Wired In Software public
[search 0]
More
Download the App!
show episodes
 
Welcome to Uncanny Valley—an insider look at the people, power, and influence of Silicon Valley—where each week, WIRED’s writers and editors bring you original reporting and analysis about some of the biggest stories in tech. On Thursdays, WIRED’s Global Editorial Director Katie Drummond is joined by Lauren Goode and Michael Calore to break down a recent story or phenomena bubbling up in Silicon Valley and explain its influence on our daily lives. And on Fridays, WIRED’s Zoë Schiffer has an ...
  continue reading
 
Artwork

1
Talking Businessly

Daniel Coulbourne & John Drexler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We (John and Daniel) are co-founders of a small software development agency. This is a recording of our weekly "state of the company" call where we discuss the nitty gritty details of running our business day-to-day. Want to work with us? Reach out at thunk.dev
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Artwork
 
The Electrical Building Design Show podcast provides discussions on topics within the field of electrical engineering and covers themes like specific calculations, common problems, and best practices. It's presented by David Robison, Design Master Software president. We invite you to attend a free webinar on creating single-line diagrams in Revit: https://www.designmaster.biz/webinar/register-pod.html Design Master Software develops advanced electrical design software for electrical engineer ...
  continue reading
 
Artwork

1
The Agile Wire

Jeff Bubolz and Chad Beier

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Agile Wire with Jeff Bubolz and Chad Beier is focused on long-form conversations about the struggles associated with increasing agility of teams, products, and organizations around the world. As change agents, advisors, coaches, and trainers the hosts are focused on helping listeners get agile and stay agile.
  continue reading
 
Welcome to Wired for Growth a WinonaIT podcast. Located in the heart of Northern Indiana, WinonaIT is not just another IT support, consulting, and software development business. We're on a mission to reshape the very essence of how the world perceives partnering with an IT consulting group - from the lens of both dedicated employees and valued clients. Join us as we dive into a myriad of topics encompassing technology, the intricacies of the business world, and invaluable insights that aim t ...
  continue reading
 
Artwork

1
The DQMH® Podcast

Wired-in Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The DQMH® Podcast is for the NI LabVIEW™ community. It is all about the Delacor Queued Message Handler (DQMH®) toolkit (a framework for NI LabVIEW™), and more broadly software engineering as it applies to NI LabVIEW™. Hear from Delacor and the DQMH® Trusted Advisors about how DQMH® helps solve their customer problems. DQMH® is downloadable from vipm.io/package/delacor_lib_dqmh_toolkit. DQMH® is a registered trademark of Delacor LLC. For more information, visit delacor.com/DQMH. NI LabVIEW™ i ...
  continue reading
 
Each week, the Wired Science Video Podcast reports on the latest in green tech, health, science, bioethics and space exploration. Obsess over NASA's latest moves, theories on body- and mind-hacking, and the curious habits of our planet's flora and fauna.
  continue reading
 
Artwork

1
Mik + One: The Official Project to Product Podcast by Dr. Mik Kersten

Dr. Mik Kersten: Author of Project to Product and Founder and CEO of Tasktop

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Since publishing best-selling book, Project to Product, technology business leader, Dr. Mik Kersten, has introduced transformative frameworks and ideas for delivering software at scale. He has given numerous standing room only keynotes and presentations worldwide and is an internationally recognized thought-leader. In this podcast, Mik + One, nothing is off the record as Mik sits down with industry leading guests and delves into how they deliver value and drive digital transformations in the ...
  continue reading
 
Loading …
show series
 
Jeremy Schulman has been working at network automation for much of his professional life. On today’s Total Network Operations, host Scott Robohn talks with Jeremy about his ongoing quest to get the network engineering bottleneck out of production. They discuss the early days of network automation when engineers tried to adopt tools from compute sid…
  continue reading
 
