show episodes
 
Artwork

1
Network Break

Packet Pushers

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
Hey guys, welcome to NetworkChuck!! I love IT, Networks, VoIP, Security, Python..........IT's AWESOME!!! But my passion is helping people get started on this incredible career path. I make videos that help you get started in IT and keep you motivated along the way as you pursue GREATNESS. *****Want to help me create more videos? Hit me up on Patreon: https://patreon.com/networkchuck
  continue reading
 
Artwork

1
ACM ByteCast

Association for Computing Machinery (ACM)

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
ACM ByteCast is a podcast series from ACM’s Practitioners Board in which hosts Rashmi Mohan and Jessica Bell interview researchers, practitioners, and innovators who are at the intersection of computing research and practice. In each episode, guests will share their experiences, the lessons they’ve learned, and their own visions for the future of computing.
  continue reading
 
Have you ever been curious on how a computer science/software engineering major might be like? As a student of the Costa Rica Institute of Technology, I'll hand you my reviews, tips, and experiences regarding the courses any aspiring computer scientist or software engineer must take in order to graduate. ITCR's curriculum is mainly influenced by the ACM guidelines. Contact: [email protected] https://www.facebook.com/CSSECCR/
  continue reading
 
Artwork

1
Theory and Practice

GV (Google Ventures)

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Season 4 will explore one of humanity's most rapidly advancing and impactful changes: what does it mean to be human in the age of AI when computers and robots are accomplishing more human functions? How will AI with human-level skills influence us and enhance the world around us? How will we change AI, and how will it change us? Theory and Practice opens the doors to the cutting edge of biology and computer science through conversations with leaders in the field. The podcast is hosted by Ant ...
  continue reading
 
An exciting new podcast from the National Centre for Computing Education in England. Each month, you get to hear from a range of experts, teachers, and educators from other settings as they discuss with us key issues, approaches, and challenges related to teaching computing in the classroom.
  continue reading
 
Artwork

1
Codexpanse Podcast

Rakhim Davletkaliyev

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Universe is computable. Information is its fundamental property, along with space and time. Computer science is a young field, but we didn't invent computing, we've discovered it. Codexpanse explores the computing nature of reality, ideas of programming and math, and our role in this exciting world.
  continue reading
 
Loading …
show series
 
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, talk about the trade-offs that come with free software, and how... Read …
  continue reading
 
Today’s episode with guest Joan Garcia provides valuable insights into the complexities of modern network operations at a telco, the importance of collaboration across technical domains, and the strategic decisions that drive innovation in the telecom industry. Joan’s experiences and perspectives offer ideas for navigating the challenges of integra…
  continue reading
 
Want to know how an IPv6-only wireless network was deployed at a conference with 18,000 attendees? Join us as we talk through the technical details with Tom Costello, a senior network engineer at Argonne National Laboratory. Tom volunteers at the International Conference for High Performance Computing, Networking, Storage and Analysis (SC for short…
  continue reading
 
Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered... Read more »…
  continue reading
 
Serverless is mature enough now to be a mainstream choice for application development. But that doesn’t mean interesting things aren’t happening. Benjamen Pyle joins Kyler and Ned on Day Two DevOps to talk about the potential for small vendors and startups to develop high-quality services purpose-built to solve specific problems. They also discuss …
  continue reading
 
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack... Read more »…
  continue reading
 
Wi-Fi Explorer Pro is a popular wireless scanner. On today’s show we dive into the tool with its creator, Adrian Granados. We also talk about the launch of the new book Wi-Fi Explorer Pro 3 – The Definitive User Guide, written by Granados and co-author Nigel Bowden. We delve into the history and features of... Read more »…
  continue reading
 
Take a Network Break! The US Justice Department blocks the HPE-Juniper merger with a surprise lawsuit, DeepSeek shakes up the AI world, and Broadcom rolls out quantum-safe Fibre Channel controllers. Sweden seizes a vessel suspected of tampering with a subsea cable, a code update could make Linux significantly more power-efficient, and the WLAN mark…
  continue reading
 
Take a Network Break! The US Justice Department blocks the HPE-Juniper merger with a surprise lawsuit, DeepSeek shakes up the AI world, and Broadcom rolls out quantum-safe Fibre Channel controllers. Sweden seizes a vessel suspected of tampering with a subsea cable, a code update could make Linux significantly more power-efficient, and the WLAN mark…
  continue reading
 
