Player FM - Internet Radio Done Right
15 subscribers
Checked 2d ago
Ditambah three tahun yang lalu
Kandungan disediakan oleh Packet Pushers. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Packet Pushers atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Player FM - Aplikasi Podcast
Pergi ke luar talian dengan aplikasi Player FM !
Pergi ke luar talian dengan aplikasi Player FM !
Podcast Berbaloi untuk Didengar
DITAJA
<
<div class="span index">1</div> <span><a class="" data-remote="true" data-type="html" href="/series/action-academy-replace-the-job-you-hate-with-a-life-you-love">Action Academy | Replace The Job You Hate With A Life You Love</a></span>


Ready to replace your 6-figure salary with real freedom? This is the podcast for high earners who feel stuck in jobs they’ve outgrown. If you’re asking, “How do I actually replace $10K–$20K/month so I can quit and never look back?” — welcome home. At Action Academy, we teach you how to buy small businesses and commercial real estate to create cash flow that actually replaces your job. Monday through Friday, you’ll learn from 7–9 figure entrepreneurs, real estate moguls, and acquisition pros who’ve done it — and show you how to do it too. Hosted by Brian Luebben (@brianluebben), who quit his 6-figure sales role in 2022 to build a global business while traveling the world. If you're a high-income earner ready to become a high-impact entrepreneur, this show is your playbook. Subscribe now and start your path to freedom — or keep pretending your job will get better someday....
N4N020: To Cert Or Not To Cert?
Manage episode 474949030 series 3035468
Kandungan disediakan oleh Packet Pushers. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Packet Pushers atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
To cert or not to cert? That is the question Holly & Ethan discuss on today’s episode. Will a certification really land you a networking job? Are certs the guaranteed path to tech career success? We consider this, talking through the benefits, challenges and even risks of networking industry certification. And there’s some bonus material,... Read more »
…
continue reading
1484 episod
Manage episode 474949030 series 3035468
Kandungan disediakan oleh Packet Pushers. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Packet Pushers atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
To cert or not to cert? That is the question Holly & Ethan discuss on today’s episode. Will a certification really land you a networking job? Are certs the guaranteed path to tech career success? We consider this, talking through the benefits, challenges and even risks of networking industry certification. And there’s some bonus material,... Read more »
…
continue reading
1484 episod
Semua episod
×
1 TNO026: Gain Confidence in AI for NetOps with Juniper Networks (Sponsored) 53:58
53:58
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai53:58
Confidence in a new technology is one of the greatest barriers to adoption of that technology. If you don’t believe it will improve your NetOps, why would you adopt it? This is especially true of AI products. On today’s show, we’re joined by Bob Friday, Chief AI Officer of Mist/Juniper to make the case for ... Read more »…

1 HN778: Understanding Model Context Protocol (MCP) with Selector (Sponsored) 50:47
50:47
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai50:47
Model Context Protocol (MCP) is a very new protocol that provides a standard way to link AI models to a variety of data sources and tools. As the industry heads toward agentic AI–in which an AI agent interacts with disparate applications, data sources, and other agents to achieve a task–MCP provides the protocol glue. On ... Read more »…

1 TL012: Weighing the Cost of Team Interventions 39:31
39:31
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai39:31
On this episode of Technically Leadership, Chris Leonard joins to talk about the costs of intervention in a team discussion, whether that’s to bring a team back to a topic or to make a decision that needs to be made. We discuss hero culture (both in the team and as the leader), imposter syndrome, and ... Read more »…

1 N4N023: DNS – Turning Names Into Numbers 48:01
48:01
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai48:01
The Domain Name System (DNS) keeps the Internet running. On today’s N Is For Networking podcast, we talk about how DNS transforms human-readable host names into IP addresses so that Internet traffic can be sent to the right place. We talk about root name servers, Top Level Domains (TLDs), and other elements of the DNS ... Read more »…

1 NAN090: Examining Network Automation’s Present and Future With Chris Grundemann 45:16
45:16
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai45:16
Today we explore the current state of network automation with Chris Grundemann, a co-founder of Network Automation Forum. Chris gives the history of the Network Automation Forum and AutoCon conference, which aims to blend technology and community. He shares ideas for advancing network automation, and invites other network engineers to participate in shaping the future ... Read more »…

1 D2DO270: Spacelift Is Your Infrastructure Glue (Sponsored) 39:51
39:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai39:51
Working with multiple Infrastructure as Code (IAC) tools can be painful. Spacelift provides a platform that operates on top of disparate IaC tools, including Ansible, Kubernetes, Pulumi, Terraform, and OpenTofu. Spacelift helps build the automation with and between these tools, creating graphs of graphs that make your dependencies just work. On today’s show, we talk ... Read more »…

1 PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More 34:09
34:09
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai34:09
Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs ... Read more »…

1 HS101: Time for a Cybersecurity Spring Cleaning? 31:33
31:33
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai31:33
Most organizations have a long list of security holes in the form of unpatched systems and other known but unresolved vulnerabilities. Is it time to hit the big PAUSE button and fix, patch, or mitigate all of that before we resume deploying new systems (and their accompanying risks)? Join us as we tear into whether ... Read more »…

