Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Greg Ferro, Ethan Banks and Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. O ...
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Greg Ferro, Ethan Banks and Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. O ...
…
continue reading
Everything published by the Packet Pushers network.
…
continue reading
Discussing and sharing ideas, solutions, and strategies for building and maintaining an IT infrastructure. We will also share stories from the trenches, products and tools, virtualization, Microsoft 365, and more. Please check us out every week for new episodes.
…
continue reading
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
…
continue reading
A Podcast about servers and Networking
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every week we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
A podcast focused on the Information Technology workplace. We discuss career opportunities, education/training and the technologies used today.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Exploring the intersection of digital infrastructure and the humans who depend on it. https://underlay.show
…
continue reading
IPv6 Buzz is for network engineers and infrastructure pros adopting IPv6 or who want to learn more about the protocol. Hosts Ed Horley, Tom Coffeen, and Scott Hogg demystify IPv6’s intricacies and deliver practical insights in a conversational style that explain the how and why of implementation. They’ve literally written the books about IPv6 and routinely consult on public, private, and federal deployments. IPv6 Buzz is an essential podcast for building your knowledge, confidence, and exper ...
…
continue reading
News, how-tos, and roundtable discussions weekly about everything DNS (and DHCP and IPAM). You have DNS questions and problems; we have answers and solutions.
…
continue reading
1
Tech Bytes: Protecting Connected Medical Devices With Palo Alto Networks IoT Security (Sponsored)
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57
Medical devices are an essential element of patient care. They’re also network-connected devices that need resilient connectivity and security. On today’s Tech Bytes we examine the challenges of supporting and securing connected medical devices, including threats, vulnerabilities, and regulatory frameworks. We’ll also discuss strategies and best pr…
…
continue reading
1
NB470: NetBox Labs Adds On-Prem Support; ASML Vs. The Netherlands
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39
This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network te…
…
continue reading
1
HN725: Standing up a DC Network Using Terraform
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and.…
…
continue reading
1
HN725: Standing up a DC Network Using Terraform
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and.…
…
continue reading
1
HN725: Standing up a DC Network Using Terraform
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and.…
…
continue reading
Roku stops its users watching TV until they accept a new ToS, the line between journalism and computer fraud and abuse, and when using jumbo frames on a network makes sense. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News Roku disables players and TVs with attempt to coerce arbitration agreement Over 15,000…
…
continue reading
Roku stops its users watching TV until they accept a new ToS, the line between journalism and computer fraud and abuse, and when using jumbo frames on a network makes sense. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News Roku disables players and TVs with attempt to coerce arbitration agreement Over 15,000…
…
continue reading
CI/CD is not a villain. GitOps is not some kind of Kubernetes way of sneaking around it. In fact, GitOps falls under the CI/CD umbrella. Marcus Noble joins the show today to talk about how he uses a Kubernetes-native, open-source CI/CD framework called Tekton to test Kubernetes cluster creation, configuration, and deletion based on changes... Read …
…
continue reading
1
NAN057: Nile Incorporates Network Automation from the Ground Up (Sponsored)
47:00
47:00
Play later
Play later
Lists
Like
Liked
47:00
What if you could eliminate the burdens of networking without losing your control and visibility of the network? That’s the idea behind Nile. With Nile co-managing the network, you don’t have to spend all your time chasing down tickets, running patches, and dealing with CLI syntax. Instead you get to focus on higher level tasks... Read more »…
…
continue reading
1
PP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23
According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security perimeter. That’s why the priority of any IT team should be to identify anomalies and anticipate attack logic. To do this, organizations need to... Read mor…
…
continue reading
1
Tech Bytes: Cisco ThousandEyes Deepens Visibility for Remote Workforce Management (Sponsored)
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35
SecOps, NetOps, and help desks need integrated data, increased context, and the ability to quickly understand interdependencies in order to take on the complex tasks facing them. That’s why ThousandEyes is now integrated with Cisco Secure Access, Cisco’s SSE solution. Tune in to learn about ThousandEyes’ deeper visibility, system process metrics, s…
…
continue reading
1
NB 469: Arista Debuts Network Observability Service; Startups Aim To Break Nvidia’s AI Chip Grip
1:03:51
1:03:51
Play later
Play later
Lists
Like
Liked
1:03:51
