Download the App!
show episodes
 
Artwork

1
Network Break

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
Hey guys, welcome to NetworkChuck!! I love IT, Networks, VoIP, Security, Python..........IT's AWESOME!!! But my passion is helping people get started on this incredible career path. I make videos that help you get started in IT and keep you motivated along the way as you pursue GREATNESS. *****Want to help me create more videos? Hit me up on Patreon: https://patreon.com/networkchuck
  continue reading
 
Artwork

1
ACM ByteCast

Association for Computing Machinery (ACM)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
ACM ByteCast is a podcast series from ACM’s Practitioners Board in which hosts Rashmi Mohan, Bruke Kifle, Scott Hanselman, Sabrina Hsueh, and Harald Störrle interview researchers, practitioners, and innovators who are at the intersection of computing research and practice. In each episode, guests will share their experiences, the lessons they’ve learned, and their own visions for the future of computing.
  continue reading
 
Have you ever been curious on how a computer science/software engineering major might be like? As a student of the Costa Rica Institute of Technology, I'll hand you my reviews, tips, and experiences regarding the courses any aspiring computer scientist or software engineer must take in order to graduate. ITCR's curriculum is mainly influenced by the ACM guidelines. Contact: [email protected] https://www.facebook.com/CSSECCR/
  continue reading
 
Artwork

1
Theory and Practice

GV (Google Ventures)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Season 4 will explore one of humanity's most rapidly advancing and impactful changes: what does it mean to be human in the age of AI when computers and robots are accomplishing more human functions? How will AI with human-level skills influence us and enhance the world around us? How will we change AI, and how will it change us? Theory and Practice opens the doors to the cutting edge of biology and computer science through conversations with leaders in the field. The podcast is hosted by Ant ...
  continue reading
 
An exciting new podcast from the National Centre for Computing Education in England. Each month, you get to hear from a range of experts, teachers, and educators from other settings as they discuss with us key issues, approaches, and challenges related to teaching computing in the classroom.
  continue reading
 
Artwork

1
Codexpanse Podcast

Rakhim Davletkaliyev

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Universe is computable. Information is its fundamental property, along with space and time. Computer science is a young field, but we didn't invent computing, we've discovered it. Codexpanse explores the computing nature of reality, ideas of programming and math, and our role in this exciting world.
  continue reading
 
Loading …
show series
 
Service provider networks face a couple of difficult challenges: how to map service level agreements to actual network health and performance, and how to deliver service assurance to customers regardless of what happens on the network. On today’s sponsored Heavy Networking we talk with Cisco Systems about its approach to service assurance, how Cisc…
  continue reading
 
At AutoCon 3 in Prague, Scott Robohn sat down with Ernest Lefner from sponsor Gluware to talk about lessons learned throughout his career: from his early days of pulling cable to becoming Chief Product Officer at Gluware and helping to found ONUG. Ernest talks about being a continuous technology learner, and also about the need... Read more »…
  continue reading
 
People consistently overestimate their ability to predict whether a new product or feature will be a success. Instead of blithely going forward with a project that takes up lots of resources and yields minimal results, today’s guest says we should get our ideas into contact with external reality as quickly as possible, and maybe do... Read more »…
  continue reading
 
If you need to route in your network, you can program static routes into all your routing-capable devices. And this can work. But at some point, you’re probably going to want to switch to a dynamic routing protocol. On today’s N Is For Networking, Ethan and Holly discuss the differences between static and dynamic routes,... Read more »…
  continue reading
 
Are you ready to get Network+ certified? Watch our free N10-009 training course. In this month's Network+ Study Group, you'll learn about: Network troubleshooting at the command line Access point configurations Finding an FQDN NAC implementations Automatic IP address assignments Keep the study process going! Watch additional Network+ Study Group vi…
  continue reading
 
On today’s show, we’re joined NetBox Labs co-founders Mark Coleman and Kris Beevers. They recount how they founded NetBox Labs and discuss its growth and how it’s being used. We also delve into the NetBox Labs community and its importance for users. And of course, there’s the ever-present AI discussion. Mark and Kris also talk... Read more »…
  continue reading
 
Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
  continue reading
 
IT teams deal with technology lifecycle issues all the time–including Y2K, which enterprises across the world grappled with for years. The Epochalypse, or Year 2038 Problem, is similar. Specifically, some Linux systems’ date-time counters will go from positive to negative at a specific date in 2038, potentially wreaking havoc on embedded systems an…
  continue reading
 
Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »…
  continue reading
 
Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »…
  continue reading
 
There’s an old saying that a journey of a thousand miles begins with the first step. On today’s show, we talk about taking your first step into network automation with guest Joseph Nicholson. He’s been automating at NTT Data for many years now and has some perspective to share. He’s a network engineer by trade,... Read more »…
  continue reading
 
The Hexabuild team is providing a new community resource, an IPv6 compatibility checker, for those trying to figure out IPv6 network hardware and software compatibility. It’s currently in an alpha version. We talk about what inspired it, what it does, and possible future updates. We also want to get your feedback on whether this is... Read more »…
  continue reading
 
Today we chat with Megaport’s Mitchell Warden, Founding Engineer; and Alexis Bertholf, Global Technical Evangelist, to find out what NetOps is like at Megaport, a company that provides scalable internet connections for all types of organizations. We look at the origins of Megaport and how the company started with the intention of network automation…
  continue reading
 
What shape is your network? In other words, what is its topology? On today’s episode, we discover the different types of network topologies and designs used in the enterprise, data center, and service provider networks. We cover leaf/spine, hub and spoke, point to point, mesh, and others. We also talk about how topologies affect traffic... Read mor…
  continue reading
 
Is WebAssembly the next big thing? Here to help us understand what WebAssembly (WASM) is and what it can and can’t do is Michael Levan, a consultant and WASM trainer. He also dives deeper into WASM details such as hosting, security, monitoring, and the ever-present influence of AI. AdSpot: Spacelift Founded by the creator of... Read more »…
  continue reading
 
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
  continue reading
 
A validation survey is typically used for wireless infrastructure post-installation. It compares predictions to real wireless network performance. On today’s show we chat with Joel Crane about validation survey controversies and the challenges of producing a survey whose data has integrity. We cover topics such as the perfectly green heat map, how …
  continue reading
 
Take a Network Break! We start with two critical vulnerabilities: one affecting cloud versions of Cisco ISE, and the other for HPE StoreOnce. In the news, Broadcom announces the Tomahawk 6 ASIC with 102.4Tbits of bandwidth, SentinelOne suffers a self-imposed network outage, and the Wireshark Foundation announces its first-ever professional certific…
  continue reading
 
Take a Network Break! We start with two critical vulnerabilities: one affecting cloud versions of Cisco ISE, and the other for HPE StoreOnce. In the news, Broadcom announces the Tomahawk 6 ASIC with 102.4Tbits of bandwidth, SentinelOne suffers a self-imposed network outage, and the Wireshark Foundation announces its first-ever professional certific…
  continue reading
 
Network automation is today’s topic with sponsor Gluware. Gluware provides a network automation platform that targets both network engineers and automation builders. On today’s Heavy Networking, we discuss how Gluware supports these two constituencies. We also talk about a recent product announcement, Gluware Labs. Gluware Labs includes a free Comm…
  continue reading
 
“Reinvent or die” is an apt adage for the ever-churning technology industry. Brad Maltz joins us to share his insights on what he calls “continuous reinvention” and how that relates to his own career and why others might want to adopt this mindset. Brad is a Senior Director of AI Solutions at Dell and has... Read more »…
  continue reading
 
Let’s explore four goals of network design: stability, speed, scalability, and security. These goals are based on Ethan’s experience designing, building, and operating networks. Network architects and design experts might have other objectives, and that’s fine, but these four goals are the basis of today’s episode. Ethan and Holly discuss why these…
  continue reading
 
Firefly is a cloud infrastructure automation platform that helps cloud teams, DevOps, SRE, platform engineering, DevSecOps, and other groups manage their entire cloud as code. Firefly helps to manage cloud complexity and produce consistent and efficient cloud platforms with code. To help Firefly better understand their customers and industry trends…
  continue reading
 