1 NB523: CVE’s Reprieve, Google WAN For Sale, NVIDIA Pledges More US-Made Chips 49:46
49:46
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai49:46
Take a Network Break! We start with a red alert for the CVE program, which nearly lost government funding before CISA stepped in, and then raise an alert for a Dpanel vulnerability. Google makes its Cloud WAN available to enterprises and governments that want connectivity options, a US District Court rules Google’s ad business a ... Read more »…

1 Tech Bytes: Network Observability AIOps Tips For Success (Sponsored) 23:39
23:39
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai23:39
Today on the Tech Bytes podcast we’re talking AI readiness with sponsor Broadcom. More specifically, getting your network observability ready to support AI operations. This isn’t just a hardware or software issue. It’s also a data issue. We’ll get some tips with our guest Jeremy Rossbach. Jeremy is Chief Technical Evangelist and Lead Product Marketing ... Read more »…
Knowing the flow of how a packet gets from one end to the other is one of the most important pieces of advice given by today’s guest, Mark Prosser. He shares his journey in the IT industry, his thoughts on Ops vs. design, and the differences between working in a telco NOC and the enterprise ... Read more »…

1 IPB173: The IPv6 Test Pod Project 32:30
32:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai32:30
What if there was an simple way to test software and services to see if they work in a variety of IPv6 environments, including v6-only, dual-stack, and others? That’s the goal of the IPv6 Test Pod Project. This project provides a device, at no cost to the applicant, that comes with a variety of v6 ... Read more »…
Today’s Heavy Networking is all about overlay technologies, their history, development, and current state, both from engineer and vendor perspectives. We discuss why the industry turns to overlays to solve problems, and look at overlay and segmentation approaches including VXLAN, SRv6, and EVPN. We also drill into the idea that EVPN could become the standard ... Read more »…
Following last week’s introduction to network monitoring, we discuss the Simple Network Management Protocol (SNMP), one of the most implemented types of network monitoring. We discuss how it is organized, operations that SNMP can perform, and versions of SNMP. This week’s bonus conversation is a discussion on the future for SNMP. Episode Links: MIB tree ... Read more »…

1 D2DO269: Intergalactic Dataspeak and Making Data Actionable 39:39
39:39
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai39:39
Data and what you do with it is the topic of today’s show with guest Dominic Chapman, the Head of Product at Axiom. Dominic’s career focus is on data, how to store and how to operationalize all the data that different technology stacks create. We talk with Dominic about how the data does not lie, ... Read more »…

1 HW050: A New Free Tool for Visualizing the Wi-Fi Spectrum 23:35
23:35
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai23:35
If you’ve been looking for an interactive chart to visualize the Wi-Fi spectrum, look no further than guest Joel Crane’s spectrum viewer. With the spectrum visualizer, you can pan across the spectrum, zoom in and out, and select specific regulatory domains. Joel shares his inspiration for the project and how he accomplished it with a ... Read more »…

1 PP058: Network Discovery with NMAP: You’ve Got Swaptions 45:09
45:09
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai45:09
We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to ... Read more »…

1 Tech Bytes: Get Data Center Automation as-a-Service with Nokia Event-Driven Automation (Sponsored) 17:35
17:35
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai17:35
Nokia Event-Driven Automation (EDA) is a modern infrastructure automation platform that combines speed with reliability and simplicity. It makes data center network automation more trustable and easier to use, from small edge clouds to the largest AI fabrics. Today on Tech Bytes, we talk with Sam Arora from Nokia for more details about some of ... Read more »…

1 NB522: Git Turns 20, An iPhone Airlift, Cybersec Silence Speaks Volumes 53:43
53:43
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai53:43
Take a Network Break! Guest co-host Ned Bellavance steps in for Johna this week. We start with a Fortinet vulnerability, and then opine on a memo from Shopify’s CEO on the company requiring and measuring AI use by employees. Git celebrates 20 years, DARPA names 15 companies to participate in a Quantum Benchmarking Initiative to ... Read more »…

1 HN776: Security Platforms: Balancing Efficacy, Ops, and Emerging Threats (Sponsored) 49:33
49:33
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai49:33
Network security has evolved from stateful perimeter firewalls with maybe some IDS/IPS to a complex stack delivered as numerous unique tools, which often don’t talk to one another and may need to be operated by specialists. In this environment it’s hard to unify a security policy, troubleshoot problems, manage and operate tools, and respond effectively ... Read more »…

1 TNO024: Networks for AI and AI for Networks — A Dual Perspective with Aviz Networks (Sponsored) 42:11
42:11
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai42:11
On today’s show, we introduce Aviz Networks with Vishal Shukla, Co-Founder & CEO. Vishal and Aviz are making Networks for AI, and AI for Networks. Vishal explains how Aviz does this by offering AI Networking Unpacked. Designed for open-source and vendor-agnostic networking, AI Networking Unpacked works with existing network infrastructures. It also integrates with existing ... Read more »…

1 TL011: Getting the Entire Team to Speak 41:55
41:55
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai41:55
On today’s episode we’re joined by Daniel Ward to get a sneak preview of his talk on Getting the Entire Team to Speak, which he’ll give at DevOpsDay Austin. His addresses the challenges of getting people to speak up. Why is this needed? Getting input from everyone on a team lets people raise issues and ... Read more »…