This week we discuss a new network observability offering from Arista that integrates network telemetry with application data, why startups such as Groq and Taalas think they can break Nvidia’s grip on the AI chip market, and how Microsoft is hedging its LLM bets. Amazon goes nuclear with the purchase of a reactor-powered data center... Read more »…
…
continue reading
1
HN724: How Packets Move Through a Network Device
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52
Today we metaphorically pop open the hood of switches and routers, taking a look at the mechanics of how they work. We cover the three states: configuration, operational, and forwarding. We talk RIB and FIB, along with CAM, TCAM, and MPLS. We also cover line rate, port-to-port latency, and buffers. Whether it’s been awhile since... Read more »…
…
continue reading
1
HN724: How Packets Move Through a Network Device
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52
Today we metaphorically pop open the hood of switches and routers, taking a look at the mechanics of how they work. We cover the three states: configuration, operational, and forwarding. We talk RIB and FIB, along with CAM, TCAM, and MPLS. We also cover line rate, port-to-port latency, and buffers. Whether it’s been awhile since... Read more »…
…
continue reading
1
HN724: How Packets Move Through a Network Device
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52
Today we metaphorically pop open the hood of switches and routers, taking a look at the mechanics of how they work. We cover the three states: configuration, operational, and forwarding. We talk RIB and FIB, along with CAM, TCAM, and MPLS. We also cover line rate, port-to-port latency, and buffers. Whether it’s been awhile since... Read more »…
…
continue reading
The boss of Nvidia says kids don’t need to code because they can just use AI, companies sell their users’ data to train models, and why 2.5Gbps networking probably isn’t worth bothering with. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Jensen Huang says kids shouldn’t learn to code — they sho…
…
continue reading
The boss of Nvidia says kids don’t need to code because they can just use AI, companies sell their users’ data to train models, and why 2.5Gbps networking probably isn’t worth bothering with. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Jensen Huang says kids shouldn’t learn to code — they sho…
…
continue reading
If you’ve been wondering about the double colons and letters you’re seeing in IPv6 addresses, this is the episode for you. Tom and Scott break down IPv6 addressing, starting with the basics of binary and taking you all the way through the etiquette of not using capital letters in Layer 3 addressing (we’re looking at... Read more »…
…
continue reading
If you’ve been wondering about the double colons and letters you’re seeing in IPv6 addresses, this is the episode for you. Tom and Scott break down IPv6 addressing, starting with the basics of binary and taking you all the way through the etiquette of not using capital letters in Layer 3 addressing (we’re looking at... Read more »…
…
continue reading
1
NAN056: The Story of containerlab with Roman Dodin (Part 1)
32:16
32:16
Play later
Play later
Lists
Like
Liked
32:16
Big risk, big reward: That’s the origin story of both containerlab and its maintainer, Roman Dodin. Roman tells Eric the story behind containerlab, a free software platform for building network labs and testing designs, as well as his own story of taking leaps into the unknown. This is the first episode of Network Automation Nerds... Read more »…
…
continue reading
1
D2C236: Introducing New Co-Host Kyler Middleton
33:20
33:20
Play later
Play later
Lists
Like
Liked
33:20
Today we welcome a new co-host, Kyler Middleton, to the Day Two Cloud podcast. Kyler grew up in rural Western Nebraska, fixing neighboring farmers’ computers in exchange for brownies and Rice Krispies. Now she’s the newest co-host for Day Two Cloud… perhaps a lateral move, given the lack of baked goods. Kyler will draw on... Read more »…
…
continue reading
1
HS067: The Right People to Have on Your Tech Strategy Team
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10
Exactly who should be on your technology strategy team? From inside your organization, who should represent the areas that come into play: Business, development, operations, etc? And what about outsiders–what kind of external consultant do you want for your strategy team? Do you even need one? Johna and Greg cover it all in today’s episode.... Read…
…
continue reading
1
HW022: So You Want to be a Sales Engineer
22:23
22:23
Play later
Play later
Lists
Like
Liked
22:23
Thinking about a career in Sales Engineering (SE)? In this episode, you’ll hear straight from an experienced SE, Stewart Goumans. Stewart talks about what kind of background you need to be an SE, what the day-to-day looks like, and what it’s like to see a customer’s eyes light up when they realize you have a... Read more »…
…
continue reading
1
PP004: Exploiting Vulnerabilities, Not Customers: How to Pick Good Pen Testers
49:29
49:29
Play later
Play later
Lists
Like
Liked
49:29
When you’re picking a penetration tester to poke at your security infrastructure, how do you know if you’re picking a good one? Is pen testing even the right service for your needs? Pen tester, SANS course creator, and OWASP board member Kevin Johnson joins the show to share tips for what to look for in... Read more »…
…
continue reading
1
NB 468: Broadcom Checks SASE Box; Spirent Announces AI Traffic Emulator For Ethernet Networks
19:41
19:41
