Artwork

Player FM - Internet Radio Done Right
Checked 1d ago
Hozzáadva négy éve
A tartalmat a Packet Pushers biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Packet Pushers vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!
icon Daily Deals

The Everything Feed - All Packet Pushers Pods

Megosztás
 

Manage series 2783095
A tartalmat a Packet Pushers biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Packet Pushers vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
  continue reading

1475 epizódok

Artwork

The Everything Feed - All Packet Pushers Pods

updated

iconMegosztás
 
Manage series 2783095
A tartalmat a Packet Pushers biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Packet Pushers vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
  continue reading

1475 epizódok

Minden epizód

×
 
Connecting your branch to your wide area network used to be simple enough. Call your carrier, get a circuit ordered, wait a long time, then turn it up. A little routing, and there you were. Cloud blew that model apart. Now when we connect branches to our corporate networks, we have to consider not only ... Read more »…
 
Collaboration among tech and business teams is crucial to advancing your business. Extreme Networks is introducing Extreme Platform ONE to support this collaboration. In this sponsored episode, we talk about how this product is designed to streamline workflows and enhance user experience through automation and AI integration. Extreme Networks Platform ONE is a centralized platform ... Read more »…
 
Spanning tree is a topic so mysterious and complicated that common advice is just to disable it. In today’s episode, we start a mini-series on spanning tree, hoping to better explain what it is and what it does. We begin with basic spanning tree terminology and its role in preventing loops in an Ethernet network. ... Read more »…
 
Embracing change is sometimes easier said than done. Today we talk with Monika Machado, who has held significant roles at companies like Microsoft and Oracle. She shares her story of learning and personal growth. Monika highlights the value of mentor-mentee relationships, continuous learning, understanding the difference between leadership and management, and the value of owning ... Read more »…
 
The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process ... Read more »…
 
AI Large Language Models (LLMs) can be used to generate output that the creators and users of those models didn’t intend; for example, harassment, instructions on how to make a bomb, or facilitating cybercrime. Researchers have created the HarmBench framework to measure how easily an AI can be weaponized. Recently these researchers trumpeted the finding ... Read more »…
 
Take a Network Break! We start with some red alerts for Cisco ISE, Zyxel, Microsoft, and a Web manager suite called WeGIA. US senators and security experts sound the alarm about DOGE employees introducing security and stability risks in sensitive US government systems, security researchers demonstrate the effectiveness of supply chain attacks that start with ... Read more »…
 
Today on the Tech Bytes podcast we dive into Digital Experience Monitoring and Internet Performance Monitoring with sponsor Catchpoint. As more users rely on SaaS and cloud for applications, the Internet has essentially become a business-critical network. But how can you, a network engineer, be expected to manage the Internet? Enter Internet Performance Monitoring, or ... Read more »…
 
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, talk about the trade-offs that come with free software, and how ... Read more »…
 
Today’s episode with guest Joan Garcia provides valuable insights into the complexities of modern network operations at a telco, the importance of collaboration across technical domains, and the strategic decisions that drive innovation in the telecom industry. Joan’s experiences and perspectives offer ideas for navigating the challenges of integrating different layers of network architecture while ... Read more »…
 
Want to know how an IPv6-only wireless network was deployed at a conference with 18,000 attendees? Join us as we talk through the technical details with Tom Costello, a senior network engineer at Argonne National Laboratory. Tom volunteers at the International Conference for High Performance Computing, Networking, Storage and Analysis (SC for short) to help ... Read more »…
 
Serverless is mature enough now to be a mainstream choice for application development. But that doesn’t mean interesting things aren’t happening. Benjamen Pyle joins Kyler and Ned on Day Two DevOps to talk about the potential for small vendors and startups to develop high-quality services purpose-built to solve specific problems. They also discuss the benefits ... Read more »…
 
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack ... Read more »…
 
Wi-Fi Explorer Pro is a popular wireless scanner. On today’s show we dive into the tool with its creator, Adrian Granados. We also talk about the launch of the new book Wi-Fi Explorer Pro 3 – The Definitive User Guide, written by Granados and co-author Nigel Bowden. We delve into the history and features of ... Read more »…
 
Loading …

Üdvözlünk a Player FM-nél!

A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Gyors referencia kézikönyv

Hallgassa ezt a műsort, miközben felfedezi
Lejátszás