1 N4N021: Is It the Network? Network Monitoring Basics 56:03
56:03
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai56:03
How do you know what is happening within your network, especially when something isn’t working? Network monitoring is the answer. On today’s show, we’ll start with the basics of network monitoring. We’ll cover what it is, how it’s used, and suggest some paid and open source network monitoring tools. This week’s bonus material is a ... Read more »…

1 NAN089: A Career Journey of Exponential Learning 59:00
59:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai59:00
“If you don’t feel nervous in front of a challenge, you are not exponentially learning” is how today’s guest Christian Adell describes his own approach to career growth. Christian chats with us first about how he got started in IT, his various experiences in both networking and DevOps and then network automation. He leads a ... Read more »…

1 PP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX 54:13
54:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai54:13
Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI ... Read more »…

1 HS100: Lead Without Lying: The (Radical) Strategy of Honesty 41:45
41:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai41:45
Is it actually possible to run a team without lying? Steven Gaffney, author of the book, “Just Be Honest”, joins Johna and John to talk about why being honest is harder than it sounds–and how (and why) to do it anyway. Steven spends his career advising science and technology leaders about how to be more ... Read more »…

1 Tech Bytes: An Inside Look at the Wireshark Foundation (Sponsored) 16:56
16:56
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai16:56
Today on the Tech Bytes podcast we get a look at the inner workings of the Wireshark Foundation. Many already know what Wireshark is and can do for you. It’s a free, open-source, and widely used tool for packet and protocol analysis. But what does it take to keep Wireshark running, to update software and ... Read more »…

1 NB521: Optics Advances in the Data Center; Google Extends Gmail’s End-to-End Encryption 42:55
42:55
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai42:55
Take a Network Break! We check in on a serious Firefox vulnerability, explore NIST’s latest post-quantum encryption algorithm, and discuss a broken auto-update functionality in VMware Workstation. NetBox adds config drift detection to its network automation software, the startup Lightmatter tackles co-packaged optics, and Corning launches Glassworks AI in a bid to replace copper cabling ... Read more »…

1 HN775: How To Train Your Very Own AI-Enabled Slackbot 1:03:59
1:03:59
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai1:03:59
On today’s Heavy Networking, we’ll discuss building a Slackbot wired to an AI and trained on your own organization’s knowledge. The potential use cases for network operations are fascinating, and today’s guest, Kyler Middleton is here to explain the finer details on how to do it and point us to free resources created so that ... Read more »…

1 TNO023: Networking’s Third Phase – The Network Operator Experience 57:30
57:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai57:30
Guest Chris Grundemann believes that NetOps is in the third phase of networking–improving the network operator experience. Not just making the network functional or improving end user experience. In this episode, Chris tells his origin story at a wireless service provider and growth into a founder of multiple companies. He also shares his community-focused work ... Read more »…

1 IPB172: IPv6 SMB – Does it Work? Plus Other Listener Questions! 30:18
30:18
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai30:18
On today’s episode we’re doing some follow up on listener comments and questions that have come in via the Follow Up on packetpushers.net. We cover questions regarding IPv6 for small businesses, then go even smaller and answer a question about IPv6 for home networks. Lastly, we have a quick discussion about Path MTU discovery with ... Read more »…
To cert or not to cert? That is the question Holly & Ethan discuss on today’s episode. Will a certification really land you a networking job? Are certs the guaranteed path to tech career success? We consider this, talking through the benefits, challenges and even risks of networking industry certification. And there’s some bonus material, ... Read more »…

1 D2DO268: Solving Big Problems By Solving Small Problems 40:07
40:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai40:07
“You build a shop that solves big problems by solving small problems” is advice given by today’s guest, Merritt Baer. Merritt is currently a CISO at Reco, and has deep security experience in both government and private sectors. She chats with Day Two DevOps podcast hosts Ned Bellavance and Kyler Middleton to discuss the current ... Read more »…

1 HW049: Updates on Wi-Fi Security, Wi-Fi 7 and WPA3 26:58
26:58
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai26:58
Host Keith Parsons and guest Stephen Orr took time at the Wireless LAN Professionals Conference in Phoenix this past February to discuss the security implications of Wi-Fi 7. Stephen explains that new features in Wi-Fi 7 require specific security protocols such as WPA3 to function. Challenges with device onboarding and secure authentication are addressed next, ... Read more »…

1 HS099: From CLI to CFO: Translating Complex Network Data into Clear Strategic and Financial Insights (Sponsored) 34:40
34:40
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai34:40
IT and network leaders need more than uptime—they need to know what their networks cost, what they deliver, and how future changes will impact the business. That’s where Netos comes in. CEO and founder Richard Foster joins Johna and John in a lively discussion to explore how Netos turns complex operational data into clear financial ... Read more »…

1 PP056: Ask A CISO with Joe Evangelisto 38:30
38:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai38:30
On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, and led him ultimately to the CISO role. Joe talks about building security programs from the ground up and developing both personally and ... Read more »…

1 NB520: When Good LLMs Do Bad Things, Dell’s Workforce Downsizes and Quantum Key Distribution From Space 25:24
25:24
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai25:24
Grab a virtual doughnut to blaze through this week’s IT news with Johna Johnson and John Burke as Drew Conry-Murray is enjoying his glazed, filled and sprinkled vacation donuts. Today, we’re going to talk about getting good LLMs to do bad things, Dell’s workforce downsizing, Cloudflare’s recent outage, some developments in space networking, and more. ... Read more »…