Your production IT operations are almost certainly using cryptography libraries that are not quantum-safe, and the time to begin planning a cryptography overhaul is now. But this is likely to be a daunting project because it touches everything: clients, servers, apps, network devices, middleboxes, and so on. Daunting, but doable. We talk with Richu…
  continue reading
 
In today’s episode, Zöe is joined by WIRED’s Jake Lahut to discuss the aftermath of Charlie Kirk’s death — from the response of right-wing tech leaders, to how Kirk helped shape conservative media influencers and U.S politics as we know it. Articles mentioned in this episode: Right-Wing Activist Charlie Kirk Dead at 31 | WIRED ‘War Is Here’: The Fa…
  continue reading
 
We got some interesting listener feedback from our series on OSPF, so today’s N Is for Networking is another “Well actually” episode where we dig into that feedback. In particular, we’ll cover a defense of OSPF multi-area deployments, and dig into OSPF LSA types. Episode Links: N4N032 – OSPF Basics – Packet Pushers Episode Transcript:... Read more …
  continue reading
 
Today we talk about measuring IPv6 and IPv6 statistics. We talk about why it’s useful to measure IPv6, how to track v6 deployment initiatives, and tools to help with your measurements. Episode Links: Google IPv6 – Google IPv6 Global Statistics Dashboard IPv6 Enabled – Hexabuild Episode Transcript: This episode was transcribed by AI and lightly... R…
  continue reading
 
Kubernetes is flexible and customizable, but it can also be notoriously complex and difficult to deploy to. On today’s Day Two DevOps we learn about kro (Kube Resource Operator), an open-source tool that helps simplify complex application deployments. Our guest is Islam Mahgoub, a Solutions Architect at AWS focused on building kro. We talk about...…
  continue reading
 
The CWNP offers vendor-neutral certifications for wireless networking professionals. This summer, the organization rolled out a wired certification, the Certified Network Administrator and Engineer (CNAE). This cert is aimed at wired and wireless network engineers to ensure they have a solid grounding in switching, routing, cabling, and wired proto…
  continue reading
 
Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
  continue reading
 
Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
  continue reading
 
Hasan Piker, the Left’s favorite Twitch streamer has the kind of following that could get votes. But he tells Katie Drummond he’d rather use his influence to tell Democrats “you can't podcast your way out of this problem.” Streaming on Twitch seven days a week for 6-8 hours a day, he doesn’t see himself slowing down anytime soon. We also talk about…
  continue reading
 
Take a Network Break! We shine a red light on an AnyShare Service Agent API vulnerability and an active exploit against FreePBX. SASE vendor Cato Networks makes first-ever acquisition with purchase of AI security startup AIM, Microsoft researchers tout hollow core fiber tests that out-perform glass core fiber optics, and Wi-Fi 7 helps drive up... R…
  continue reading
 
Dating apps have evolved a lot over the years, with apps dedicated to any romantic niche– dog lovers, astrology heads, and big, bushy beards. Despite the seemingly endless options of dating platforms, the industry seems to be at a low. So this week, we talk about the current state of dating apps and what it means for those looking for love (or some…
  continue reading
 
Online gambling is on the rise, and AI is entering the field. This week, Lauren and Mike speak with WIRED’s Kate Knibbs to break down how both startups and traditional gambling sites are promoting their own AI agents with the promise of helping users make better bets. Join WIRED’s best and brightest as they provide an insider analysis of the overla…
  continue reading
 
John Capobianco is back! Just months after our first Model Context Protocol (MCP) discussion, John returns to showcase how this “USB-C of software” has transformed from experimental technology to an enterprise-ready solutions. We explore the game-changing OAuth 2.1 security updates, witness live demonstrations of packet analysis through natural lan…
  continue reading
 
New technologies, tools, and innovations help move IT forward, but it can be hard for users to keep up. Network Automation Nerds welcomes guest William Collins, a dynamic force in the world of technology. As a passionate tech evangelist, he helps to bridge the gap between emerging technologies such as AI and everyday users with... Read more »…
  continue reading
 
