eplus  
Weekly Internal Emerging Accounts Meeting- Charter/Comcast
Weekly Synch up on Comcast between WWT and Telcobuy  
Secure Connect Quote Building and Processing
EE201: Security - Hour of Cyber (Leah Salman & Matt Berry)
Cox Private Mobility and a Edge solutions- TBX Discussion
GSP 2023 Global Sales Kickoff
Charter / Cisco WebEx for SMB
**Travel planning**  
Austin TBA Charter distribution tour - TBD
St Louis TBA Charter ATC and ITC tours - TBD
St Louis TBA ISR meetings - TBD
Orlando, FL April 3-6 : [Fortinet Accelerate](https://www.fortinetaccelerate.com/home)  
Las Vegas May 1-4, 2023 : [Channel Partners Conference](https://channelpartnersconference.com/)

111
work/tbx/_outline (2).md Normal file
View File

@@ -0,0 +1,111 @@
# Executive summary
The TBX program outlined within this document allows organizations to create a new service offering that leverages the programmability of the Meraki Dashboard API.
By doing so, organizations can deliver a highly scalable and customized service enabling their customers to utilize the Meraki product line's full capabilities, ultimately providing them a higher sense of the perceived value from their network gear and thus opening the door for additional sales in hardware and services.
This program creates custom API code snippets based on the capabilities outlined within Meraki's API documentation on a customer-by-customer basis in a scalable way, encouraging customers to optimize their network and take full advantage of the diverse capabilities of the Meraki product portfolio.
The solution architecture section provides detailed information on the product components, deployment requirements, and operational considerations necessary to implement this custom offering. The program's approach, delivery, and ongoing maintenance are highly flexible; therefore, pivots and program changes are available options throughout the program lifecycle.
By adding this product offering, [CUSTOMER NAME] can increase Meraki product sales while offering a billable service and giving them a competitive edge in the marketplace. This program provides a unique service from a trusted service provider that is customized to each customer's needs.
## Business context
Many businesses utilize hardware with advanced capabilities without the knowledge or expertise to understand the vast functionality these devices can deliver to their business or what is possible to achieve when they are optimized to their advantage.
This typically results in lower diverse hardware sales and missed opportunities to provide additional services that would improve the customer experience, increase client satisfaction, and maintain consumer loyalty.
TBX's bespoke Meraki API development program provides custom API and webhook script writing engineers that will provide tailored automation to end customer networks that will better utilize the built-in capabilities of the Meraki ecosystem.
Below is a brief list of high-level capabilities, but exact customer use cases are unlimited. The outcome of an engagement will provide more functionality from the hardware the customer already owns and open the doors for other equipment and service opportunities.
## Cisco Meraki Platform Capabilities
- Network Automation: Automate the configuration, deployment, and management of physical and virtual devices in a network
- Wayfinding & Mapping: Map physical spaces to provide directions and context that help users find their way through and navigate to critical locations in your space
- Interactive Guest Wi-Fi: Easily and securely grant Wi-Fi access to visitors on a landing page customized with your brand and content
- Asset Tracking: Track physical assets, either by scanning barcode labels attached to the assets or by using GPS, BLE, or RFID tags that broadcast their location
- Video Analytics: Analyze data from Meraki Video Cameras to bring new insights into physical spaces. Instantly derive new business insights into people counting, queue length monitoring, entry & exit behavior, and deeper integration with physical security solutions
- IoT & Security: Manage, Integrate, and Safeguard IoT devices connected at the edge while protecting the entire network from emerging vulnerabilities
# Solution overview
## Solution Architecture
Our solution offering ensures that we understand the needs and wants of your clients from the outset. This process begins with utilizing a templated questionnaire developed in partnership between TBX and the service delivery team at [CUSTOMER NAME] to ensure partner alignment and set the stage for a standardized approach for future engagements.
We use the responses within the questionnaire to create a service delivery document that outlines the client's desired outcomes. During the review process, TBX resources will identify the specific Meraki API that will help achieve those outcomes and record them within the delivery document.
The next step is the consulting phase, where we meet with the end customer to review their questionnaire and then set expectations on delivery time, provide further consultation on device capabilities, and introduce them to additional product lines within the Meraki ecosystem. This workflow/engagement will undoubtedly lead to additional hardware and engagement sales by leveraging the unique situation this consultation service provides.
Using the Meraki API library, we will develop and maintain a list of fully functional Python scripts for various API and webhook workflows within the Meraki ecosystem that will, over time, provide a strong and reliable starting point for future engagements, ultimately increasing program efficiencies.