1 TNO022: Secure Automation at Enterprise Scale for the Public Sector with Red Hat Ansible (Sponsored) 1:08:21
1:08:21
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai1:08:21
There are both benefits and challenges when adopting automation in the public sector, but Red Hat Ansible enhances efficiency, security and service delivery. With the right tooling, network operators can integrate automation into existing environments and improve network security. Providing insights into adopting automation in the public sector are Tony Dubiel, Principal Specialist Solution Architect ... Read more »…

1 HN774: Who Put These OT Risks In My IT Ops? Fortinet Has Answers (Sponsored) 46:53
46:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai46:53
IT and infosec professionals are used to operating and protecting mission-critical infrastructure; servers, databases, load balancers, and so on. But what about valves that control the flow of gas or oil in a refinery? Temperature and vibration sensors that monitor industrial manufacturing processes? If you’re thinking “That’s not my problem” think again. There’s a whole ... Read more »…

1 TL010: Leading With Influence Rather Than Mandating 48:42
48:42
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai48:42
How do you lead with influence rather than mandate? On today’s show, we talk with JJ Asghar from IBM. JJ shares his extensive experience in managing open-source namespaces like GitHub and npm for IBM. He discusses the challenges of influencing decisions without formal authority and tailoring communication styles for different audiences. JJ also advocates for ... Read more »…

1 N4N019: Howdy, Neighbor! And Other Routing Stuff 42:36
42:36
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai42:36
In today’s episode, we continue the discussion about routing and routing protocols by focusing on commonalities rather than differences among protocols such as OSPF, RIP, EIGRP, or BGP. We explain how, in general, routing protocols discover each other, communicate, maintain relationships, and exchange routing information. Next, we explore the topics of selecting best paths in ... Read more »…

1 NAN088: See Something, Improve Something – An Iterative Approach to Automation Success 47:33
47:33
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai47:33
On today’s Network Automation Nerds, industry veteran Michael Bushong talks about lessons learned from failure. As the network industry grapples with automation and network engineers confront yet another cycle of upskilling and grinding out new certs, he warns against executives and practice leads aiming for the biggest, shiniest project. His advice? Find something that matters ... Read more »…

1 PP055: News Roundup – BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More 38:28
38:28
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai38:28
This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors penetrating the operator of a small US electric utility. We also discuss ransomware attacks targeting critical infrastructure, a backdoor in an Android variant used in streaming devices, ... Read more »…
What do you do when your colleagues or senior leaders ask you to do something illegal? It’s hardly hypothetical; recent years have seen high-profile firings and convictions of CIOs and CISOs who’ve been ordered to break the law. John and Johna discuss steps that tech leaders can take if they’re put on the spot. Episode ... Read more »…

1 NB519: Google Bids $32 Billion for Cloud Security Startup; NVIDIA Makes Nice With Quantum Computing 40:47
40:47
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai40:47
Take a Network Break! This week we cover Google’s $32 billion acquisition of CNAPP provider Wiz, Cloudflare offerings for AI security and support for post-quantum encryption, and NVIDIA’s pledge to open a quantum research center in Boston. NVIDIA has also announced new switch platforms with co-packaged optics for greater efficiency, Cisco shares details on its ... Read more »…

1 Tech Bytes: How Fortinet Unified SASE Secures Hybrid Workers for Customer Liquid Networx (Sponsored) 18:29
18:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai18:29
Today on the Tech Bytes podcast, sponsored by Fortinet, we get a customer view of Fortinet’s SASE offering from Liquid Networx. Liquid Networx isn’t just a Fortinet customer; it also provides professional services for other customers of FortiSASE. We’ll talk about why Liquid Networx decided to adopt SASE, its evolution from on-prem to cloud-based security, ... Read more »…

1 HN773: Optimizing Ethernet for AI – An Update On the Ultra Ethernet Consortium 1:22:39
1:22:39
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai1:22:39
The Ultra Ethernet Consortium (UEC) is an industry body that aims to optimize Ethernet for AI and HPC use cases. On today’s Heavy Networking we get an overview of the UEC and an update on its efforts. We’re joined by J Metz and Rip Sohan, both heavily involved with the UEC. We discuss the consortium’s ... Read more »…

1 TNO021: An Operator’s Perspective on NetOps and Programming 47:04
47:04
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai47:04
What’s it like to move from a NOC role to an operations and automation role? On today’s show we get the perspective of guest Joseph Nicholson, a Network Operations Engineer at NTT Data. He explains how he got started with automation, using tools like Python and Ansible, and the critical role of documentation in network ... Read more »…
Our ongoing IPv6 Basics series continues with an episode on v6 routing essentials. We start with a comparison of various routing protocols: RIP, OSPF, IS-IS, EGP, and BGP. We look at pros and cons of each, and discuss challenges such as dual stack IPv4 and IPv6 network implementation, memory and resource use with IPv6, and ... Read more »…

1 N4N018: RIB vs. FIB & Administrative Distance or Route Preference 52:21
52:21
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai52:21
Ready for more routing and routing protocols? Today we discuss the roles of the network operating system (NOS), routing protocols, the Routing Information Base (RIB), and the Forwarding Information Base (FIB). We also include the dynamics of routing protocols, the importance of hardware like TCAM for performance, and the concept of administrative distance or route ... Read more »…