Faddom is re-envisioning what application dependency mapping and infrastructure inventory can be in the era of cloud and hybrid IT. Join us today on this sponsored episode as we speak with Faddom’s Itamar Rotem, CPO and Ofer Regev, CTO, about how Faddom’s discovery process can help to improve migrations for any size organization and help... Read mo…
  continue reading
 
Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
  continue reading
 
Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
  continue reading
 
The modern enterprise is built on cloud, with most organizations using SaaS for their “horizontal” work horse layers, such as communications, conferencing, HR, and payroll. That makes the enterprise entirely dependent on the good-faith execution and good-will delivery of the cloud providers. Those providers have a huge economic incentive to reliabl…
  continue reading
 
Take a Network Break! We start with follow-ups regarding the 7-year-old Cisco bug, risks of AI agents, and Anthropic forcing you to opt out or have your chats saved for five years. Then we highlight a serious vulnerability (which is being exploited in the wild) in Citrix NetScaler ADC and Netscaler Gateway systems. On the... Read more »…
  continue reading
 
A year after relaunching The Onion in print, CEO Ben Collins sits down with Katie to talk about why “going into something and not ruining it is bravery.” He tells her the first order of business to get the beloved fake newspaper back on its feet: get rid of all the dick pill ads. They discuss blogging at 15, analog journalism, disinformation, and t…
  continue reading
 
How might we get network traffic from Earth to a lunar base? Or Mars? Or to spaceships carrying astronauts or probes exploring space? And how do we get it back? The problem, among other things, is latency. The answer isn’t TCP/IP. The answer is…complicated. On today’s Heavy Networking we explore the challenges of getting packets... Read more »…
  continue reading
 
Vint Cerf, widely recognized as one of the fathers of the Internet, is today’s special guest on Total Network Operations. He currently serves as Vice President and Chief Internet Evangelist at Google. His pioneering work began back in the 1960’s when he was involved in the ARPANET project. Alongside Bob Kahn, Vint co-invented the TCP/IP... Read mor…
  continue reading
 
In today’s episode, Zöe is joined by WIRED’s Leah Feiger to run through five of the best stories you need to know about — from how AI is eliminating entry level jobs to how a secretive Democrat group is funding high-profile influencers. Then, Zöe and Leah dive into the scoop that AI researchers recently recruited to Meta’s Superintelligence Lab are…
  continue reading
 
Transitioning from IPv4 to IPv6, or at least IPv6-mostly, is no easy task. Today’s show provides some education and advice about IPv6 transition mechanisms. We cover options such as NAT64, DNS64, PREF64, and more, as well as use cases. Also, if your technology vendors aren’t offering some of these mechanisms, ask for them – you’re... Read more »…
  continue reading
 
It’s time to talk crypto. No, not the Bitcoin kind. Ethan and Holly introduce the basics of IPsec, the protocol that authenticates and encrypts traffic between endpoints. They discuss what it is, how it provides trustworthiness and secrecy to IP traffic, and common use cases. They review the different types of IPsec protocols and modes,... Read mor…
  continue reading
 
As the summer comes to an end, we’re thinking about what unplugging, going offline — the ultimate luxury — looks like in 2025. With a growing slate of apps aiming to reduce our screen time and some tech leaders trying to reinvent the internet as it was, where are we heading? WIRED’s features editor Jason Kehe joins us to discuss how as users we are…
  continue reading
 
In the changing landscape of AI data infrastructure, F5 and MinIO are partnering on a solution that brings together the best of each company. This solution bookends the AI stack—it uses F5 for reliable, secure, and observable data delivery and MinIO’s AIStor for storage of all data types. The goal is to help organizations be... Read more »…
  continue reading
 
The Reddit co-founder sits down for a wide-ranging conversation, from buying his first video game to meeting his future co-founder on the first day of college. When he’s not investing in the future of women’s sports, he’s relaunching Digg as the future of toxic-free social media. Join WIRED’s best and brightest as they provide an insider analysis o…
  continue reading
 
