show episodes
 
Artwork
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Greg Ferro and Drew Conry-Murray sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a (longis ...
  continue reading
 
Hey guys, welcome to NetworkChuck!! I love IT, Networks, VoIP, Security, Python..........IT's AWESOME!!! But my passion is helping people get started on this incredible career path. I make videos that help you get started in IT and keep you motivated along the way as you pursue GREATNESS. *****Want to help me create more videos? Hit me up on Patreon: https://patreon.com/networkchuck
  continue reading
 
Artwork

1
ACM ByteCast

Association for Computing Machinery (ACM)

Unsubscribe
Unsubscribe
Monthly
 
ACM ByteCast is a podcast series from ACM’s Practitioners Board in which hosts Rashmi Mohan and Jessica Bell interview researchers, practitioners, and innovators who are at the intersection of computing research and practice. In each episode, guests will share their experiences, the lessons they’ve learned, and their own visions for the future of computing.
  continue reading
 
Have you ever been curious on how a computer science/software engineering major might be like? As a student of the Costa Rica Institute of Technology, I'll hand you my reviews, tips, and experiences regarding the courses any aspiring computer scientist or software engineer must take in order to graduate. ITCR's curriculum is mainly influenced by the ACM guidelines. Contact: andresarriaga7@gmail.com https://www.facebook.com/CSSECCR/
  continue reading
 
Artwork

1
Theory and Practice

GV (Google Ventures)

Unsubscribe
Unsubscribe
Monthly
 
Season 4 will explore one of humanity's most rapidly advancing and impactful changes: what does it mean to be human in the age of AI when computers and robots are accomplishing more human functions? How will AI with human-level skills influence us and enhance the world around us? How will we change AI, and how will it change us? Theory and Practice opens the doors to the cutting edge of biology and computer science through conversations with leaders in the field. The podcast is hosted by Ant ...
  continue reading
 
An exciting new podcast from the National Centre for Computing Education in England. Each month, you get to hear from a range of experts, teachers, and educators from other settings as they discuss with us key issues, approaches, and challenges related to teaching computing in the classroom.
  continue reading
 
Artwork

1
Codexpanse Podcast

Rakhim Davletkaliyev

Unsubscribe
Unsubscribe
Monthly
 
The Universe is computable. Information is its fundamental property, along with space and time. Computer science is a young field, but we didn't invent computing, we've discovered it. Codexpanse explores the computing nature of reality, ideas of programming and math, and our role in this exciting world.
  continue reading
 
Loading …
show series
 
AI is everywhere. So are questions about AI’s value, how it really works, and how it will affect technology. Hannah Foxwell aims to demystify AI via a new conference, AI for the Rest of Us, taking place October 24-25, 2024 in London. Hannah hopes to create a collaborative learning environment. In today’s Day Two DevOps... Read more »…
  continue reading
 
Today on Packet Protector we look at cloud firewall architectures. If you’ve deployed firewalls in the campus or a data center, it’s useful to know that there are differences in the public cloud. We’ll dive into what you need to know, including deployment options, the role of high availability in public cloud, selecting the right... Read more »…
  continue reading
 
In today’s episode, guest Cheryl Connell joins host Keith Parsons to talk about the eduroam Visitor Access (eVA) system. Cheryl explains that eVA is a free add-on for institutions with an existing eduroam setup, allowing them to create temporary usernames and passwords for guests without needing a separate guest network. They discuss the challenges…
  continue reading
 
Take a Network Break! This week we discuss the theft of 440Gbytes of customer data from a Fortinet cloud repository, how to think about resiliency after an AT&T network update kills access to Azure apps, and new troubleshooting features in Juniper Apstra. HPE goes to the bond market to raise as much as $6.5 billion... Read more »…
  continue reading
 
Take a Network Break! This week we discuss the theft of 440Gbytes of customer data from a Fortinet cloud repository, how to think about resiliency after an AT&T network update kills access to Azure apps, and new troubleshooting features in Juniper Apstra. HPE goes to the bond market to raise as much as $6.5 billion... Read more »…
  continue reading
 
On today’s episode, we cover open source Clabernetes, a tool that allows you to run Containerlab on Kubernetes. Containerlab provides a CLI for orchestrating and managing container-based networking labs. It starts the containers, builds a virtual wiring between them to create lab topologies of your choice and manages the lab’s lifecycle. We discuss…
  continue reading
 
IT work requires ongoing training and skills development. Laura Santamaria and guest Scott Robohn discuss strategies for leveling up your team to ensure they have the skills they need. Laura and Scott talk about the need for continuous learning and explore options for encouraging skill development, even in budget-constrained environments. Good lead…
  continue reading
 