1 D2DO267: Get Excited About Riding the AI Infrastructure Wave 40:53
40:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai40:53
The AI buildout is driving an infrastructure boom. On today’s show, we talk with Kendall Miller, an independent consultant in the DevOps and cloud-native space, about the boom’s potential impacts on DevOps. For instance, the rise of AI workloads will increase the amount of infrastructure to be supported. At the same time, AI tools are ... Read more »…

1 HW048: Indoor GPS: Why Can’t We Get a Signal In Here? 31:02
31:02
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai31:02
Why can’t we get a GPS signal indoors and what does that mean for modern wireless technology? Guest Luke Jenkins has answers. He starts with the history, functionality, and applications of GPS and GNSS technologies and the proliferation of satellites enhancing navigation accuracy. He then delves into the technical aspects such as atomic clocks, signal ... Read more »…

1 PP054: Understanding WireGuard and Overlay VPNs with Tom Lawrence 49:11
49:11
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai49:11
WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard’s opinionated approach to crypto suites helps improve its performance, and how WireGuard compares to OpenVPN. We also look at the broader category of overlay VPNs ... Read more »…

1 Tech Bytes: Securing 5G Networks With Palo Alto Networks Prisma SASE (Sponsored) 15:13
15:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai15:13
Today on the Tech Bytes podcast we dive into 5G security with sponsor Palo Alto Networks. 5G services are being adopted worldwide for use cases such as IoT, connected vehicles, and AR and VR. At the same time, the number of threats against 5G is growing. We’ll talk about Palo Alto Networks Prisma SASE 5G, ... Read more »…

1 NB518: Clock Starts For New Intel CEO; Arista Load Balancing Targets AI Infrastructure 38:16
38:16
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai38:16
Take a Network Break! We start with warnings about an Apple Webkit zero day and ransonware exploits against known Fortinet vulnerabilites, and discuss attribution issues with the X DDoS attack. Intel names Lip-Bu Tan as Chief Resurrection Officer, but how long does he have before investors get antsy? HPE plans to lay off thousands of ... Read more »…

1 TNO020: Automating Network Operations with Juniper Mist (Sponsored) 40:40
40:40
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai40:40
Mist AI is a key part of Juniper’s AI-Native Networking Platform to simplify operations and optimize user experiences across wired and wireless networks. On today’s sponsored show, we explore the evolution of network operations and talk about the integration of AI and automation in the Juniper Mist platform. We also look at how Juniper has ... Read more »…

1 HN772: Measuring Users’ Digital Experience with Catchpoint Internet Performance Monitoring (Sponsored) 48:22
48:22
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai48:22
Digital Experience Monitoring (DEM) is all about understanding a user’s application experience, and pinpointing problems if the experience is bad. Under the DEM umbrella, you’ll find Internet Performance Monitoring, or IPM. That’s our topic in today’s episode with sponsor Catchpoint. With more and more applications hosted in the cloud and more employees working remotely, organizations ... Read more »…
On today’s N Is For Networking, we explore the fundamentals of routing, focusing on layer 3 of the OSI model. We explain the concepts of routers, routing tables, and routing protocols, and discuss why it’s important to have a firm grasp of these concepts before you tackle advanced topics such as VXLAN and EVPN. Today’s ... Read more »…

1 NAN087: Modular Network Management with Slurp’it and Netpicker 48:28
48:28
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai48:28
In this episode of the Network Automation Nerds podcast, we talk network management with Wim Gerrits and Pieter van Os, co-founders of Slurp’it and Netpicker. These tools aim to simplify network inventory and discovery, and ensure compliance and security. We talk about what drove them to build these tools, what problems they solve, and how ... Read more »…

1 PP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored) 42:47
42:47
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai42:47
On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think again. Bowtie’s approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and ... Read more »…

1 HS097: Build A Strategy, Not Just A Project Plan 30:28
30:28
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai30:28
IT teams too often wrap a strategy statement around a basket of projects already in progress or known to be coming, rather than defining a strategy and then letting it spawn, guide, or absorb projects. On today’s Heavy Strategy we discuss whether IT teams have any alternative to this approach, given how much gets “thrown ... Read more »…

1 Tech Bytes: How Internet Synthetic Transactions Boost App Performance Visibility (Sponsored) 15:42
15:42
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai15:42
Today on the Tech Bytes podcast we talk about Internet Performance Monitoring, or IPM, with sponsor Catchpoint. Catchpoint provides visibility across the full Internet Stack to help you understand the performance of your SaaS and cloud apps, WAN and branch connections, and more. We’ll talk about how Catchpoint can enrich network monitoring with synthetic transactions ... Read more »…

1 NB517: TSMC Pledges $165 Billion for US Chip Manufacturing; Will the CHIPS Act Get Axed? 46:39
46:39
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai46:39
Take a Network Break! This week we’re joined by guest analyst Tom Hollingsworth of The Futurum Group. We start with red alerts from Broadcom on multiple vulnerabilities and an emergency patch from Cisco for its Webex platform. In tech news we discuss SolarWinds’ acquisition of Squadcast and how it fits into the SolarWinds portfolio, Aviatrix’s ... Read more »…