To ensure that our clients receive exceptional customer service, we will maintain regular communication to gather their requirements and provide frequent updates on the progress of our development efforts. Our support and maintenance plan ensures that any issues with API and webhook functions are promptly addressed and resolved.
Our deliverables will include fully functional Python scripts for API and webhook functions, customized APIs and webhooks that meet clients' specific needs, and comprehensive documentation of code and processes.
This process ensures that the engagement is aligned with the capabilities of the Meraki Dashboard API and sets the stage for a successful project and, ultimately, satisfied clients who have received high-quality service and products.
## Functional requirements
- list of the functional requirements for the solution, including the features, capabilities, and user interactions
## Non-functional requirements
- list of the non-functional requirements for the solution, including performance, scalability, security, and compliance
## Deployment and operational architecture
- detailed description of the deployment and operational architecture for the solution, including hardware, software, and infrastructure requirements
## Risks and mitigation
- list of the risks associated with the proposed solution, along with a plan for mitigating these risks
## Implementation plan
- detailed plan for implementing the proposed solution, including timelines, milestones, and resource requirements
## Cost and benefits
- detailed analysis of the costs and benefits associated with the proposed solution, including ROI, TCO, and payback period
## Business Value
The company is able to differentiate itself from its competitors by leveraging the expertise of a solution engineer to develop custom capabilities for its hardware API. By designing these unique features and capabilities to meet the specific needs of their customers, the company can achieve heightened customer satisfaction, increased customer loyalty, and amplified potential for revenue growth from new and existing customers. Additionally, by hosting the custom capabilities on a cloud infrastructure, the company can benefit from improved scalability, reliability, and security, which can help to reduce operational costs and improve overall business efficiency.
- Improved efficiency: By fully utilizing the capabilities of your hardware devices, we can streamline your business processes and improve overall efficiency
- Enhanced customer experiences: Custom capabilities can be created to better meet the needs of your customers, providing them with a more personalized and satisfying experience
- Competitive advantage: Leveraging custom capabilities can give your business a competitive edge in the marketplace, allowing you to differentiate yourself from competitors and win new business
## Conclusion
This statement of work outlines the objectives, scope, deliverables, timeline, communication, and payment terms for the API and webhook services project. We are committed to delivering high-quality and fully functional APIs and webhooks that will enhance the client's system and automate business processes.
## Low Level engagement deliverables
The solution would involve the following components:
- Source code using the Meraki API library
- Deployment plan
- A document describing the purpose and functionality of each script
- A document outlining any dependencies or prerequisites required for the custom Python scripts to run
- A set of test cases used to test the custom Python scripts
- A document that includes any issues or bugs discovered during testing and how they were resolved
- A set of installation and configuration instructions for the custom Python scripts
- Troubleshoot and debug issues with API and webhook functions
- A user guide or documentation that describes how to use the custom Python scripts
- Ongoing support and maintenance of the custom Python scripts, which may include bug fixes, updates, and enhancements as agreed upon in the project scope
- Communication and collaboration with the client to ensure the custom Python scripts meet the desired functionality and performance standards
- Training and knowledge transfer to the client's team, if requested and agreed upon in the project scope
- Questionnaire template built in conjunction with your delivery team that obtains initial customer needs/wants
- Consultation with end customers that includes going over the questionnaire provided during intake, along with a working session that identifies potential customizations
- Develop and maintain Python scripts for various API and webhook functions within the Meraki ecosystem
- Collaborate with the development team to ensure that API and webhook functions are integrated seamlessly into the Meraki ecosystem
- Provide exceptional customer service to clients, ensuring that all issues are addressed in a timely and professional manner
- Fully functional Python scripts for API and webhook functions within the Meraki ecosystem
- Regular updates on development progress to clients
- Source code for the custom Python scripts
All deliverables will be provided in a timely manner and in a format agreed upon by the client and the API developer. Any changes to the deliverables or the project scope will be communicated promptly and agreed upon by both parties before proceeding.

