show episodes
 
Hey guys, welcome to NetworkChuck!! I love IT, Networks, VoIP, Security, Python..........IT's AWESOME!!! But my passion is helping people get started on this incredible career path. I make videos that help you get started in IT and keep you motivated along the way as you pursue GREATNESS. *****Want to help me create more videos? Hit me up on Patreon: https://patreon.com/networkchuck
  continue reading
 
Artwork

1
Network Break

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
Artwork

1
ACM ByteCast

Association for Computing Machinery (ACM)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
ACM ByteCast is a podcast series from ACM’s Practitioners Board in which hosts Rashmi Mohan, Bruke Kifle, Scott Hanselman, Sabrina Hsueh, and Harald Störrle interview researchers, practitioners, and innovators who are at the intersection of computing research and practice. In each episode, guests will share their experiences, the lessons they’ve learned, and their own visions for the future of computing.
  continue reading
 
Have you ever been curious on how a computer science/software engineering major might be like? As a student of the Costa Rica Institute of Technology, I'll hand you my reviews, tips, and experiences regarding the courses any aspiring computer scientist or software engineer must take in order to graduate. ITCR's curriculum is mainly influenced by the ACM guidelines. Contact: [email protected] https://www.facebook.com/CSSECCR/
  continue reading
 
Artwork

1
Theory and Practice

GV (Google Ventures)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Season 4 will explore one of humanity's most rapidly advancing and impactful changes: what does it mean to be human in the age of AI when computers and robots are accomplishing more human functions? How will AI with human-level skills influence us and enhance the world around us? How will we change AI, and how will it change us? Theory and Practice opens the doors to the cutting edge of biology and computer science through conversations with leaders in the field. The podcast is hosted by Ant ...
  continue reading
 
An exciting new podcast from the National Centre for Computing Education in England. Each month, you get to hear from a range of experts, teachers, and educators from other settings as they discuss with us key issues, approaches, and challenges related to teaching computing in the classroom.
  continue reading
 
Artwork

1
Codexpanse Podcast

Rakhim Davletkaliyev

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Universe is computable. Information is its fundamental property, along with space and time. Computer science is a young field, but we didn't invent computing, we've discovered it. Codexpanse explores the computing nature of reality, ideas of programming and math, and our role in this exciting world.
  continue reading
 
Loading …
show series
 
Will it be possible to have fully autonomous networks in the near future? Anil Varanasi, CEO and Co-Founder of Meter, joins Scott Robohn in this sponsored episode to discuss the ongoing evolution from automated to autonomous networks. Anil breaks down how Meter differentiates from other networking vendors, discusses how Meter’s network products are…
  continue reading
 
In Part 1 of Redundancy vs. High Availability, we said that sometimes high availability and redundancy are considered to be the same thing, but we disagree. Holly and Ethan do agree that high availability can be considered a network design goal, and that redundancy is just one technique that can be used to help make... Read more »…
  continue reading
 
The newly published RFC 9898 is the discussion of today’s podcast. The IPv6 Buzz crew explore the complexities of neighbor discovery and review solutions for both operators and architects. They share how this RFC serves as a single, detailed resource to improve your understanding of neighbor discovery and to reduce the potential attack surface in..…
  continue reading
 
Ned and Kyler sit down with Deana Solis, a freelance FinOps engineer and mentor. They discuss the undervalued skills of communication, look at the inherent biases and misplaced confidence of AI models, and offer guidance for those starting their careers. Deana also talks about her journey to discover the intersection of technology, career, and find…
  continue reading
 
In this sponsored episode recorded live at AutoCon 4 in Austin, we sit down with Peter Sprygada, Chief Architect at Itential, to discuss Itential’s on-stage announcement of FlowAI. Peter shares his journey from network engineering skeptic to AI advocate, explaining how Itential securely connects AI agents to infrastructure with enterprise-grade gov…
  continue reading
 
Ben Toner once again joins Keith Parsons to explain the new WLAN-Pi App. Originally built to control the WLAN-Pi Go, the app now works with all WLAN-Pi models and consolidates controls previously spread across the web UI and APIs. They then dive deeper into the method of connectivity for the app and the functionalities it... Read more »…
  continue reading
 
In this episode of ACM ByteCast, Bruke Kifle hosts Russ Cox, Distinguished Engineer at Google. Previously, he was the Go language technical lead at Google, where he led the development of Go for more than a decade, with a particular focus on improving the security and reliability of using software dependencies. With Jeff Dean, he created Google Cod…
  continue reading
 
There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS problems and vendor fails, these issues can make your WLAN less secure. Jennifer “JJ” Minella goes from Packet Protector co-host to guest as she discusses these issues with Drew Conry-Murray. This episode.…
  continue reading
 
Anand Oswal, Executive Vice President at Palo Alto Networks, joins Johna Johnson and John Burke for a wide-ranging exploration of two emerging focal points of enterprise risk: cryptographically relevant quantum computing, and browser-mediated agentic AI. The looming arrival of quantum computers that can break legacy encryption has already created t…
  continue reading
 