This episode was recorded with Greg Ferro, co-founder of Packet Pushers, just days before his retirement in July 2024. Greg and Eric reflect on Greg’s influential career in network engineering and the evolution of the industry. Greg discusses the challenges of maintaining open-source projects amid increasing commercialization and corporate exploita…
  continue reading
 
Today’s Packet Protector is an all-news episode. We cover the Volt Typhoon hacker group exploiting a zero-day in Versa Networks gear and a multitude of vulnerabilities in Zyxel network products. We also debate whether Microsoft’s endpoint security summit will be more than a public relations exercise, a serious backdoor in RFID cards used in offices…
  continue reading
 
The low-code/no-code movement means business users who aren’t programmers can create software. This capability might make these citizen coders more efficient and productive, but could also pose risks due to a lack of formal training in software development and security. Is citizen coding a boon or bane to business? Johna Johnson and John Burke disc…
  continue reading
 
Take a Network Break! This week we cover an AT&T lawsuit against Broadcom over changes to a support contract for VMware software, why Verizon is spending $20 billion to buy Frontier, and new critical security patches from Cisco. ASML, which makes the machines that make high-end computer chips, gets antsy over US restrictions to China.... Read more …
  continue reading
 
Take a Network Break! This week we cover an AT&T lawsuit against Broadcom over changes to a support contract for VMware software, why Verizon is spending $20 billion to buy Frontier, and new critical security patches from Cisco. ASML, which makes the machines that make high-end computer chips, gets antsy over US restrictions to China.... Read more …
  continue reading
 
On today’s episode of Heavy Networking, Rob Sherwood joins us to discuss the impact that High Performance Computing (HPC)and artificial intelligence computing are having on data center network design. It’s not just a story about leaf/spine architecture. That’s the boring part. There’s also power and cooling issues, massive bandwidth requirements, a…
  continue reading
 
Simplification is the theme of today’s episode. Host Scott Robohn and guest Jack Maxfield explore the operational impacts of simplification for a Managed Service Provider (MSP). They discuss the challenges of managing multi-vendor environments and how to use templating and tools to simplify the management process. Proactive client communication and…
  continue reading
 
Our series on IPv6 basics continues with Router Advertisements (RAs) within the Neighbor Discovery Protocol. We look at how hosts bootstrap onto a network using ICMPv6, discuss the timing of sending out an RA, and then cover the configuration of RAs, including key flags and options. We also talk about the importance of understanding the... Read mor…
  continue reading
 
Cloud security and responsible disclosure are the focus of today’s conversation with guest Kat Traxler. Kat shares her insights on identifying vulnerabilities in cloud services, particularly Google Cloud, and the importance of curiosity in her research. The episode explores the role of bug bounty programs and the shift towards issuing CVEs for clou…
  continue reading
 
In this episode of Heavy Wireless, host Keith Parsons and guest Tom Hollingsworth delve into the “experience paradox” in the tech industry: to get experience, you need to have experience. They highlight the disconnect between job requirements and candidates’ actual experience. Tom emphasizes the importance of hands-on learning, home labs, and makin…
  continue reading
 
Take a Network Break! This week we cover a couple of listener FUs, and then dive into the news. Attackers exploit a zero-day in Versa to harvest credentials, AT&T agrees to a fine of nearly $1 million for a network outage that affected 911 calls, and Intel and Broadcom tout integrated optics for more broadband... Read more »…
  continue reading
 
Take a Network Break! This week we cover a couple of listener FUs, and then dive into the news. Attackers exploit a zero-day in Versa to harvest credentials, AT&T agrees to a fine of nearly $1 million for a network outage that affected 911 calls, and Intel and Broadcom tout integrated optics for more broadband... Read more »…
  continue reading
 
Today on the Tech Bytes podcast: network observability. SuzieQ is an open-source project that collects, normalizes, stores, and analyzes multi-vendor network data. This data becomes a foundation for network observability and automation. We talk with Dinesh Dutt, creator of SuzieQ and founder of Stardust Systems, which makes a commercial version of …
  continue reading
 
On today’s Packet Protector we talk about how to talk about security objectives in ways that resonate with business and non-technical leaders in your organization. Tying security objectives to business outcomes can help you maintain (or increase) budgets, build trust and credibility with executives, and better align your risk management efforts wit…
  continue reading
 