26
work/tbx/flash(1).md Normal file
View File

@@ -0,0 +1,26 @@
**Open opportunities (Top deals)**
T-Mobile - Brandon any myself are meeting with Mark Haase, the manager of the product offering group, this week. We're meeting his team Thursday and Friday to learn of the new product offerings TMO is looking to launch.
**Passion for Learning (trainings and conferences)**
Fortinet NSE5 Network Security Analyst
Cisco CCNA/CCNP certificaions for Enterprice and Security
CCIE Security is the end goal
Met with Alex Hoecht a Technical Solutions Architect at WWT to learn how he's setting up automation tasks using SaleForce data. I'm going to start an effort of carrying on his effort using TBX data to make this functionallity useful to the TBX line of business
**Internal Activities**
WWT GSP Mobility, Cloud and Edge GTM
EE201: SD-WAN
ATSM
Steph/Emerging Touch Point
TBX Team Meeting
Jason & Moe 1:1
Report Automation
WWT | Fortinet Office Hours
Weekly Internal Emerging Accounts Meeting- Charter/Comcast
Weekly Internal Emerging Accounts Meeting- Lumen/Eplus
While in Seattle I'm going to the WWT office to meet with Scott Lauridsen and the local team. Was informed that they're working out of a conference room on Wednesday and they invited me to come join them for a meet and greet.
**Travel planning**
T-Mobile - Seattle 7/26-28
Cisco Impact - Las Vegas

26
work/tbx/flash.md Normal file
View File

@@ -0,0 +1,26 @@
**Open opportunities (Top deals)**
T-Mobile - Brandon any myself are meeting with Mark Haase, the manager of the product offering group, this week. We're meeting his team Thursday and Friday to learn of the new product offerings TMO is looking to launch.
**Passion for Learning (trainings and conferences)**
Fortinet NSE5 Network Security Analyst
Cisco CCNA/CCNP certificaions for Enterprice and Security
CCIE Security is the end goal
Met with Alex Hoecht a Technical Solutions Architect at WWT to learn how he's setting up automation tasks using SaleForce data. I'm going to start an effort of carrying on his effort using TBX data to make this functionallity useful to the TBX line of business
**Internal Activities**
WWT GSP Mobility, Cloud and Edge GTM
EE201: SD-WAN
ATSM
Steph/Emerging Touch Point
TBX Team Meeting
Jason & Moe 1:1
Report Automation
WWT | Fortinet Office Hours
Weekly Internal Emerging Accounts Meeting- Charter/Comcast
Weekly Internal Emerging Accounts Meeting- Lumen/Eplus
While in Seattle I'm going to the WWT office to meet with Scott Lauridsen and the local team. Was informed that they're working out of a conference room on Wednesday and they invited me to come join them for a meet and greet.
**Travel planning**
T-Mobile - Seattle 7/26-28
Cisco Impact - Las Vegas

36
work/tbx/lumen.md Normal file
View File

@@ -0,0 +1,36 @@
# Analysis of Lumen YE Pipeline 2023 Data
The data contains information about different opportunities, their sizes, associated deal ID and quote numbers, the requestors for each opportunity, any additional comments, and the status and booking information.
## Data Cleaning and Processing
The raw data required some cleaning and processing. The 'Size' column was cleaned to remove the dollar sign and comma, and then converted to a float for numerical operations. The 'Deal ID' and 'Quote #' columns were filled with 0 for missing values and converted to integers. The 'Priority', 'Status', and 'Booked?' columns were filled with 'Unknown' for missing values.
## Data Statistics
Here are some basic statistics from the data:
- There are 16 unique opportunities.
- There are 7 unique requestors.
- The total size of all opportunities is approximately \$11,179,974.
- The largest opportunity size is approximately \$2,013,258.
- The smallest opportunity size is approximately \$162,567.
- The average opportunity size is approximately \$621,110.
## Data Insights
From the data, we can derive several insights:
1. **Top Opportunities by Size**: The top 5 opportunities by total size are BAUSCH HEALTH, CHARTER MANUFACTURING, FIRST FINANCIAL BANCORP, XPO LOGISTICS INC, and POLSINELLI PC. The bar plot below shows these top opportunities:
![Top 5 Opportunities by Size](top_opportunities.png)
2. **Top Requestors by Total Size of Opportunities**: The top 5 requestors by total size of opportunities they handle are Tony Ng, Ben Koenig, Ricky Hale, Jim Schmidt, and Warren Wilson. The bar plot below shows these top requestors:
![Top 5 Requestors by Total Size of Opportunities](opportunities_per_requestor.png)
3. **Number of Opportunities per Requestor**: Ben Koenig, Tony Ng, and Jim Schmidt have the most opportunities, with Ben handling 5 and Tony and Jim each handling 3. Ricky Hale, Warren Wilson, and Barbara Hall each handle 2 opportunities, and Douglas Scott handles 1 opportunity. The bar plot below shows the number of opportunities per requestor:
![Number of Opportunities per Requestor](top_requestors.png)
Based on these insights, it seems that the opportunities associated with "BAUSCH HEALTH", "CHARTER MANUFACTURING", and "FIRST FINANCIAL BANCORP" are quite substantial and may be worth focusing on. Similarly, the requestors "Tony Ng", "Ben Koenig", and "Ricky Hale" manage significant total sizes of opportunities and might be key players in this context.

