show episodes
 
Artwork

1
TechSNAP

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
  continue reading
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Greg Ferro, Ethan Banks and Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. O ...
  continue reading
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Greg Ferro, Ethan Banks and Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. O ...
  continue reading
 
Discussing and sharing ideas, solutions, and strategies for building and maintaining an IT infrastructure. We will also share stories from the trenches, products and tools, virtualization, Microsoft 365, and more. Please check us out every week for new episodes.
  continue reading
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
  continue reading
 
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every week we get together, talk about recent tech news, and answer some of your admin-related questions.
  continue reading
 
Artwork

1
SysAdmin Show

Dustin Reybrouck: IT System Administrator

Unsubscribe
Unsubscribe
Monthly
 
A podcast focused on the Information Technology workplace. We discuss career opportunities, education/training and the technologies used today.
  continue reading
 
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
  continue reading
 
Artwork

1
IPv6 Buzz

Packet Pushers

Unsubscribe
Unsubscribe
Monthly+
 
IPv6 Buzz is for network engineers and infrastructure pros adopting IPv6 or who want to learn more about the protocol. Hosts Ed Horley, Tom Coffeen, and Scott Hogg demystify IPv6’s intricacies and deliver practical insights in a conversational style that explain the how and why of implementation. They’ve literally written the books about IPv6 and routinely consult on public, private, and federal deployments. IPv6 Buzz is an essential podcast for building your knowledge, confidence, and exper ...
  continue reading
 
Artwork

1
resolv.pod

Men & Mice

Unsubscribe
Unsubscribe
Monthly
 
News, how-tos, and roundtable discussions weekly about everything DNS (and DHCP and IPAM). You have DNS questions and problems; we have answers and solutions.
  continue reading
 
Loading …
show series
 
Medical devices are an essential element of patient care. They’re also network-connected devices that need resilient connectivity and security. On today’s Tech Bytes we examine the challenges of supporting and securing connected medical devices, including threats, vulnerabilities, and regulatory frameworks. We’ll also discuss strategies and best pr…
  continue reading
 
This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network te…
  continue reading
 
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and.…
  continue reading
 
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and.…
  continue reading
 
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and.…
  continue reading
 
Roku stops its users watching TV until they accept a new ToS, the line between journalism and computer fraud and abuse, and when using jumbo frames on a network makes sense. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News Roku disables players and TVs with attempt to coerce arbitration agreement Over 15,000…
  continue reading
 
Roku stops its users watching TV until they accept a new ToS, the line between journalism and computer fraud and abuse, and when using jumbo frames on a network makes sense. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News Roku disables players and TVs with attempt to coerce arbitration agreement Over 15,000…
  continue reading
 
CI/CD is not a villain. GitOps is not some kind of Kubernetes way of sneaking around it. In fact, GitOps falls under the CI/CD umbrella. Marcus Noble joins the show today to talk about how he uses a Kubernetes-native, open-source CI/CD framework called Tekton to test Kubernetes cluster creation, configuration, and deletion based on changes... Read …
  continue reading
 
What if you could eliminate the burdens of networking without losing your control and visibility of the network? That’s the idea behind Nile. With Nile co-managing the network, you don’t have to spend all your time chasing down tickets, running patches, and dealing with CLI syntax. Instead you get to focus on higher level tasks... Read more »…
  continue reading
 
According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security perimeter. That’s why the priority of any IT team should be to identify anomalies and anticipate attack logic. To do this, organizations need to... Read mor…
  continue reading
 
SecOps, NetOps, and help desks need integrated data, increased context, and the ability to quickly understand interdependencies in order to take on the complex tasks facing them. That’s why ThousandEyes is now integrated with Cisco Secure Access, Cisco’s SSE solution. Tune in to learn about ThousandEyes’ deeper visibility, system process metrics, s…
  continue reading
 
This week we discuss a new network observability offering from Arista that integrates network telemetry with application data, why startups such as Groq and Taalas think they can break Nvidia’s grip on the AI chip market, and how Microsoft is hedging its LLM bets. Amazon goes nuclear with the purchase of a reactor-powered data center... Read more »…
  continue reading
 
Today we metaphorically pop open the hood of switches and routers, taking a look at the mechanics of how they work. We cover the three states: configuration, operational, and forwarding. We talk RIB and FIB, along with CAM, TCAM, and MPLS. We also cover line rate, port-to-port latency, and buffers. Whether it’s been awhile since... Read more »…
  continue reading
 
Today we metaphorically pop open the hood of switches and routers, taking a look at the mechanics of how they work. We cover the three states: configuration, operational, and forwarding. We talk RIB and FIB, along with CAM, TCAM, and MPLS. We also cover line rate, port-to-port latency, and buffers. Whether it’s been awhile since... Read more »…
  continue reading
 
Today we metaphorically pop open the hood of switches and routers, taking a look at the mechanics of how they work. We cover the three states: configuration, operational, and forwarding. We talk RIB and FIB, along with CAM, TCAM, and MPLS. We also cover line rate, port-to-port latency, and buffers. Whether it’s been awhile since... Read more »…
  continue reading
 