1 HN771: Is The CCIE Still Worth It In 2025? 55:52
55:52
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai55:52
The CCIE remains the gold standard for networking certifications. But these days there are lots of other avenues for developing your skills and advancing your networking career, including network automation, cloud networking, and yes, even AI. So is the CCIE still worth it? We chew on this topic with Eman Conde. Eman has been known ... Read more »…

1 TNO019: A Look At NetOps Inside a Colocation Facility 44:13
44:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai44:13
Ever wonder what network operations are like inside a colocation facility? Today we talk with Scott Brookshire, CTO of OpenColo. Scott shares his journey into networking, how OpenColo was founded, and the evolution of the company from a few servers to a significant data center operation. We delve into what it means to run a ... Read more »…

1 IPB170: RFC 7050 vs RFC 8781 for IPv6 Prefix Discovery 25:18
25:18
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai25:18
In this episode of the IPv6 Buzz, we dive into two RFCs for discovering IPv6 prefixes: 7050 and 8781. Why these two? First, 8781 is being proposed as preferential to 7050. Second, co-host Nick Buraglio is an author on 8781 and has insights to share. We start with some background on RFC 7050, including the ... Read more »…

1 N4N016: Routers Are Not Switches…Are They? 51:30
51:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai51:30
The line between switches and routers can get a little blurry. On today’s N Is For Networking, we try to clear things up. We start by defining what a router and switch are, and then provide some historical and technical context to better understand the differences. Then we discuss how modern switches have evolved to ... Read more »…

1 D2DO266: How AI Affects the Developer Experience 43:00
43:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai43:00
Let’s talk about how AI affects the developer experience, particularly for open source tools such as Terraform. We’re joined by guests Welly Siauw and Tyler Lynch to examine a project that leverages AI to automate the generation of documentation and examples for AWS Terraform providers. We delve into the iterative development process with AI, the ... Read more »…

1 PP052: The State of the Network Security Market In 2025 40:38
40:38
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai40:38
How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He’s Sr. Director, Enterprise Security and Networking at the Dell’Oro Group, a ... Read more »…

1 HW047: Diverse Career Paths In the Wi-Fi Industry 25:39
25:39
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai25:39
There are multiple avenues into a career in Wi-Fi. Today on Heavy Wireless, we explore different career paths with guests Sam Clements and Tauni Odia. Sam shares his unconventional journey from working at a gas station to becoming a Wi-Fi networking professional. He emphasizes the value of certifications and seizing opportunities. Tauni, with a background ... Read more »…

1 NB516: Cisco, Nvidia ASIC Deal Chases Enterprise AI; Juniper Welcomes Third-Party LLMs 24:46
24:46
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai24:46
Take a Network Break! This week we start with a couple of follow-ups and a Red Alert, and then jump into tech news. Cisco and Nvidia team up to put Cisco ASICs and the Nexus NOS into Nvidia Ethernet switches, the market reads tea leaves as Microsoft walks away from data center capacity, and Juniper ... Read more »…

1 HN770: Deploying A Global Network in Minutes With Megaport (Sponsored) 35:53
35:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai35:53
In our conversation today with CTO Cameron Daniel of Megaport, we discuss their global WAN architecture, PoPs, use cases, the Megaport Cloud Router, and more. Megaport is our sponsor today. It’s accurate to describe Megaport as providing Network-as-a-Service. Megaport’s automated connectivity solutions enable rapid provisioning of circuits, contrasting sharply with traditional telcos. The discussion also ... Read more »…

1 N4N015: Spanning Tree Part 3 – Versions, States and Guards 41:58
41:58
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai41:58
We’re back with the third and last (for now) installment of our spanning tree series. Today’s episode includes an explanation of spanning tree versions, 802.1D, 802.1w, 802.1s, and their practical implications for network design. The discussion then turns to BPDU guard for preventing loops and ensuring rapid connectivity. Bonus material on why you should or ... Read more »…

1 TNO018: The Network Engineer’s Evolution: Thinking Like a Product Owner (Sponsored) 49:15
49:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai49:15
What does it mean for a network engineer to develop a product mindset? And what does a product mindset have to do with network automation? Guest Peter Sprygada connects these concepts in today’s episode of Total Network Operations, sponsored by Itential. Peter says that as an organization advances its network automation capabilities, the impetus shifts ... Read more »…

1 NAN086: A Reality Check On AI for Network Operations 53:24
53:24
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai53:24
On today’s episode, we get a reality check on all the hype surrounding AI with guest Phil Gervasi. Phil provides background on Large Language Models (LLMs) and their applications, as well as the current state of AI technology. We also delve into practical use cases for AI in network operations, from AI as an assistant ... Read more »…

1 PP051: Security Certifications From Beginner to Advanced 36:53
36:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai36:53
Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan ... Read more »…

1 HS096: Corporate Foresight and How to Get It 40:25
40:25
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai40:25
Someone needs to be scanning the horizon for the threats and opportunities that are distant for now–and they need to be able to turn that foresight into action. We welcome John Miranda of Intel for a lively discussion of how to look ahead, how to get folks to pay attention to the alerts you raise, ... Read more »…

1 NB515: Quantum Computing’s Future Looking More Certain; Arista Posts Record 2024 Revenues 27:32
27:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai27:32
Lots of good stuff in this week’s Network Break. Microsoft announces an 8-qubit quantum chip and declares that practical quantum computing is years, not decades, away. D-Wave says its quantum computers are now commercially available for research facilities, academic institutions, and governments. Apple rolls its own 5G modem into its iPhone 16e. Meta announces its ... Read more »…