52
work/tbx/lumen2.md Normal file
View File

@@ -0,0 +1,52 @@
# CenturyLink Cisco Quotes Data Analysis
This data analysis is based on a dataset containing quote details from CenturyLink for Cisco products.
## Dataset Overview
The dataset contains 20,082 unique quotes. Each quote includes details such as the quote creation date, quote number, quote contact, quote name, quote status, quote value (sum of extended rev buy curr), and the end customer name.
## Key Insights
### 1. High Value Quotes
The dataset includes a wide range of quote values, from a minimum of $0 to a maximum of approximately $405 million. This large range suggests that some quotes are for significantly higher values than others. Identifying the characteristics of these high-value quotes could provide insights for generating more such quotes in the future.
![Histogram of Quote Values](quote_status_distribution.png)
### 2. Quote Status
The majority of quotes (15,826 out of 20,082) are in the 'WON' status. However, a significant number (3,659) are also in the 'EXPIRED' status. Understanding the reasons why these quotes expired could provide insights for improving the quote conversion rate.
![Distribution of Quote Statuses](quote_value_distribution.png)
### 3. Top Customers
Certain customers have significantly higher total quote values than others. The top customer, represented by '-', has a total quote value of approximately $1.9 billion. Other notable customers include 'USDA OCIO ITS TOB' and 'HCA INFORMATION TECHNOLOGY & SERVICES INC'. Focusing on these high-value customers could be beneficial for business growth.
![Top 10 Customers by Total Quote Value](top_customers_quote_value.png)
### 4. Quote Value Distribution
The distribution of quote values is skewed, with a mean of $122,493 and a median of $1,947.65. This suggests that while most quotes are of lower value, there are a few quotes with very high values that increase the mean.
### 5. Time Trends
The total quote value fluctuates over time, with significant spikes on certain dates. Understanding the reasons for these fluctuations could help in predicting future trends and optimizing the timing of quote generation.
![Trend of Quote Values Over Time](quote_value_trend.png)
### 6. Missing/Unspecified Data
A large amount of quote value is associated with '-' in the 'End Customer Name' field. This could represent missing data, and understanding why this data is missing could be important for improving data collection and analysis processes.
## Recommendations
Based on the above insights, here are some recommendations:
1. Investigate the characteristics of high-value quotes to understand how to generate more such quotes.
2. Analyze expired quotes to identify any common factors that could be addressed to improve the quote conversion rate.
3. Focus on high-value customers and understand their needs and preferences to maintain and expand business relationships with them.
4. Consider stratifying the quote value distribution for more detailed insights and to inform the pricing strategy.
5. Analyze the time trends in more detail to identify any seasonal patterns or other time-related factors that influence quote values.
6. Improve data collection and cleaning processes to minimize the amount of missing or unspecified data.

View File

@@ -0,0 +1,51 @@
## Introduction
- Introduce yourself and your business
- Explain the purpose of the presentation
- Preview the main topics you will cover
## Identify the Problem
- Describe a common problem that product owners in IT face
- Explain how this problem impacts their business and customers
- Use statistics or case studies to illustrate the severity of the problem
## Introduce Your Solution
- Explain how your business service addresses the problem
- Describe the benefits of your service
- Highlight how your service can help the product owner save time, money, and improve their overall business
## Features and Functionality
- Provide more detail on the features and functionality of your service
- Highlight how these features solve specific problems or pain points for the product owner
## Demonstration
- Demonstrate how your service works
- Walk through specific examples or scenarios to illustrate how your service can help the product owner in their day-to-day operations
## Case Studies
- Share success stories or case studies of how your service has helped other product owners in IT
- Provide specific examples of how your service has improved their business results
## Pricing and Packages
- Provide an overview of your pricing and packages
- Explain the value proposition of each package
- Address any potential questions or concerns about pricing
## Next Steps
- Provide a clear call-to-action for the product owner
- Explain the next steps they can take to sign up for your service or learn more
## Conclusion
- Recap the main topics you covered in the presentation
- Reiterate the benefits of your service
- Thank the product owner for their time and consideration
Remember, the presentation should be focused on the needs of the product owner and how your service can help them. Be clear and concise, and use visuals and real-world examples to illustrate your points. Good luck!