The boss of Nvidia says kids don’t need to code because they can just use AI, companies sell their users’ data to train models, and why 2.5Gbps networking probably isn’t worth bothering with. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Jensen Huang says kids shouldn’t learn to code — they sho…
  continue reading
 
The boss of Nvidia says kids don’t need to code because they can just use AI, companies sell their users’ data to train models, and why 2.5Gbps networking probably isn’t worth bothering with. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Jensen Huang says kids shouldn’t learn to code — they sho…
  continue reading
 
If you’ve been wondering about the double colons and letters you’re seeing in IPv6 addresses, this is the episode for you. Tom and Scott break down IPv6 addressing, starting with the basics of binary and taking you all the way through the etiquette of not using capital letters in Layer 3 addressing (we’re looking at... Read more »…
  continue reading
 
If you’ve been wondering about the double colons and letters you’re seeing in IPv6 addresses, this is the episode for you. Tom and Scott break down IPv6 addressing, starting with the basics of binary and taking you all the way through the etiquette of not using capital letters in Layer 3 addressing (we’re looking at... Read more »…
  continue reading
 
Big risk, big reward: That’s the origin story of both containerlab and its maintainer, Roman Dodin. Roman tells Eric the story behind containerlab, a free software platform for building network labs and testing designs, as well as his own story of taking leaps into the unknown. This is the first episode of Network Automation Nerds... Read more »…
  continue reading
 
Today we welcome a new co-host, Kyler Middleton, to the Day Two Cloud podcast. Kyler grew up in rural Western Nebraska, fixing neighboring farmers’ computers in exchange for brownies and Rice Krispies. Now she’s the newest co-host for Day Two Cloud… perhaps a lateral move, given the lack of baked goods. Kyler will draw on... Read more »…
  continue reading
 
Exactly who should be on your technology strategy team? From inside your organization, who should represent the areas that come into play: Business, development, operations, etc? And what about outsiders–what kind of external consultant do you want for your strategy team? Do you even need one? Johna and Greg cover it all in today’s episode.... Read…
  continue reading
 
Thinking about a career in Sales Engineering (SE)? In this episode, you’ll hear straight from an experienced SE, Stewart Goumans. Stewart talks about what kind of background you need to be an SE, what the day-to-day looks like, and what it’s like to see a customer’s eyes light up when they realize you have a... Read more »…
  continue reading
 
When you’re picking a penetration tester to poke at your security infrastructure, how do you know if you’re picking a good one? Is pen testing even the right service for your needs? Pen tester, SANS course creator, and OWASP board member Kevin Johnson joins the show to share tips for what to look for in... Read more »…
  continue reading
 
Take a Network Break! Johna Till Johnson joins as guest host while Greg Ferro enjoys some time off. We start with follow-up regarding damage to subsea cables in the Red Sea, and then dive into news. AT&T deals with the fallout of a major US outage, Vodafone also suffers outages in the UK, and Elisa... Read more »…
  continue reading
 
Right now, we have the building blocks for network automation, but we don’t have end-to-end designs or complete systems. It’s like having a bunch of Legos but no instructions for how to build your spaceship. Ryan Shaw, David Sinn, and their colleagues in the Network Automation Forum are tackling this problem. Their goal is to... Read more »…
  continue reading
 
Right now, we have the building blocks for network automation, but we don’t have end-to-end designs or complete systems. It’s like having a bunch of Legos but no instructions for how to build your spaceship. Ryan Shaw, David Sinn, and their colleagues in the Network Automation Forum are tackling this problem. Their goal is to... Read more »…
  continue reading
 
Right now, we have the building blocks for network automation, but we don’t have end-to-end designs or complete systems. It’s like having a bunch of Legos but no instructions for how to build your spaceship. Ryan Shaw, David Sinn, and their colleagues in the Network Automation Forum are tackling this problem. Their goal is to... Read more »…
  continue reading
 
Kubernetes is designed to be highly scalable and highly dynamic… a perfect habitat for cryptominers to terminal shell into and then exploit your workload’s resources to the max. And that’s just one example of security threats Kubernetes users need to prepare against. Nigel Douglas from Sysdig joins Michael Levan and Kristina Devochko to give you...…
  continue reading
 
More cameras leak footage, Avast is fined for selling user data, a vending machine quietly scans students’ faces, using a small NVMe drive with ZFS, and taking snapshots of VMs. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News “So violated”: Wyze cameras leak footage to strangers for 2nd time in 5 months Ava…
  continue reading
 
More cameras leak footage, Avast is fined for selling user data, a vending machine quietly scans students’ faces, using a small NVMe drive with ZFS, and taking snapshots of VMs. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News “So violated”: Wyze cameras leak footage to strangers for 2nd time in 5 months Ava…
  continue reading
 
What are the best cybersecurity certs to get? Do advancements in cloud and AI mean security professionals need to re-skill? How do certifying organizations decide what new courses to create? Chief Curriculum Director and Faculty Lead at the SANS Institute, Rob Lee, joins Jennifer “JJ” Minella and Drew Conry-Murray to give an insider’s view on... Re…
  continue reading
 