Play later
Play later
Lists
Like
Liked
19:41
Take a Network Break! Johna Till Johnson joins as guest host while Greg Ferro enjoys some time off. We start with follow-up regarding damage to subsea cables in the Red Sea, and then dive into news. AT&T deals with the fallout of a major US outage, Vodafone also suffers outages in the UK, and Elisa... Read more »…
…
continue reading
1
HN723: ‘It’s like Legos’: Developing a Network Automation Framework
43:30
43:30
Play later
Play later
Lists
Like
Liked
43:30
Right now, we have the building blocks for network automation, but we don’t have end-to-end designs or complete systems. It’s like having a bunch of Legos but no instructions for how to build your spaceship. Ryan Shaw, David Sinn, and their colleagues in the Network Automation Forum are tackling this problem. Their goal is to... Read more »…
…
continue reading
1
HN723: ‘It’s like Legos’: Developing a Network Automation Framework
43:30
43:30
Play later
Play later
Lists
Like
Liked
43:30
Right now, we have the building blocks for network automation, but we don’t have end-to-end designs or complete systems. It’s like having a bunch of Legos but no instructions for how to build your spaceship. Ryan Shaw, David Sinn, and their colleagues in the Network Automation Forum are tackling this problem. Their goal is to... Read more »…
…
continue reading
1
HN723: ‘It’s like Legos’: Developing a Network Automation Framework
43:30
43:30
Play later
Play later
Lists
Like
Liked
43:30
Right now, we have the building blocks for network automation, but we don’t have end-to-end designs or complete systems. It’s like having a bunch of Legos but no instructions for how to build your spaceship. Ryan Shaw, David Sinn, and their colleagues in the Network Automation Forum are tackling this problem. Their goal is to... Read more »…
…
continue reading
1
KU049: Security Frameworks, Tools, and Strategies for Kubernetes
51:32
51:32
Play later
Play later
Lists
Like
Liked
51:32
Kubernetes is designed to be highly scalable and highly dynamic… a perfect habitat for cryptominers to terminal shell into and then exploit your workload’s resources to the max. And that’s just one example of security threats Kubernetes users need to prepare against. Nigel Douglas from Sysdig joins Michael Levan and Kristina Devochko to give you...…
…
continue reading
More cameras leak footage, Avast is fined for selling user data, a vending machine quietly scans students’ faces, using a small NVMe drive with ZFS, and taking snapshots of VMs. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News “So violated”: Wyze cameras leak footage to strangers for 2nd time in 5 months Ava…
…
continue reading
More cameras leak footage, Avast is fined for selling user data, a vending machine quietly scans students’ faces, using a small NVMe drive with ZFS, and taking snapshots of VMs. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News “So violated”: Wyze cameras leak footage to strangers for 2nd time in 5 months Ava…
…
continue reading
Chances are, you’ve probably only heard of GovCloud because at the bottom of new feature releases from the Big 3 there’s usually an asterisk that says “not yet available in GovCloud.” So what is GovCloud? And why does it not get the newest shiny thing as fast as the rest of us? Chris Wahl has... Read more »…
…
continue reading
1
PP003: An Insider’s Look At Security Certs
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17
What are the best cybersecurity certs to get? Do advancements in cloud and AI mean security professionals need to re-skill? How do certifying organizations decide what new courses to create? Chief Curriculum Director and Faculty Lead at the SANS Institute, Rob Lee, joins Jennifer “JJ” Minella and Drew Conry-Murray to give an insider’s view on... Re…
…
continue reading
1
NB467: More AI Assistants Emerge; Nvidia’s AI Goldmine Spurs New Competitors
45:13
45:13
Play later
Play later
Lists
Like
Liked
45:13
Take a Network Break! This week we cover financial results from Palo Alto Networks (good, but next quarter’s softer forecast resulted in a drubbing), Cisco (not good), and Nvidia (so good that Wall Street is nervous about how long the party’s gonna last). Prosimo and Nokia have announced generative AI assistants that claim to help... Read more »…
…
continue reading
1
HN722: Ivan Pepelnjak’s Netlab Eliminates the Tedious Bits of Labbing
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40
One dark day, Ivan Pepelnjak stopped labbing. He just couldn’t make himself yet again go through assigning addresses, building links, putting devices in place, setting up OSPF, BGP, VXLAN, EVPN, etc. before even being able to start whatever simulation or test he wanted to do. But from that darkness arose netlab. Ivan created netlab to... Read more …
…
continue reading
1
HN722: Ivan Pepelnjak’s Netlab Eliminates the Tedious Bits of Labbing
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40
One dark day, Ivan Pepelnjak stopped labbing. He just couldn’t make himself yet again go through assigning addresses, building links, putting devices in place, setting up OSPF, BGP, VXLAN, EVPN, etc. before even being able to start whatever simulation or test he wanted to do. But from that darkness arose netlab. Ivan created netlab to... Read more …
…
continue reading
1
HN722: Ivan Pepelnjak’s Netlab Eliminates the Tedious Bits of Labbing
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40
