Actualités en humour avec Tout-Ti, Francis, Botrax, Franky et Woodbreaker.
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
Once you get past a handful of Python scripts, network automation can be…daunting. If you want to make network automation process-driven, repeatable, reliable, and something that doesn’t just rely on your scripts and the knowledge inside your head, there’s an entire landscape that opens up before you. Have you thought about network discovery? How a…
…
continue reading
1
NAN081: We’re Going To Talk Python To You
1:05:52
1:05:52
Spill senere
Spill senere
Lister
Lik
Likt
1:05:52
On today’s episode, we’re going to talk Python. Host Eric Chou is joined by Michael Kennedy, the founder of Talk Python Training and host of the Talk Python To Me podcast. The discussion covers the evolution of Michael’s podcast and training business, the impact of platforms like TikTok on learning, and the importance of community... Read more »…
…
continue reading
1
D2DO261: Year in Review: Peak Serverless, K8s Complexity, DevOps Sprawl (and What’s Next)
41:48
41:48
Spill senere
Spill senere
Lister
Lik
Likt
41:48
Join us today for a look back at this year’s developments in cloud security and DevOps. We ask if serverless computing has peaked, why Kubernetes continues to be so hard, whether cloud repatriation is a real trend, and whether the DevOps role has become too darn big. We also explore the future of cloud computing,... Read more »…
…
continue reading
1
PP044: Optimizing Security and Performance with ADEM and App Acceleration (Sponsored)
41:31
41:31
Spill senere
Spill senere
Lister
Lik
Likt
41:31
Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT teams visibility into the entire data path—including the home user network, first mile and last mile, and the WAN. On today’s Packet Protector, we learn how ADEM can complement your network and security …
…
continue reading
1
NB508: Google Serves Up Custom AI and Quantum Chips; Nokia Puts Muscle Behind SONiC
24:09
24:09
Spill senere
Spill senere
Lister
Lik
Likt
24:09
Take a Network Break! This is our final show for 2024. We start with critical vulnerabilities in Ivanti and OpenWrt, and then discuss what effect a proposed bill from US Senator Ron Wyden would have on telecom security (short answer: more paperwork but unlikely to improve protection). Extreme Networks announces a new AI platform that... Read more »…
…
continue reading
When building your network and buying equipment, is performance or cost more important? On today’s episode, we discuss the balance between performance and cost in selecting networking equipment. We also cover other considerations, including why you should understand client and network needs, the fluid nature of pricing, and the necessity of creativ…
…
continue reading
1
TNO011: Behind the NetOps Curtain at Cisco Live!
49:18
49:18
Spill senere
Spill senere
Lister
Lik
Likt
49:18
Ever wonder how large conferences such as Cisco Live! manage their on-site network operations? Today’s podcast guest, Jason Davis joins host Scott Robohn to discuss history of network operations at Cisco Live!, and the intricacies, challenges, and strategies involved in setting up and managing network operations for such a large event. Episode Gues…
…
continue reading
1
HN761: Who Are You Building Automation For? An AutoCon2 Roundtable
1:02:27
1:02:27
Spill senere
Spill senere
Lister
Lik
Likt
1:02:27
Today’s Heavy Networking comes to you from the AutoCon2 tech event being held in Westminster, Colorado. This episode was recorded in conference room on site at AutoCon2 in November, 2024. The format? Roundtable. Four network automators have raised their hand and brought topics they want to discuss. Those topics include: Crafting tools to “listen” t…
…
continue reading
1
TL009: Shifting to a Growth Mindset for Organizational Success
36:56
36:56
Spill senere
Spill senere
Lister
Lik
Likt
36:56
A growth mindset not only advances you, but can help to advance those around you. Today we delve into the concept of a growth mindset with guest Sasha Czarkowski. We contrast the growth mindset with a fixed mindset, highlighting the latter’s detrimental effects on creativity and learning. The discussion also highlights the importance of psychologic…
…
continue reading
Packet analysis can be your friend for troubleshooting network problems. In this episode, hosts Ethan Banks and Holly Metlitzky explore packet analysis, They discuss tools such as Wireshark and Tcpdump, explain their functionalities, and talk about the importance of filtering data for effective analysis. Listeners are encouraged to engage with Wire…
…
continue reading
1
D2DO260: Cloudy With a Chance of Meatballs: Humor and Threat Detection
34:32
34:32
Spill senere
Spill senere
Lister
Lik
Likt
34:32
Humor is the best medicine, so they say. In critical IT security jobs, a little humor could help you prevent burnout and maintain your mental equilibrium. Lydia Graslie, a Cloud Threat Detection Engineer at Edward Jones, shares her insights on the complexities of cloud security and the challenges posed by modern cloud platforms, as well... Read mor…
…
continue reading
1
PP043: The Perils and Perks of the CISO Track
39:49
39:49
Spill senere
Spill senere
Lister
Lik
Likt
39:49
A Chief Information Security Officer (CISO) helps to architect and drive an organization’s security strategy. The role requires technical chops and business acumen. You also need strong communication skills to help executives understand risk and response, choose the right metrics to measure infosec effectiveness, and provide guidance to the technic…
…
continue reading
1
NB507: Arista Announces Stackable Switches; FBI Recommends Encrypted Messaging
42:04
42:04
Spill senere
Spill senere
Lister
Lik
Likt
42:04
Take a Network Break! This week we warn of significant vulnerabilities in WhatsUp Gold and Cisco NX-OS. We also discuss US federal reaction to the penetration of US telco networks by Chinese state actors. These reactions include network and visibility hardening guidelines from CISA, the FBI (reluctantly) recommending the use of encrypted messaging …
…
continue reading