Our Heavy Networking guest today is Hans Driessens, and we sat down at AutoCon1 to talk through some of his network automation projects. Hans shares his journey from a service engineer to a consultant specializing in network automation. We discuss the evolution of programming languages, the importance of foundational programming skills, and the pra…
  continue reading
 
On this episode of Technically Leadership, we talk about the philosophical underpinnings of leadership. We discuss what it means to hold and drive a vision for a technical organization, how to build a strong team culture, handling layoffs and letting people go, and exploring what philosophy can teach us about leadership. Guest Matt Butcher, CEO... …
  continue reading
 
On today’s episode we delve into Internet2’s mission to advance research and education through high-speed connectivity. University and research networks may have more complicated designs, requirements, and restrictions than you’d expect. We talk about these challenges, along with innovative network automation solutions. The discussion emphasizes th…
  continue reading
 
IT tends to divide itself by job function and technological specialization, especially as technology gets more complex. However, each IT domain is part of a larger system, and these systems require coordination and cooperation to operate effectively. On today’s Packet Protector we look at how and why Security Operations (SecOps) and Network Operati…
  continue reading
 
AI seems to be changing everything, including your IT infrastructure. Do you have a strategic plan for your AI infrastructure? Today we discuss the merits and challenges of cloud computing, on-premises solutions, hybrid models, and edge computing along with the importance of low latency for real-time AI applications and the potential of edge comput…
  continue reading
 
On today’s episode we delve into OSPF filtering. That is, how to filter routes from a device’s routing table in an OSPF environment. This is a tricky business, because OSPF requires an identical database on every device in an OSPF area. That means you can’t stop announcing a route from one OSPF router because you... Read more »…
  continue reading
 
Take a Network Break! A US appeals court will let a privacy lawsuit against Google go forward, striking telecom workers are a reminder to test your resiliency planning, and AMD spends nearly $5 billion to acquire systems engineering talent from ZT Systems. Juniper Networks offers deep discounts and other enticements to get network engineers to... R…
  continue reading
 
Take a Network Break! A US appeals court will let a privacy lawsuit against Google go forward, striking telecom workers are a reminder to test your resiliency planning, and AMD spends nearly $5 billion to acquire systems engineering talent from ZT Systems. Juniper Networks offers deep discounts and other enticements to get network engineers to... R…
  continue reading
 
Today on the Tech Bytes podcast we talk cloud storage. More specifically, we dive into why it’s time for NFS to sail off into the sunset, particularly for cloud datasets. Our guest is Tom Lyon, an industry legend who has delivered a talk entitled “NFS Must Die.” We talk with Tom about the strengths and weaknesses of NFS, the... Read more »…
  continue reading
 
Your team is just as important as your tech and tools in any environment, including NetOps. Garrett Nowak, Senior Director of Network Architecture at 11:11 Systems shares his journey from tier one help desk to a leadership role. He discusses the importance of teamwork, community, and effective leadership in network operations and how he works... Re…
  continue reading
 
The move from IPv4 to IPv6 is not straightforward. In a world where use cases for both protocols exist, there needs to be some sort of transition. Dual stack is one option but “IPv6 mostly” is another. On today’s show, guest Ondřej Caletka from RIPE NCC explores transitioning to an IPv6-centric network while retaining IPv4... Read more »…
  continue reading
 
Transport Layer Security (TLS) is today’s topic with guest Ed Harmoush. TLS plays a critical role in Internet security, and we dive into the differences between versions 1.2 and 1.3 In addition, Ed shares his journey into TLS, explains its components, and addresses common misconceptions about certificates and their validation processes. The episode…
  continue reading
 
On today’s Network Automation Nerds, we get into the infrastructure required to support AI workloads. We discuss key considerations including bandwidth, the substantial power and cooling requirements of AI infrastructure, and GPUs. We also talk about InfiniBand and Ethernet as network fabrics for AI workloads, cabling considerations, and more. This…
  continue reading
 
In this episode of the Heavy Wireless podcast, we talk with Howard Buzick from American Bandwidth about the evolution and current state of wireless connections, particularly in guest network environments. We explore advancements in Wi-Fi technologies, the workings of Passpoint (formerly Hotspot 2.0), and the differences between Passpoint and Open R…
  continue reading
 
Smartphones use Wi-Fi based Positioning Systems (WPSes) to collect data about nearby Wi-Fi access points and other wireless devices to help determine the phones’ geographic location. Researchers at the University of Maryland show how WPSes from Apple and Google can be used for mass surveillance of access points and, potentially, owners and users of…
  continue reading
 
Loading …

Quick Reference Guide