show episodes
 
Cloud Insiders podcasts, brought to you by Xtravirt explore the latest IT trends and share thought-provoking insights from the world of cloud and digital transformation. Enjoyed by business leaders and IT professionals alike, you can expect a straight-talking podcast packed with ideas to help you make better-informed decisions and future-proof your IT strategy. Xtravirt is an independent cloud consulting and managed services business. We believe in empowering enterprises to innovate and thri ...
 
Wanna know about Horror, Film, Video Games, Toys, and just all around Pop Culture? Then check out this Podcast called, Rydin' Nerdy. Special guest, celebrities, games, and give aways!!! Also go LIKE our Facebook page for all the updates info and Links to our videos. Grab a drink and kick back, its time to start Rydin Nerdy!!!
 
Loading …
show series
 
How do you know if your cybersecurity investments are being made in the right areas? Our collective rush to remote work has exposed additional surface ripe for security attacks. Spending may be also be on the rise but, hopefully, not at the expense of strategy. In this new TEC37 episode from World Wide Technology (WWT), Robb Boyd and WWT security e…
 
This podcast introduction was written by Nick Buraglio, the host of today’s podcast. In the original days of this podcast, there were heavy, deep discussions about this new protocol called “OpenFlow”. Like many of our most creative innovations in the IT field, OpenFlow came from an academic research project that aimed to change the way that we as o…
 
In this new TEC37 from World Wide Technology (WWT), host, Robb Boyd, and WWT’s Tanner Bechtel, Chris Weis and Neil Anderson discuss how WWT has developed a true AIOps reference architecture, and a strategy that leverages a multi-product and product agnostic approach to an AIOps Ecosystem. They will highlight pieces of the AIOps infrastructure inclu…
 
Could you benefit from Wi-Fi 6? How many Wi-Fi 6 clients are already in your environment? Join us for this first episode of WWT’s “No Bad Wi-Fi” series where featured guest, Cisco’s Jim Florwick demonstrates how you can see if it’s worth it, without buying new AP’s. Throughout this series, hosts Robb Boyd and Jennifer Huber give you the inside look…
 
Making security investments based on the current threat landscape is a no-win situation for today’s CISOs. With a never-ending sea of threats, CISOs need to take a different approach, one that manages risk based on business goals and objectives. In the new TEC37 episode from World Wide Technology (WWT), WWT experts Todd Neilson and Greg Schoney dis…
 
Many organizations are on the path to adopt SDN for their data center network. However, technical leaders tend to become split between the two market leaders in this space: Cisco ACI and VMware NSX. How does an organization choose between them, and could they work well with each other? In this new TEC37 episode from World Wide Technology (WWT), the…
 
In this episode of World Wide Technology’s (WWT) TEC37 series, WWT experts Todd Bolton and Dominic Greco, along with Andrew Braverman and Emmett Kaczmarek from Dell Technologies, discuss the key challenges that customers face today related to storage and data protection, considerations for choosing the right products and recommended approach in add…
 
In today’s ever-changing world, do you ever think about how your organization’s network must evolve with it? In this episode of World Wide Technology’s (WWT) TEC37 series, WWT Network specialists Bill Thompson and Neil Anderson will talk about the macro factors to consider when looking at the future of networking and what happens if we think differ…
 
Business and technology executives are challenged with aligning business goals, increased dependence on technology and the responsibility to secure the organizations most important assets. As any breach report can attest, this is a complicated task that requires a balance of understanding the business risks and goals, managing technology tied into …
 
Many organizations are hesitant to commit to a single vendor for their data center. However, when moving to a software-defined data center (SDDC) model, vendor lock-in may be the best strategy. On the latest episode of World Wide Technology’s (WWT) TEC37 series, WWT’s James Harless and Sean Hicks, along with Pat Dooley from Dell and Jason Lamb from…
 
Businesses moving forward with an AI strategy need to ensure the security of those AI models is part of that strategy. In this episode of World Wide Technology’s (WWT) TEC37 series, WWT experts Jamie Milne and Gene Geddes, along with Melvin Greer from Intel, will highlight issues in AI model security for the organization and suggest approaches for …
 