“There must be a better way!” is guest Bart Dorlandt’s motto, which he applies to network automation, among other things. In today’s episode, Bart shares what he’s learned about network automation, explains why he focuses on process over tools, and reflects on the importance of mentorship. Bart and Eric also discuss why even if listeners... Read mo…
  continue reading
 
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
  continue reading
 
You need someone to design your operations processes–or perhaps redesign them. That’s an Ops Architect. Should you take an ops person and train them up in architecture? Or an architect and train them up in operations? Do you even have that ops/engineer/architect organizational structure – and should you? Johna and John dive into this discussion... …
  continue reading
 
Take a Network Break! We start with a Red Alert for the IBM Tivoli Monitoring Tool, which has an unpatched (as of recording time) vulnerability that could allow remote attackers to execute arbitrary code. On the news front, Salesforce ponies up $8 billion for Informatica to improve data governance capabilities, Google researchers revise estimates o…
  continue reading
 
Take a Network Break! We start with a Red Alert for the IBM Tivoli Monitoring Tool, which has an unpatched (as of recording time) vulnerability that could allow remote attackers to execute arbitrary code. On the news front, Salesforce ponies up $8 billion for Informatica to improve data governance capabilities, Google researchers revise estimates o…
  continue reading
 
Today on the Tech Bytes podcast, we talk about how to get more out of your NetFlow records with sponsor NetFlow Logic. NetFlow’s been around for a long time, and if you’re already including flow records as part of your monitoring and management arsenal, you may think you’re extracting all the value you can from... Read more »…
  continue reading
 
If you participate in the public Internet by announcing your own netblocks, you should be familiar with Internet Routing Registries (IRRs) and the Routing Policy Specification Language (RPSL). These are tools that help you be a good network citizen. In a world of BGP hijacks and other problems, these tools matter more than ever. We... Read more »…
  continue reading
 
Total Networks Operations sits down with Justin Ryburn for a wide-ranging discussion on the state of the networking industry. Topics including how to attract new talent to network engineering and network operations; getting literate in DevOps/infrastructure tools such as GitHub, Terraform, and Python; pairing Dev and NetOps to maximize domain exper…
  continue reading
 
Let’s chat about point-to-point links. On today’s episode we cover what should and shouldn’t be done, and discuss why following RFC’s doesn’t always get you to the right place. We dig into questions including: Don’t we just use link-local addresses for point-to-points? Shouldn’t we assign a /127, just like we do a /31 in IPv4?... Read more »…
  continue reading
 
In this episode of ACM ByteCast, our special guest host Scott Hanselman (of The Hanselminutes Podcast) welcomes Kate Kallot, founder and CEO of Amini, an impact-driven AI company based in Nairobi, which focuses on the critical issue of data scarcity in Africa and its implications for AI development. Before Amini, her career spanned leadership posit…
  continue reading
 
Ubiquiti is known primarily for wireless equipment for residential and small business use, but it can be a player in the enterprise world. On today’s show, we talk with Darrell DeRosia, Sr. Director, Network & Infrastructure Services with the Memphis Grizzlies, about how he provides that connectivity for the FedExForum, home to the Memphis Grizzlie…
  continue reading
 
Cloud networks aren’t like traditional data center networks, so applying a traditional network design to the cloud probably isn’t the best idea. On today’s Day Two Cloud, guest Aidan Finn guides us through significant differences between Microsoft Azure networking and on-prem data center networks. For instance, subnets don’t segment hosts, network …
  continue reading
 
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
  continue reading
 
Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read mo…
  continue reading
 
Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read mo…
  continue reading
 
Netris is tackling the issue of automating multi-tenancy in an AI data center. Netris has your answer to this challenge, and it’s a solution certified to work with NVIDIA. We’re going to get into the nuts and bolts of Netris network automation with Alex Saroyan, CEO and co-founder of Netris. Along the way, we will... Read more »…
  continue reading
 
Data Center construction has reached an incredible pace over the last few years with implications on NetOps and operations of all kinds. Today we with talk with sponsor Siemon regarding the state of data centers, past, present and future. We explore legacy data centers and how they are evolving to work in today’s environments. We... Read more »…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play