1 HN769: CI/CD Pipelines and Network Automation 57:40
57:40
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai57:40
Continuous Integration / Continuous Deployment (CI/CD) is a framework that developers use to help them manage and integrate frequent code changes. As network automation evolves, should network engineers adopt CI/CD? Guest Tony Bourke joins us to talk about CI/CD pipelines: what they are, how they’re used, and how they can support network automation efforts. We ... Read more »…

1 TNO017: Lead People, Manage Machines and Processes 43:49
43:49
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai43:49
Lead people. Manage machines and processes. That’s the the advice from Bill Hunter, today’s guest on Total Network Operations. Bill shares lessons of resilience and adaptability he learned early in his career, including the power of good habits. Bill and Scott discuss how to identify processes that can be automated and when and where to ... Read more »…

1 IPB169: 10 Years of the UK IPv6 Council 27:58
27:58
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai27:58
IPv6 Buzz welcomes back Veronika McKillop, the founder and President of the UK IPv6 Council, to talk about the council’s formation and achievements in the past ten years. We look at IPv6 adoption in the UK and its challenges, and what the future holds for IPv6. Veronika highlights the need for improved IPv6 education in ... Read more »…

1 N4N014: Spanning Tree Part 2 – Root Bridge, Edge Port, Forwarding and Blocking 34:58
34:58
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai34:58
Welcome to part 2 of our spanning tree series. We start with a quick review and then discuss root bridges, root ports, designated ports, and forwarding and blocked ports. We explain the impact of topology changes on spanning tree and network performance, and discuss how topology changes and convergence events are communicated. Last but not ... Read more »…

1 D2DO265: How Do We Measure Developer Experience? 40:18
40:18
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai40:18
Developer experience is a hard metric to measure qualitatively. On today’s show, we talk with Kristen Foster-Marks about Developer Experience, or DevEx. We start with the controversial concept of “ghost engineering,” which claims many software engineers do not contribute meaningfully to their work. We delve into the validity of this claim, and discuss the scientific ... Read more »…

1 PP050: Understanding–and Protecting Yourself From–the Malware Economy 42:40
42:40
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai42:40
There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today’s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and the most effective strategies ... Read more »…

1 HW046: The Flipper Zero: A Swiss Army Knife for Tech Enthusiasts 24:39
24:39
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai24:39
The Flipper Zero is like a Swiss Army knife for wireless tech enthusiasts. Today’s guest, Jason Beshara, is teaching a course on the Flipper Zero device at WLPC Phoenix 2025. He discusses its functions, including its ability to send and receive a variety of radio signals including Bluetooth, NFC, and sub-gigahertz frequencies. The conversation covers ... Read more »…

1 Tech Bytes: Nokia Event-Driven Automation: Simple, Reliable Data Center Automation (Sponsored) 18:02
18:02
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai18:02
Nokia’s Event-Driven Automation, or EDA, is a network automation platform that aims to help network engineers achieve predictable, error-free operations so you can keep up with all the change tickets coming your way while ensuring the data center is reliable and performant. On today’s Tech Bytes podcast, sponsored by Nokia, we’ll talk about how EDA ... Read more »…

1 NB514: Cisco, Juniper Announce New Switches; SolarWinds Goes Private in $4.4 Billion Buyout 38:20
38:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai38:20
Take a Network Break! We start with some Red Alert vulnerabilities to get your blood pumping, and then dive into networking news. Cisco announces new data center switches with AMD Pensando DPUs that let you deploy security and other services directly on to the switch. Cisco ThousandEyes is previewing Traffic Insights, which correlates flow records ... Read more »…

1 HS095: The Journey to a Self-Healing Network: Intelligence, Agents, and Complexity (Sponsored) 37:06
37:06
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai37:06
Can AI and automation create a truly autonomous network, one that’s self-diagnosing and self-healing? Join Vitria CTO and Founder Dale Skeen and industry analyst Charlotte Patrick in this sponsored episode of Heavy Strategy to discuss the challenges–and limitations–of using AI to create autonomous networking. This discussion covers the “intelligence architecture” required to implement automation, and ... Read more »…

1 HN768: Ctrl+Alt+Delivered App Routing Reinvented with Palo Alto Networks SD-WAN (Sponsored) 44:53
44:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai44:53
Connecting your branch to your wide area network used to be simple enough. Call your carrier, get a circuit ordered, wait a long time, then turn it up. A little routing, and there you were. Cloud blew that model apart. Now when we connect branches to our corporate networks, we have to consider not only ... Read more »…

1 TNO016: One Integrated Experience for NetOps, SecOps, and Business Teams (Sponsored) 43:22
43:22
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai43:22
Collaboration among tech and business teams is crucial to advancing your business. Extreme Networks is introducing Extreme Platform ONE to support this collaboration. In this sponsored episode, we talk about how this product is designed to streamline workflows and enhance user experience through automation and AI integration. Extreme Networks Platform ONE is a centralized platform ... Read more »…

1 N4N013: Spanning Tree Part 1 – An Introduction and Broadcast Storms 52:33
52:33
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai52:33
Spanning tree is a topic so mysterious and complicated that common advice is just to disable it. In today’s episode, we start a mini-series on spanning tree, hoping to better explain what it is and what it does. We begin with basic spanning tree terminology and its role in preventing loops in an Ethernet network. ... Read more »…