On today’s show, we’re discussing the complexities of network design for AI computing at the edge. We’re not talking about AIOps, although that might come up in this conversation. Instead, we’re focusing on how to effectively cope with the network traffic patterns happening on your network as a result of AI computing workloads. Our subject... Read …
  continue reading
 
Today we get an education on what a high speed cable assembly really is from guest Ryan Harris from today’s sponsor, The Siemon Company. Ryan shares the evolution of high-speed pluggable cable assemblies from 64kbps ISDN B channels to 800 gigabit connections, and describes how they work. We discuss the Siemon Company’s history and its... Read more …
  continue reading
 
In today’s episode, we address listener Kieren’s question about the differences between LAG, MLAG, MC-LAG, and stacking. We tackle the nuances of Link Aggregation (LAG) and the Link Aggregation Control Protocol (LACP), and explain their roles in redundancy and bandwidth efficiency. We also discuss the complexities and differences among vendors and …
  continue reading
 
In this episode of ACM ByteCast, Rashmi Mohan hosts Alvin Wang Graylin, Global VP of Corporate Development at HTC. Alvin is also Chairman of the Virtual World Society, Vice-Chair of the Industry of VR Alliance, and President of the Virtual Reality Venture Capital Alliance. Alvin is a leader in the virtual and augmented reality industries. As a seri…
  continue reading
 
Are you ready to go from zero to hero in GitNops? On today’s podcast, we talk with Tom McGonagle, who shares and explains git, CI/CD and DevOps and how that all fits into network engineering. The conversation also covers the evolution of containerization and Kubernetes, highlighting their roles in modern network automation. Tom also encourages... R…
  continue reading
 
Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, parti…
  continue reading
 
Take a Network Break! We start with critical vulnerabilities affecting the Android OS, Cisco Meeting Management, and SonicWall, and then discuss a report that tens of thousands of Fortinet security appliances still haven’t been patched despite active exploits. Palo Alto Networks releases an open API to make it easier for developers to access Quantu…
  continue reading
 
Take a Network Break! We start with critical vulnerabilities affecting the Android OS, Cisco Meeting Management, and SonicWall, and then discuss a report that tens of thousands of Fortinet security appliances still haven’t been patched despite active exploits. Palo Alto Networks releases an open API to make it easier for developers to access Quantu…
  continue reading
 
Billy Joel had it right: It’s a matter of trust. Too often Operations, Engineering, and Architecture teams don’t trust one another–and nobody trusts leadership (and vice versa!). Special guest (and PacketPushers host) Scott Robohn joins us to talk about how to build trust, and the special role of an Operations Architect. Episode Guest: Scott Robohn…
  continue reading
 
NETGEAR is known for consumer networking products, but it also offers a robust porfolio of wireless and wired networking products designed for the enterprise. On today’s Heavy Wireless, sponsored by NETGEAR, we take a close look at the hardware, software, and services that NETGEAR offers to enterprise customers. That includes Wi-Fi 7 APs, a full...…
  continue reading
 
CNAPP, or Cloud Native Application Protection Platform, is an integrated suite of tools for cloud-native apps that aims to help organizations manage cloud app risks and identify and respond to threats. Today on the Tech Bytes podcast we talk with sponsor Fortinet about its Lacework FortiCNAPP offering and how it integrates CNAPP for unified securit…
  continue reading
 
Many of us have had network design discussions relating to natural disasters. What if a fire comes through? Or a flood? For most of us, those discussions don’t feel overly worthy of our attention. Yes, we should think about it. Yes, we should plan for it. If we’re really serious, we’ll even dust off the... Read more »…
  continue reading
 
Can we map DevOps principles and practices to network operations? Should we? On today’s show, we talk with Williams Collins and Eyvonne Sharp to understand DevOps both culturally and practically. We also discuss the challenges of applying DevOps to network operations. We look at lightweight options such as starting small, having a centralized sourc…
  continue reading
 
IPv6 adoption should cross 50% in 2025. In today’s podcast, we discuss the implications and significance of IPv6 adoption reaching this milestone. While this transition might not be visible to average users, it does impact IT professionals. We explore varying adoption rates across industries, and talk about compliance requirements will soon necessi…
  continue reading
 
