show episodes
 
Inside Towers Managing Editor Jim Fryer shares the Ethernet with some of Telecom's key players in this Tower and Wireless Infrastructure News Podcast. Subscribe to the Inside Towers daily newsletter here: https://insidetowers.com/subscription/
  continue reading
 
Welcome to NEDAS Live! Where Wireline and Wireless Meet, the podcast where we address the communications infrastructure ecosystem, brought to you by NEDAS. Since 2010, NEDAS programs bring together industry thought leaders, cutting-edge technologies and end-user solutions shaping a new communications infrastructure landscape and enabling a more connected world. Your host is Ilissa Miller, President of NEDAS.
  continue reading
 
Join "The Technology Addicts" podcast by Avnet Abacus, a leading European distributor of cutting-edge tech products. Explore the exciting world of interconnect, passive, electromechanical, power supply, energy storage, wireless & sensor products and solutions with our inspiring interview guests.
  continue reading
 
Loading …
show series
 
Tune in for another episode of NEDAS Live! as we are joined by David Bronston, Special Counsel and Co-Lead of the Telecommunications Practice at Phillips Lytle. David brings his vast experience to the discussion, shedding light on the evolving telecommunications landscape and the challenges faced by the industry. From the impact of the 1996 Telecom…
  continue reading
 
There are about 1.4 million Kubernetes clusters just sitting out there on the public internet as we speak. That is 1.4 million lateral-movement rich, highly privileged environments. The bearer of this anxiety-provoking news is today’s guest, Lee Briggs. Lee explains why major cloud providers make this the default option– ease of use. The good news.…
  continue reading
 
Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security architectural strategy that’s progressing toward increased observability and trust inferences. Then she breaks it down for the three main... Read more »…
  continue reading
 
Don’t call it remote work. Today Johna and Greg dive into distributed work– the future where there is no office vs. remote, there are just asynchronistic workers and their computer screens. Leaders have to move beyond “management by walking around” or “onboarding by shadowing.” They need to carefully select their ecosystem of tools (and tools... Re…
  continue reading
 
Take a Network Break! This week we discuss what IBM and Palo Alto Networks get out of a deal for Palo Alto Networks to buy the SaaS version of the QRadar SIEM from IBM, why LogRhythm is merging with Exabeam, and how Google is positioning its latest AI chip to take on the Nvidia juggernaut.... Read more »…
  continue reading
 
Welcome to the second part of our interview with friend of the podcast, Russ White. We start our conversation with a listener question about VXLAN/EVPN which acts as a springboard for what Russ really thinks about network engineering these days. He defends network snowflakes, championing their power in business use cases. He questions the merit... …
  continue reading
 
Alexandra Huides didn’t like IPv6 on her first encounter with it. Today she is globally renowned for spreading the IPv6 gospel and helping AWS customers adopt it. Alexandra joins the show today to share what changed her mind about IPv6 and what she sees change the minds of network engineers every day: Greater client traffic... Read more »…
  continue reading
 
Curious about what it takes to write a technical book as a network engineer? You’re in luck. The team behind Nautobot is also the team behind the book “Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking.” Jason, Ken, and John tell us about their writing process, timeline,... Read more »…
  continue reading
 
Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&D of detection engineering. A threat hunter imagines what an attacker might try and, critically, how that behavior would show up in the logs of a particular environment. Then the... Read more »…
  continue reading
 
Evaluating wireless use cases at a nuclear power plant is a little bit different than your average industrial job, starting with the stripdown to put on plant-provided clothing. Ferney Munoz joins us today to talk about his experience working as a wireless consultant at nuclear power plants. Obviously, radiation interference is a heightened issue, …
  continue reading
 
Take a Network Break! We begin the episode with some follow-up on edge AI chips, whether Packet Pushers should start a dedicated AI channel, and a clarification on AWS and VMware. On the news front, we discuss the soft launches of AI assistant from Extreme Networks and Gluware, and a new virtual appliance for Cisco’s... Read more »…
  continue reading
 
Telecom equipment distributors play a pivotal role in supplying all the infrastructure elements that make broadband and mobile networks work. Distributors stock their warehouses with thousands of products from hundreds of manufacturers and deliver orders for these products from network operators and their contractors to wherever the equipment is ne…
  continue reading
 
We turn the nerd meter up to eleven on today’s episode with longtime friend of the show, Russ White. First we dive into how an Ethernet adapter knows when a link is lost, where Russ teaches us all about loss of carrier and OAM. He also gives us a tutorial on how the rest of... Read more »By Packet Pushers
  continue reading
 
Kristina attended KubeCon EU in March and she’s still trying to process it all. In today’s episode, Michael interviews her about what stood out most to her. They dive into the conference’s heavy emphasis on AI, particularly how Kubernetes can help with more efficient GPU utilization. Kristina also reports back on the United Nations hackathon... Rea…
  continue reading
 
Keith Gregory teaches us about data engineering in a way DevOps folks (and hydrologists) can understand. He explains that the role of a data engineer is to create pipelines to transport data from metaphorical rivers and make it usable for data analysts. Keith walks us through the testing process; the difference between streaming pipelines and... Re…
  continue reading
 
What’s the difference between cybersecurity “as a service” vs. “managed” vs. “hosted”? And what’s the difference between an MSP and an MSSP? In this episode, JJ helps untangle the terms and concepts in cybersecurity offerings. She explains what questions you should ask vendors to make sure you’re picking the right one for your needs; negotiating...…
  continue reading
 
Why are some executives still insisting on Return to Office policies? Does it improve culture and productivity like they swear? Or is it more about the devaluing of a massive asset on their books: Commercial real estate. If the value of commercial real estate drops, companies have less to leverage for loans and– perhaps more... Read more »…
  continue reading
 
There is more and more fiber being deployed in the middle mile and deeper into the network to interconnect data centers and enterprises, provide wireless carriers with cell site backhaul, and enable telco and ISP deployments. Clearfield, a fiber management and connectivity provider, designs and builds the products needed to power active equipment a…
  continue reading
 
Loading …

Quick Reference Guide