Actionable Insights for VMware and AWS - Every day software patches are released, new security risks are identified and vendor recommendations are updated with the expectation that business and IT stay on top of all these changes. But how do you ensure that you are identifying, managing and remediating to effectively control the risks in your on-pr…
 
Software-Defined Data Centers (SDDC) are designed to overcome the drawbacks of traditional IT infrastructure to offer the accelerated delivery of consistent data center services. Despite the performance gains, some organizations have been hesitant to adopt a SDDC environment. On this episode of World Wide Technology’s (WWT) TEC37 series, WWT expert…
 
The TEC37 AIOps three-part series concludes with a technical dive into the AIOps space. WWT experts Tanner Bechtel and Arsalan Lari, along with Ben Haddox from AppDynamics, discuss the partnerships and technical complexities we deal with in today's world. This TEC37 episode is sponsored by AppDynamics. Related Content TEC37 E02: AIOps Part One - AI…
 
This podcast introduction was written by Nick Buraglio, the host of today’s podcast. As we all know, BGP runs the networked world. It is a protocol that has existed and operated in the vast expanse of the internet in one form or another since early 1990s, and despite the fact that it has been extended, enhanced, twisted, and warped into performing …
 
Lifecycle management is an area that all businesses need to think about and plan for, and knowing what you manage and who manages it, structuring your plans to assign responsibility and achieving continuous development and improvement is extremely important. But is it any different in the cloud era? For this podcast we are once again joined by Xtra…
 
One of the biggest points of consideration when adopting a Cloud strategy is how to best integrate with existing, on-premises infrastructure and workloads. Google Cloud VMware Engine allows extended and standalone VMware-based environments while realizing the inherent benefits associated with consuming Public Cloud infrastructure. This allows for a…
 
We’re taking a technical dive into the AIOps and APM (application performance monitoring). Our experts discuss WWT’s partnerships and the technical complexities we deal with in today's world. Today’s episode is part two of a three-part series all surrounding AIOps. If you missed part one, check it out here. Related Content: AIOps in the Real World …
 
In early May 2020 I wrote a blog post introducing SuzieQ, a network observability platform Dinesh Dutt worked on for the last few years. If that blog post made you look for more details, you might like the Episode 111 of Software Gone Wild in which we went deeper and covered these topics: How does SuzieQ collect data What data is it collecting from…
 
Many organizations made a sudden shift to a remote workforce. In reopening, there are a handful of approaches companies are considering and implementing. In this episode, our Cloud, IoT and Collaboration experts Joe Berger, Kait Miller, Charlie Lawhorn and Arnel Sinchoncgo, speak to the IT considerations as companies move through the hybrid work en…
 
As the world evolves and becomes more remote, an app often serves as the only way a customer communicates. They bank, communicate, research, entertain and manage everything through the aperture of an “application.” This new interaction model puts the app front and center, making app loyalty the new brand loyalty. So, gone are the days of monitoring…
 
In recent times we have noticed a demand in job postings looking for the mythical Unicorn, the person that automates everything, bleeds devops, and judges people by the stickers on their laptop. How do you find these Unicorns? Simple, you breed them. The panel will discuss industry trends, skillsets, and best practices to successfully breed a bless…
 
A while ago we discussed a software-focused view of Network Interface Cards (NICs) with Luke Gorrie, and a hardware-focused view of them with Or Gerlitz (Mellanox), Andy Gospodarek (Broadcom) and Jiri Pirko (Mellanox). Why would anyone want to implement features in hardware and not in software, and what would be the best hardware implementation? We…
 
This podcast introduction was written by Nick Buraglio, the host of today’s podcast. As private overlays are becoming more and more prevalent and as SD-WAN systems and technologies advance, it remains critical that we continue to investigate how we think about internetworking. Even with platforms such as Slack Nebula, Zerotier, or the wireguard bas…
 
For this episode of Cloud Insiders we are returning to the rich world of VMware Cloud on AWS but this time we are looking at this cloud solution from an Amazon Web Services (AWS) point of view. We are joined by Chris Porter, a Specialist Solutions Architect at AWS specialising in VMware technologies and Andy Hine, Technical Pre-Sales Consultant at …
 