1 NAN085: Embrace Change to Thrive in the Tech Industry 59:54
59:54
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai59:54
Embracing change is sometimes easier said than done. Today we talk with Monika Machado, who has held significant roles at companies like Microsoft and Oracle. She shares her story of learning and personal growth. Monika highlights the value of mentor-mentee relationships, continuous learning, understanding the difference between leadership and management, and the value of owning ... Read more »…

1 PP049: CSMM – A Practical Model for Improving Your Cloud Security 42:55
42:55
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai42:55
The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process ... Read more »…

1 HS094: How Risky Is Your Organization’s AI Strategy? 24:36
24:36
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai24:36
AI Large Language Models (LLMs) can be used to generate output that the creators and users of those models didn’t intend; for example, harassment, instructions on how to make a bomb, or facilitating cybercrime. Researchers have created the HarmBench framework to measure how easily an AI can be weaponized. Recently these researchers trumpeted the finding ... Read more »…

1 NB513: UK Demands Apple Backdoor; AI Spending: Can’t Stop, Won’t Stop 39:15
39:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai39:15
Take a Network Break! We start with some red alerts for Cisco ISE, Zyxel, Microsoft, and a Web manager suite called WeGIA. US senators and security experts sound the alarm about DOGE employees introducing security and stability risks in sensitive US government systems, security researchers demonstrate the effectiveness of supply chain attacks that start with ... Read more »…

1 Tech Bytes: When the Internet Is Your Network, Catchpoint IPM Provides Critical Visibility (Sponsored) 16:24
16:24
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai16:24
Today on the Tech Bytes podcast we dive into Digital Experience Monitoring and Internet Performance Monitoring with sponsor Catchpoint. As more users rely on SaaS and cloud for applications, the Internet has essentially become a business-critical network. But how can you, a network engineer, be expected to manage the Internet? Enter Internet Performance Monitoring, or ... Read more »…

1 HN767: Effective Networking on the Cheap 1:09:58
1:09:58
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai1:09:58
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, talk about the trade-offs that come with free software, and how ... Read more »…

1 TNO015: Revolutionizing Telecom with NetOps Automation and Collaboration 1:00:07
1:00:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai1:00:07
Today’s episode with guest Joan Garcia provides valuable insights into the complexities of modern network operations at a telco, the importance of collaboration across technical domains, and the strategic decisions that drive innovation in the telecom industry. Joan’s experiences and perspectives offer ideas for navigating the challenges of integrating different layers of network architecture while ... Read more »…

1 IPB168: Deploying IPv6-Only Wi-Fi at the SC24 Conference 34:22
34:22
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai34:22
Want to know how an IPv6-only wireless network was deployed at a conference with 18,000 attendees? Join us as we talk through the technical details with Tom Costello, a senior network engineer at Argonne National Laboratory. Tom volunteers at the International Conference for High Performance Computing, Networking, Storage and Analysis (SC for short) to help ... Read more »…

1 N4N012: Russ White On Why We Need Network Models 49:21
49:21
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai49:21
Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered ... Read more »…

1 D2DO264: Serverless Goes Mainstream 38:40
38:40
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai38:40
Serverless is mature enough now to be a mainstream choice for application development. But that doesn’t mean interesting things aren’t happening. Benjamen Pyle joins Kyler and Ned on Day Two DevOps to talk about the potential for small vendors and startups to develop high-quality services purpose-built to solve specific problems. They also discuss the benefits ... Read more »…

1 PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More 39:08
39:08
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai39:08
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack ... Read more »…

1 HW045: A Comprehensive Guide to Wi-Fi Explorer Pro 3: Features, Insights, and More! 27:17
27:17
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai27:17
Wi-Fi Explorer Pro is a popular wireless scanner. On today’s show we dive into the tool with its creator, Adrian Granados. We also talk about the launch of the new book Wi-Fi Explorer Pro 3 – The Definitive User Guide, written by Granados and co-author Nigel Bowden. We delve into the history and features of ... Read more »…

1 NB512: US Objects to HPE-Juniper Wedding; Cheeky DeepSeek Freaks VCs 29:55
29:55
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai29:55
Take a Network Break! The US Justice Department blocks the HPE-Juniper merger with a surprise lawsuit, DeepSeek shakes up the AI world, and Broadcom rolls out quantum-safe Fibre Channel controllers. Sweden seizes a vessel suspected of tampering with a subsea cable, a code update could make Linux significantly more power-efficient, and the WLAN market gets ... Read more »…

1 HN 766: Ensuring QoE for Agentic AI With Broadcom VeloRAIN (Sponsored) 55:06
55:06
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai55:06
On today’s show, we’re discussing the complexities of network design for AI computing at the edge. We’re not talking about AIOps, although that might come up in this conversation. Instead, we’re focusing on how to effectively cope with the network traffic patterns happening on your network as a result of AI computing workloads. Our subject ... Read more »…
Selamat datang ke Player FM
Player FM mengimbas laman-laman web bagi podcast berkualiti tinggi untuk anda nikmati sekarang. Ia merupakan aplikasi podcast terbaik dan berfungsi untuk Android, iPhone, dan web. Daftar untuk melaraskan langganan merentasi peranti.