38
work/tbx/presentation.md Normal file
View File

@@ -0,0 +1,38 @@
## Slide 1: Introduction
Title: Fortinet Cybersecurity Solutions
Subtitle: Protecting Your Business in a Digital World
## Slide 2: The Importance of Cybersecurity
Growing importance of cybersecurity for businesses
Protecting computer hardware, network infrastructure, and cloud-based tools/services
## Slide 3: Fortinet Product Line Overview
Comprehensive range of hardware and software solutions
Key products: FortiGate, FortiSwitch, FortiAP, FortiClient
## Slide 4: Unified and Secure Network Environment
Seamless integration of Fortinet products
Protection against various cyber threats
## Slide 5: Continuous Updates and Threat Intelligence
Staying ahead of emerging threats
Easy deployment and management
## Slide 6: Business Benefits
Safe and reliable infrastructure
Improved network security and secure network access
Advanced threat protection and malware/virus protection
## Slide 7: Additional Benefits
Staying ahead of emerging threats with global threat intelligence
Reduced risk of security incidents and business continuity
## Slide 8: Business Tools and Services
List of tools and services that benefit from Fortinet's cybersecurity solutions
## Slide 9: Retail and Restaurant Tools
List of retail and restaurant-specific tools that benefit from Fortinet's cybersecurity solutions
## Slide 10: Choose Fortinet for Your Cybersecurity Needs
Summary of the advantages of choosing Fortinet's solutions
Call to action: Contact us for more information or to schedule a consultation

View File

@@ -0,0 +1,15 @@
1. Define the problem: Start by defining the problem that your product solves. This could be a technical issue or a business challenge. Clearly explain why your product is the best solution.
2. Highlight the key features: List the key features of your product and explain how they address the problem. Use visuals such as diagrams and infographics to illustrate your points.
3. Discuss the benefits: Describe the benefits of your product in detail. This could include increased efficiency, cost savings, or improved customer satisfaction. Use case studies or customer testimonials to demonstrate how your product has benefited others.
4. Show the technical specifications: Provide technical details about your product, such as its size, weight, power consumption, and compatibility with other systems. Include any technical diagrams or schematics that help explain the workings of the product.
5. Explain the implementation process: Explain how your product will be installed or implemented, including any required training or technical support. Provide a clear timeline and budget for the implementation process.
6. Address any objections: Anticipate any objections that potential customers might have and address them in the document. This could include concerns about cost, compatibility with existing systems, or potential downtime during implementation.
7. Provide a call-to-action: End the document with a clear call-to-action, such as scheduling a demo or contacting a sales representative. Provide contact information and any additional resources that might be helpful for potential customers.
#Work

View File

@@ -0,0 +1,13 @@
ABC Corp is a mid-sized business that provides IT services to other businesses. They rely heavily on cloud-based tools and services, such as Microsoft Office 365, Salesforce, and Amazon Web Services, to provide their services. They also use communication tools such as email, instant messaging, and video conferencing to communicate with their clients.
ABC Corp was experiencing frequent cyber attacks, such as phishing attempts and malware infections, which were affecting their ability to provide reliable and secure services to their clients. They realized that they needed a robust cybersecurity solution to protect their network infrastructure, cloud-based tools and services, and communication tools from these cyber threats.
ABC Corp decided to implement the Fortinet product line, including FortiGate firewalls, FortiMail email security gateway, and FortiWeb web application firewall, to provide advanced threat protection and network security. They also implemented FortiSIEM for real-time threat detection and analysis.
After implementing the Fortinet product line, ABC Corp saw a significant improvement in their cybersecurity posture. They were able to detect and prevent cyber attacks before they caused any damage, ensuring that their clients' data and systems were secure. The FortiMail email security gateway helped them filter out spam and phishing attempts, reducing the number of malicious emails that their employees received. The FortiWeb web application firewall helped them protect their e-commerce platform and other web-based applications from cyber threats.
Additionally, FortiSIEM provided real-time threat detection and analysis, allowing ABC Corp to respond quickly to potential security incidents. The FortiToken two-factor authentication solution also provided an additional layer of security to user logins, ensuring that only authorized users had access to sensitive data.
Overall, the Fortinet product line helped ABC Corp maintain a safe and reliable infrastructure, enabling them to provide their clients with reliable and secure IT services. The robust cybersecurity solutions provided by Fortinet allowed them to operate their cloud-based tools and services, communication tools, and e-commerce platform with greater confidence and security, protecting their business and their clients from cyber threats.
#work #Fortinet