The last Software Gone Wild podcast recorded in 2019 focused on advances in Linux networking - in particular on interesting stuff presented at NetDev 0x13 conference in Prague. The guests (in alphabetical first name order) Jamal Hadi Salim, Shrijeet Mukherjee, Sowmini Varadhan, and Tom Herbert shared their favorite topics, and commented on the futu…
 
No, we were not talking about IP fabrics in general - IP Fabric is a network management software (oops, network assurance platform) Gian Paolo discovered a while ago and thoroughly tested in the meantime. He was kind enough to share what he found in Episode 107 of Software Gone Wild, and as Chris Young succinctly summarized: “it’s really sad what w…
 
Automation has come a long way from the days of pen and paper, flowcharts, code and scripts, and now with the release of VMware vRealize Automation (vRA) 8 it’s moved to another level. Easy to deploy, streamlined, user friendly and faster – in this podcast, Xtravirt Cloud Automation consultant Sam Perrin discusses what vRA 8 is all about and why it…
 
Everyone is talking about FRRouting suite these days, while hidden somewhere in the background OpenBGPD has been making continuous progress for years. Interestingly, OpenBGPD project was started for the same reason FRR was forked - developers were unhappy with Zebra or Quagga routing suite and decided to fix it. We discussed the history of OpenBGPD…
 
In February 2019 at the RSA Security Conference in San Francisco, VMware announced the launch of a new solution based on VMware’s NSX and AppDefense products called “VMware Service-Defined Firewall”. We’re joined in this podcast by Xtravirt Lead Consultant, Steve Wood, to discuss Software-Defined Firewall and the challenges it is addressing. Steve …
 
Sick-and-tired of intent-based GUIs that are barely better than CiscoWorks on steroids? How about asking Siri-like assistant queries about network state in somewhat-limited English and getting replies back in full-blown sentences? Warning: you might be reentering the land of unicorns driving flying DeLoreans... but then keep in mind what Arthur Cla…
 
Imagine you would have a system that would read network device configurations, figure out how those devices might be connected, reverse-engineer the network topology, and be able to answer questions like “what would happen if this link fails” or “do I have fully-redundant network” or even “how will this configuration change impact my network”. Welc…
 
Security visibility is an issue that has become increasingly important to organizations in today’s IT environment. In the latest TEC37 episode from World Wide Technology (WWT), Bob Olwig hosts a dynamic discussion with WWT Security practice experts Chris Konrad and Rudy Kasprzyk, along with two of WWT's Security practice partners, Dylan Deanda from…
 
When I was still at university the fourth-generation programming languages were all the hype, prompting us to make jokes along the lines “fifth generation will implement do what I don’t know how” The research team working in Networked Systems Group at ETH Zurich headed by prof. Laurent Vanbever got pretty close. The description of their tool says: …
 
Every time a new simple programming language is invented, we go through the same predictable cycle: Tons of hype; Unbounded enthusiasm when people who never worked in target environment realize they could get something simple done in a short time; Ever-worsening headaches as the enthusiasts try to get a real job done with the shiny new tool; Disapp…
 
Remember how Nick Buraglio tried to use OpenDaylight to build a small part of SuperComputing conference network… and ended up with a programmable patch panel? This time he repeated the experiment using Faucet SDN Controller – an OpenFlow controller focused on getting the job done – and described his experience in Episode 101 of Software Gone Wild. …
 
I mentioned Multipath TCP (MP-TCP) numerous times in the past but I never managed to get beyond “this is the thing that might solve some TCP multihoming challenges” We fixed this omission in Episode 100 of Software Gone Wild with Christoph Paasch (software engineer @ Apple) and Mat Martineau from Open Source Technology Center @ Intel. Read more ……
 
A while ago we did a podcast with Luke Gorrie in which he explained why he’d love to have simple, dumb, and easy-to-work-with Ethernet NICs. What about the other side of the coin – smart NICs with their own CPU, RAM and operating system? Do they make sense, when and why would you use them, and how would you integrate them with Linux kernel? We disc…
 
In previous Software Gone Wild episodes we covered Snabb Switch and numerous applications running on it, from L2VPN to 4over6 gateway and integration with Juniper vMX code. In Episode 98 we focused on another interesting application developed by Max Rottenkolber: high-speed VPN gateway using IPsec on top of Snabb Switch (details). Enjoy! Listen to …
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login