It’s history day on N Is For Networking! We learn about the development of IPv6 directly from Bob Hinden, one of the pioneers who made it happen. Bob discusses his journey from early work on ARPANET to his significant contributions to IPv6. We also cover the transition from IPv4, the challenges faced during IPv6’s creation,... Read more »…
  continue reading
 
Today’s Network Automation Nerds episode discusses Cox Communications’ journey to getting network automation right. We also talk about how they used network automation to support operating the network at the DEF CON hacker convention. Our guests are David Ezell, Joshua Watkins and Eric Hansen from Cox Communications. We dive into initial steps and …
  continue reading
 
It’s tempting to run IT organizations the same way we run infrastructure: as resource units to be applied to various jobs. But people aren’t infrastructure. They have opinions. They form teams. They operate on different incentives, which sometimes clash within an organization (i.e. sales vs. product managers, or infosec vs. everybody). Today’s gues…
  continue reading
 
You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of v6 knowledge. We talk about... Read more »…
  continue reading
 
Take a Network Break! Guest co-host John Burke joins Drew Conry-Murray for this week’s analysis of tech news. They discuss a string of serious vulnerabilities in Wavlink Wi-Fi routers, Fortinet taking a one-two security punch, and CISA director Jen Easterly calling out US hardware and software companies for being “inherently insecure.” Microsoft an…
  continue reading
 
Take a Network Break! Guest co-host John Burke joins Drew Conry-Murray for this week’s analysis of tech news. They discuss a string of serious vulnerabilities in Wavlink Wi-Fi routers, Fortinet taking a one-two security punch, and CISA director Jen Easterly calling out US hardware and software companies for being “inherently insecure.” Microsoft an…
  continue reading
 
Traditional SD-WAN ensures that business-critical apps get the best-performing network path to deliver a good user experience and meet service levels. But as SaaS and cloud adoption increase, the best path across a WAN may not be enough. Techniques like WAN ops and legacy caching techniques may have worked for enterprise or private apps, but... Rea…
  continue reading
 
Do you think you have what it takes to be a manager? Should you go for it? Laura Santamaria, host of the Technically Leadership podcast, joins Ethan Banks to discuss those questions. They talk about the motivations for moving into a management role, the challenges of managing people, and the need to understand the business... Read more »…
  continue reading
 
On today’s episode, we’re explaining high-speed Ethernet lanes at the request of listener Matthew. We cover lanes, channels, and their physical representation in networking – think actual cables. We explain both 40Gb and 100Gb technologies and compare them to Link Aggregation Control Protocol (LACP). We also have a discussion on standards and pract…
  continue reading
 
How do you master Python? One bite at a time. On today’s show we talk with Bob Belderbos, co-founder of PyBites, a community and learning platform for Python. Bob shares his philosophy for learning Python in small bites with practical exercises, hands-on learning, and daily coding for improvement. We discuss the importance of small wins,... Read mo…
  continue reading
 
It’s better to plan for your IT strategy than not. But sometimes circumstances arise such that the plan, no matter how well conceived, just doesn’t work any more. On today’s Heavy Strategy, we explore how and why you should change a plan in the context of IT and business objectives. Sometimes this means small changes... Read more »…
  continue reading
 
Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our gues…
  continue reading
 
In this episode of ACM ByteCast, Bruke Kifle hosts ACM Fellow and ACM Distinguished Service Award recipient Jennifer Chayes, Dean of the College of Computing, Data Science, and Society at UC Berkeley. Before joining Berkeley, she co-founded the Theory Group at Microsoft Research Redmond and later founded and led three interdisciplinary labs: Micros…
  continue reading
 
Take a Network Break! We start with serious CVEs for Perl and Ivanti. On the news front, the FCC wants to license spectrum to raise money to help US telcos rip out Chinese network equipment–even though there’s no evidence Chinese equipment led to telco intrusions by Chinese attackers. Verizon boasts of 5.5Gbps download speeds on... Read more »…
  continue reading
 
Take a Network Break! We start with serious CVEs for Perl and Ivanti. On the news front, the FCC wants to license spectrum to raise money to help US telcos rip out Chinese network equipment–even though there’s no evidence Chinese equipment led to telco intrusions by Chinese attackers. Verizon boasts of 5.5Gbps download speeds on... Read more »…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play