Take a Network Break! This week we cover financial results from Palo Alto Networks (good, but next quarter’s softer forecast resulted in a drubbing), Cisco (not good), and Nvidia (so good that Wall Street is nervous about how long the party’s gonna last). Prosimo and Nokia have announced generative AI assistants that claim to help... Read more »…
  continue reading
 
One dark day, Ivan Pepelnjak stopped labbing. He just couldn’t make himself yet again go through assigning addresses, building links, putting devices in place, setting up OSPF, BGP, VXLAN, EVPN, etc. before even being able to start whatever simulation or test he wanted to do. But from that darkness arose netlab. Ivan created netlab to... Read more …
  continue reading
 
One dark day, Ivan Pepelnjak stopped labbing. He just couldn’t make himself yet again go through assigning addresses, building links, putting devices in place, setting up OSPF, BGP, VXLAN, EVPN, etc. before even being able to start whatever simulation or test he wanted to do. But from that darkness arose netlab. Ivan created netlab to... Read more …
  continue reading
 
One dark day, Ivan Pepelnjak stopped labbing. He just couldn’t make himself yet again go through assigning addresses, building links, putting devices in place, setting up OSPF, BGP, VXLAN, EVPN, etc. before even being able to start whatever simulation or test he wanted to do. But from that darkness arose netlab. Ivan created netlab to... Read more …
  continue reading
 
It’s rare for strategists, executives, and technologists to all get on the same page in order to create, execute, and adjust an organization’s tech strategy, much less do it well. But it is possible. Johna and Greg discuss their experiences of seeing through some consultants’ smoke and mirrors, honestly evaluating an organization’s capability to im…
  continue reading
 
Why it’s not a great idea to install Windows 11 on unsupported hardware, quantum computing hype has been replaced by AI, toothbrushes can’t be part of a botnet, Google has killed cached search results, and testing your backups. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Windows 11 24H2 goes…
  continue reading
 
Why it’s not a great idea to install Windows 11 on unsupported hardware, quantum computing hype has been replaced by AI, toothbrushes can’t be part of a botnet, Google has killed cached search results, and testing your backups. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Windows 11 24H2 goes…
  continue reading
 
Are you on the IPv6 hit list? Does your CPE device have Recommended Simple Security Capabilities? Are your ULA prefixes unique, but still manageable? Do you have a protection method structure or are you just hoping that the IPv6 space is so vast the bad guys will never find you? Tom Coffeen and Scott Hogg... Read more »…
  continue reading
 
Are you on the IPv6 hit list? Does your CPE device have Recommended Simple Security Capabilities? Are your ULA prefixes unique, but still manageable? Do you have a protection method structure or are you just hoping that the IPv6 space is so vast the bad guys will never find you? Tom Coffeen and Scott Hogg... Read more »…
  continue reading
 
Broadcom’s acquisition of VMware has generated a lot of anxiety among VMware customers. In this episode, we closely analyze the situation. First, we look at Broadcom’s past acquisitions in the infrastructure sector. Then we examine the product alignment and possible new product offerings and whether the acquisition will hamper innovation and develo…
  continue reading
 
Wi-Fi increases the GDP of entire countries, yet its tech community still has a grassroots feel. The COVID-19 work-from-home trend grew residential Wi-Fi like never before, yet it is still competing with 5G inside homes. Guest Claus Hetting, CEO of Wi-Fi NOW, joins host Keith Parsons to talk about the paradoxes, successes, and challenges in... Read…
  continue reading
 
Today we look at secrets management and privileged access management from the perspective of a network engineer. How do you and your team securely store sensitive data including passwords, SSH keys, API keys, and private certificate keys, while still being able to work nimbly? What Privileged Access Management (PAM) practices can help put guardrail…
  continue reading
 
The days of network cowboy heroism are over… or at least they need to be. It’s time for network engineering to grow up and standardize how networks are built. Not only will this make life easier for all of us as we inherit networks when we move from company to company, but it’s the only... Read more »…
  continue reading
 
The days of network cowboy heroism are over… or at least they need to be. It’s time for network engineering to grow up and standardize how networks are built. Not only will this make life easier for all of us as we inherit networks when we move from company to company, but it’s the only... Read more »…
  continue reading
 
The days of network cowboy heroism are over… or at least they need to be. It’s time for network engineering to grow up and standardize how networks are built. Not only will this make life easier for all of us as we inherit networks when we move from company to company, but it’s the only... Read more »…
  continue reading
 
Nginx is forked, Broadcom/VMware kills ESXi, dedup is finally fixed in ZFS, using multiple network interfaces on a NAS, and more. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes News announcing freenginx.org Broadcom-owned VMware kills the free version of ESXi virtualization software OpenZFS Native Encryption U…
  continue reading
 
Nginx is forked, Broadcom/VMware kills ESXi, dedup is finally fixed in ZFS, using multiple network interfaces on a NAS, and more. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes News announcing freenginx.org Broadcom-owned VMware kills the free version of ESXi virtualization software OpenZFS Native Encryption U…
  continue reading
 
Loading …

Quick Reference Guide