Take a Network Break! We start with listener follow-up on Fortinet’s vulnerability numbering, and sound a red alert about an authentication bypass vulnerability in ASUS’s AiCloud service. AWS and Google announce a joint cross-cloud interconnect offering (other cloud providers are invited to play), Microsoft and Ciena pitch a new design to boost opt…
  continue reading
 
Take a Network Break! We start with listener follow-up on Fortinet’s vulnerability numbering, and sound a red alert about an authentication bypass vulnerability in ASUS’s AiCloud service. AWS and Google announce a joint cross-cloud interconnect offering (other cloud providers are invited to play), Microsoft and Ciena pitch a new design to boost opt…
  continue reading
 
Itential has announced FlowAI, a new offering that brings agentic AI to Itential’s network automation platform. On today’s Tech Bytes podcast Ethan Banks talks with Peter Sprygada, Chief Architect at Itential, about how FlowAI works, its components, and how Itential uses the Model Context Protocol (MCP). They also dig into how FlowAI supports AI-dr…
  continue reading
 
The world of networking is changing at lightning speed thanks to AI. Today Eric sits down with Chris Kane to explore this new reality for network engineers. Together, they dive deeper into some of the changes that will be coming next, breaking down the technical demands and mindset shifts of intellectual curiosity and humility necessary... Read mor…
  continue reading
 
Recorded live at AutoCon4, William Collins and Eyvonne Sharp join forces with John Capobianco for some in the moment thoughts and reflections on the AutoCon experience – from the in-person connections to the workshops to the stage presentations. John gives us the inside story on his very own workshop and the latest version releases in... Read more …
  continue reading
 
Are you ready to get Security+ certified? Watch our free training course: In this month's Security+ Study Group, you'll learn about: States of data Large-scale rights and permissions Finding known and unknown vulnerabilities Working with EAP Preventing spam with DNS And more! Keep the study process going! Watch additional Security+ Study Group vide…
  continue reading
 
Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers…
  continue reading
 
AI and other technologies are increasingly capable of delivering company-ending events. How do you have “the conversation” with senior leadership–the one about the existential risks your organization faces, and the steps needed for remediation–in a way that ensures that your company is maximally protected, and that you get the resources you need? A…
  continue reading
 
Take a Network Break! We start with a relative path traversal vulnerability in Fortinet’s FortiWeb. We’ll move on to an acquisition by Palo Alto Networks, another hiccup from our friends at Cloudflare, some AI announcements by Itential and Gluware, and finish with first quarter 2026 fiscal results from Palo Alto Networks. AdSpot Sponsor: Itential .…
  continue reading
 
Take a Network Break! We start with a relative path traversal vulnerability in Fortinet’s FortiWeb. We’ll move on to an acquisition by Palo Alto Networks, another hiccup from our friends at Cloudflare, some AI announcements by Itential and Gluware, and finish with first quarter 2026 fiscal results from Palo Alto Networks. AdSpot Sponsor: Itential .…
  continue reading
 
A lot of network monitoring tools allow you to say, “It’s not the network,” but a more useful tool would not only tell you that it’s not the network, but also what the problem actually is. Today our guest is Brandon Hale, CTO at IBM SevOne. He is here to give us an overview of... Read more »By Packet Pushers
  continue reading
 
Are you ready to get Network+ certified? Watch our free N10-009 training course. In this month's Network+ Study Group, you'll learn about: Choosing the best device commands IPv6 addressing Understanding the CIA Triad Wireless roaming configurations Fiber interface density Keep the study process going! Watch additional Network+ Study Group video rep…
  continue reading
 
Today Scott interviews Andy Lapteff. He opens up about his non-linear career path, starting from a working class background and his physical jobs in telecom to becoming a senior product marketing manager and podcaster. Join us as Andy shares candid stories of how he developed his resilience and the heartwarming origin story for the Art... Read more…
  continue reading
 
Unit testing is a software development practice for checking that an individual component of code works before integrating that unit with other components in a larger program. A new open source project called Network Unit Testing System, or NUTS, brings the same concept to network automation. The big idea is that by incorporating unit tests into...…
  continue reading
 
What does it take for an entire country to adopt IPv6? Our guest today is Tenanoia (Noia) Simona, CEO of Tuvalu Telecommunications Corporation, the country’s sole telecommunications provider. She’s here to walk us through the difficulties of connecting the many islands of Tuvalu and their journey to achieving one of the world’s highest IPv6 adoptio…
  continue reading
 
In today’s chat, Holly and Ethan consider a question from listener Douglas who asks, “How do you approach designing a network for high availability and redundancy?” They start by defining differences between redundancy and high availability, and talk about Holly’s experience with her own customers. Then they share examples of how to achieve redunda…
  continue reading
 