One dark day, Ivan Pepelnjak stopped labbing. He just couldn’t make himself yet again go through assigning addresses, building links, putting devices in place, setting up OSPF, BGP, VXLAN, EVPN, etc. before even being able to start whatever simulation or test he wanted to do. But from that darkness arose netlab. Ivan created netlab to... Read more …
…
continue reading
1
HS066: The Holy Grail: A Functioning Tech Strategy
25:54
25:54
Play later
Play later
Lists
Like
Liked
25:54
It’s rare for strategists, executives, and technologists to all get on the same page in order to create, execute, and adjust an organization’s tech strategy, much less do it well. But it is possible. Johna and Greg discuss their experiences of seeing through some consultants’ smoke and mirrors, honestly evaluating an organization’s capability to im…
…
continue reading
1
2.5 Admins 183: Unbootable Quantum Toothbrushes
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18
Why it’s not a great idea to install Windows 11 on unsupported hardware, quantum computing hype has been replaced by AI, toothbrushes can’t be part of a botnet, Google has killed cached search results, and testing your backups. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Windows 11 24H2 goes…
…
continue reading
1
2.5 Admins 183: Unbootable Quantum Toothbrushes
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18
Why it’s not a great idea to install Windows 11 on unsupported hardware, quantum computing hype has been replaced by AI, toothbrushes can’t be part of a botnet, Google has killed cached search results, and testing your backups. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Windows 11 24H2 goes…
…
continue reading
Are you on the IPv6 hit list? Does your CPE device have Recommended Simple Security Capabilities? Are your ULA prefixes unique, but still manageable? Do you have a protection method structure or are you just hoping that the IPv6 space is so vast the bad guys will never find you? Tom Coffeen and Scott Hogg... Read more »…
…
continue reading
Are you on the IPv6 hit list? Does your CPE device have Recommended Simple Security Capabilities? Are your ULA prefixes unique, but still manageable? Do you have a protection method structure or are you just hoping that the IPv6 space is so vast the bad guys will never find you? Tom Coffeen and Scott Hogg... Read more »…
…
continue reading
Broadcom’s acquisition of VMware has generated a lot of anxiety among VMware customers. In this episode, we closely analyze the situation. First, we look at Broadcom’s past acquisitions in the infrastructure sector. Then we examine the product alignment and possible new product offerings and whether the acquisition will hamper innovation and develo…
…
continue reading
1
HW021: The State of the Wi-Fi Industry with Claus Hetting
22:43
22:43
Play later
Play later
Lists
Like
Liked
22:43
Wi-Fi increases the GDP of entire countries, yet its tech community still has a grassroots feel. The COVID-19 work-from-home trend grew residential Wi-Fi like never before, yet it is still competing with 5G inside homes. Guest Claus Hetting, CEO of Wi-Fi NOW, joins host Keith Parsons to talk about the paradoxes, successes, and challenges in... Read…
…
continue reading
1
PP002: The Tricky Biz Of Secrets Management
36:58
36:58
Play later
Play later
Lists
Like
Liked
36:58
Today we look at secrets management and privileged access management from the perspective of a network engineer. How do you and your team securely store sensitive data including passwords, SSH keys, API keys, and private certificate keys, while still being able to work nimbly? What Privileged Access Management (PAM) practices can help put guardrail…
…
continue reading
1
HN721: Goodbye Network Cowboys, Hello Total Network Operations
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05
The days of network cowboy heroism are over… or at least they need to be. It’s time for network engineering to grow up and standardize how networks are built. Not only will this make life easier for all of us as we inherit networks when we move from company to company, but it’s the only... Read more »…
…
continue reading
1
HN721: Goodbye Network Cowboys, Hello Total Network Operations
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05
The days of network cowboy heroism are over… or at least they need to be. It’s time for network engineering to grow up and standardize how networks are built. Not only will this make life easier for all of us as we inherit networks when we move from company to company, but it’s the only... Read more »…
…
continue reading
1
HN721: Goodbye Network Cowboys, Hello Total Network Operations
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05
The days of network cowboy heroism are over… or at least they need to be. It’s time for network engineering to grow up and standardize how networks are built. Not only will this make life easier for all of us as we inherit networks when we move from company to company, but it’s the only... Read more »…
…
continue reading
Nginx is forked, Broadcom/VMware kills ESXi, dedup is finally fixed in ZFS, using multiple network interfaces on a NAS, and more. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes News announcing freenginx.org Broadcom-owned VMware kills the free version of ESXi virtualization software OpenZFS Native Encryption U…
…
continue reading
Nginx is forked, Broadcom/VMware kills ESXi, dedup is finally fixed in ZFS, using multiple network interfaces on a NAS, and more. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes News announcing freenginx.org Broadcom-owned VMware kills the free version of ESXi virtualization software OpenZFS Native Encryption U…
…
continue reading