Take a Network Break! We double-dip on red alerts as the FBI warns that Russian state hackers are targeting a seven-year-old vulnerability on Cisco IOS and IOS-XE devices (a patch has been available for seven years), and a compromised XZ Utils backdoor is still lurking in some Docker images. Palo Alto Networks has added support... Read more »…
  continue reading
 
DNS security is our topic on today’s Tech Bytes podcast, sponsored by Palo Alto Networks. Specifically, Palo Alto Networks is here to talk about its Advanced DNS Resolver, or ADNSR, which provides a security-centric, cloud-delivered DNS resolution service. We talk about how ADNSR works, its features and capabilities, and how it differs from other D…
  continue reading
 
Today’s episode is all about high-performance memory in switches. We dig into the differences among TCAM, SRAM, DRAM, and HBM, and all the complex tradeoffs that go into allocating memory resources to networking functions. If you’ve ever had to select a Switching Database Manager template or done similar operations on a switch, this is your... Read…
  continue reading
 
In today’s episode, Zöe is joined by WIRED’s Louise Matsakis to run through five of the best stories we published this week — from OpenAI’s being poised to become the highest valued startup in history, to how government staffing cuts have fueled an ant smuggling boom. Then, Zöe and Louise discuss the controversial deals that the Trump administratio…
  continue reading
 
On today’s Total Network Operations we talk through the adoption of AI in network operations with John Capobianco, Head of DevRel at Selector. Selector is the sponsor of today’s episode. John walks us through his career journey as a network engineer, and describes the moment where he realized that AI was going to change how... Read more »…
  continue reading
 
Vibe coding is everywhere, and it’s already drastically changing the tech industry — from shaping how software gets made to who gets hired. So back in July, our very own Lauren Goode went on a journey to become a vibe coder at one of San Francisco’s top startups. In this episode, she sits down with Mike to share her experience and they break down w…
  continue reading
 
Democratizing the learning environment is a passion for Deepak Ahuja. So much so, he founded CloudMyLab, a company that provides hands-on, cloud-based labs and networking environments. His goal is to offer an affordable lab-as-a-service for two groups of people: network engineers seeking certifications, and network engineers and automators that nee…
  continue reading
 
In this unplanned and unfiltered conversation, we dive deep into network automation realities with Ivan Pepelnjak, networking’s long standing and independent voice from ipSpace.net. We explore why automation projects fail, dissect the tooling landscape (Ansible vs. Terraform vs. Python), and discuss the cultural barriers preventing enterprises from…
  continue reading
 
Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to ta…
  continue reading
 
Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to ta…
  continue reading
 
A conversation series that only WIRED could host, led by WIRED’s Global Editorial Director, Katie Drummond. Every week, Katie sits down with influential figures in culture, politics, business, science, and beyond for a discussion captured through the WIRED lens – equal parts geeky, intellectual and goblin mode. This series will feel like the intern…
  continue reading
 
Google now estimates that the specs for a Cryptographically Relevant Quantum Computer (CRQC), which can break conventional public key encryption in a useful amount of time, are lower than they had previously estimated…by 95%. Given the breadth and pace of advancement in quantum computing, this makes the advent of the CRQC likely to happen years... …
  continue reading
 
Revit 2026 introduces major changes to wire sizing, and they’re not where you think. In this episode of the Electrical Building Design Show, we dive into the surprising updates, explore the new conductor and cable settings UI, and reveal what’s missing (and what’s finally possible). If you work with Revit MEP, wire sizing, or electrical design work…
  continue reading
 
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year…
  continue reading
 
LLMs and AI-powered chatbots are becoming a regular feature of network operations tools and vendor product portfolios. Now the next iteration of AI in network ops and automation is likely to be agentic. On today’s Heavy Networking, sponsored by HPE Juniper Networking, we talk about what agentic AI actually means, how AI agents will accomplish... Re…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play