Are you ready to get A+ certified? Watch our free training course: In this month's CompTIA A+ Core 2 Study Group, you'll learn about: Troubleshooting networks at the Windows command prompt Monitoring storage drives Interactive attack methods Dealing with low memory error messages And more Keep the study process going! Watch additional A+ Study Grou…
  continue reading
 
Are you ready to get A+ certified? Watch our free training course: In this month's CompTIA A+ Core 2 Study Group, you'll learn about: Troubleshooting networks at the Windows command prompt Monitoring storage drives Interactive attack methods Dealing with low memory error messages And more Keep the study process going! Watch additional A+ Study Grou…
  continue reading
 
Ever wonder what it takes to level up your career in data science? Senior Data Scientist Darya Petrashka joins Ned and Kyler to share her personal journey from management and linguistics into data science, the real difference between a junior and a senior role, and helps us get under the “data science umbrella” to see... Read more »…
  continue reading
 
With the help of Josh Hardy, Co-Founder and CTO of Orb, we introduce Orb. Orb is a suite app for OS, Android, macOS, Windows, Linux that is a new way to look at your internet connectivity. Josh gives us a little background on why and how Orb was created, He then goes into more detail... Read more »By Packet Pushers
  continue reading
 
Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... …
  continue reading
 
Environmental, Social, Governance (ESG) initiatives aren’t just “the right thing to do”, they can also save companies real dollars, particularly if they’re investing in data centers and other infrastructure. Join Jonathan Ciccio, Continuous Improvement Manager for The Siemon Company, as we discuss The Siemon Company’s ESG initiatives. The Siemon Co…
  continue reading
 
Are you ready to get A+ certified? Watch our free training course: In this month's A+ Core 1 Study Group, you'll learn about: Understanding the ipconfig command results Working with location services Private IP addressing Using an ADF Cloud computing characteristics And more Keep the study process going! Watch additional A+ Study Group video replay…
  continue reading
 
Are you ready to get A+ certified? Watch our free training course: In this month's A+ Core 1 Study Group, you'll learn about: Understanding the ipconfig command results Working with location services Private IP addressing Using an ADF Cloud computing characteristics And more Keep the study process going! Watch additional A+ Study Group video replay…
  continue reading
 
Take a Network Break! Red Hat Samba server has a remote command execution vulnerability, and we cover some follow-up on fusion as a viable energy source (still a work in progress). On the news front, we search for signs in SoftBank’s sale of its Nividia stake, Mplify debuts a new certificate on carrier Ethernet for... Read more »…
  continue reading
 
Take a Network Break! Red Hat Samba server has a remote command execution vulnerability, and we cover some follow-up on fusion as a viable energy source (still a work in progress). On the news front, we search for signs in SoftBank’s sale of its Nividia stake, Mplify debuts a new certificate on carrier Ethernet for... Read more »…
  continue reading
 
If you’re building, testing, or using AI agents and services, how can you get network visibility into, and ensure performance of, these tools? On today’s Tech Bytes podcast, we talk with sponsor Cisco ThousandEyes about how to monitor and measure performance of AI agents, AI models and services, and Model Context Protocol servers. We’ll get... Read…
  continue reading
 
NANOG, or the North American Network Operation Group, is an organization committed to the continuing advancement of an open, secure, and robust Internet. At the NANOG Conference 95 in late October 2025, Ethan Banks chatted with Steve Feldman, a member of NANOG’s Board of Directors. Steve has been involved with NANOG since the very first... Read mor…
  continue reading
 
Think you need a degree or a ton of certificates to succeed in tech? Think again. Matthew Oborne joins our hosts Alexis Bertholf and Kevin Nanns to discuss how he went from working fast food to leading operations at an ISP. Your starting point doesn’t define your ceiling; resilience, adaptability, and a willingness to learn... Read more »…
  continue reading
 
Today we delve into the tech expertise deficit and why technical depth and decades of doing the work matter more than social media followers and content creation hype. Our guest is Russ White, engineer, author, teacher, and certification developer. We begin with current events in AI, and then investigate the differences between career and influence…
  continue reading
 
Tomas Kirnak, CEO of Unimus, joins Eric Chou in this sponsored episode to introduce Unimus, an on-premise network configuration management system built by network engineers to solve real-world problems. In this deep dive they discuss Unimus’ proprietary “Behavioral Tree” for automatic device discovery, the platform’s vendor support, the 70/30 rule,…
  continue reading
 
The evolution of the modern, Internet-driven economy has created the conditions for essentially unbounded Nth-party risks (that is, risks from your suppliers, and risks from your suppliers’ suppliers, and risks from your suppliers’ suppliers’ suppliers, ad infinitum). Nth party risks exist in public clouds, SaaS, software and hardware supply chains…
  continue reading
 
Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
  continue reading
 
In this episode of ACM ByteCast, Rashmi Mohan hosts Anusha Nerella, a Senior Software Engineer at State Street. She has more than 13 years of experience working on building scalable systems using AI/ML in the domain of high-frequency trading systems and is passionate about driving adoption of automation in the FinTech industry. Anusha is a member o…
  continue reading
 
Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play