Fat Pack offentlig
[search 0]
Mer
Download the App!
show episodes
 
Loading …
show series
 
Once you get past a handful of Python scripts, network automation can be…daunting. If you want to make network automation process-driven, repeatable, reliable, and something that doesn’t just rely on your scripts and the knowledge inside your head, there’s an entire landscape that opens up before you. Have you thought about network discovery? How a…
  continue reading
 
On today’s episode, we’re going to talk Python. Host Eric Chou is joined by Michael Kennedy, the founder of Talk Python Training and host of the Talk Python To Me podcast. The discussion covers the evolution of Michael’s podcast and training business, the impact of platforms like TikTok on learning, and the importance of community... Read more »…
  continue reading
 
Join us today for a look back at this year’s developments in cloud security and DevOps. We ask if serverless computing has peaked, why Kubernetes continues to be so hard, whether cloud repatriation is a real trend, and whether the DevOps role has become too darn big. We also explore the future of cloud computing,... Read more »…
  continue reading
 
Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT teams visibility into the entire data path—including the home user network, first mile and last mile, and the WAN. On today’s Packet Protector, we learn how ADEM can complement your network and security …
  continue reading
 
Take a Network Break! This is our final show for 2024. We start with critical vulnerabilities in Ivanti and OpenWrt, and then discuss what effect a proposed bill from US Senator Ron Wyden would have on telecom security (short answer: more paperwork but unlikely to improve protection). Extreme Networks announces a new AI platform that... Read more »…
  continue reading
 
When building your network and buying equipment, is performance or cost more important? On today’s episode, we discuss the balance between performance and cost in selecting networking equipment. We also cover other considerations, including why you should understand client and network needs, the fluid nature of pricing, and the necessity of creativ…
  continue reading
 
Ever wonder how large conferences such as Cisco Live! manage their on-site network operations? Today’s podcast guest, Jason Davis joins host Scott Robohn to discuss history of network operations at Cisco Live!, and the intricacies, challenges, and strategies involved in setting up and managing network operations for such a large event. Episode Gues…
  continue reading
 
Today’s Heavy Networking comes to you from the AutoCon2 tech event being held in Westminster, Colorado. This episode was recorded in conference room on site at AutoCon2 in November, 2024. The format? Roundtable. Four network automators have raised their hand and brought topics they want to discuss. Those topics include: Crafting tools to “listen” t…
  continue reading
 
A growth mindset not only advances you, but can help to advance those around you. Today we delve into the concept of a growth mindset with guest Sasha Czarkowski. We contrast the growth mindset with a fixed mindset, highlighting the latter’s detrimental effects on creativity and learning. The discussion also highlights the importance of psychologic…
  continue reading
 
Packet analysis can be your friend for troubleshooting network problems. In this episode, hosts Ethan Banks and Holly Metlitzky explore packet analysis, They discuss tools such as Wireshark and Tcpdump, explain their functionalities, and talk about the importance of filtering data for effective analysis. Listeners are encouraged to engage with Wire…
  continue reading
 
Humor is the best medicine, so they say. In critical IT security jobs, a little humor could help you prevent burnout and maintain your mental equilibrium. Lydia Graslie, a Cloud Threat Detection Engineer at Edward Jones, shares her insights on the complexities of cloud security and the challenges posed by modern cloud platforms, as well... Read mor…
  continue reading
 
A Chief Information Security Officer (CISO) helps to architect and drive an organization’s security strategy. The role requires technical chops and business acumen. You also need strong communication skills to help executives understand risk and response, choose the right metrics to measure infosec effectiveness, and provide guidance to the technic…
  continue reading
 
Take a Network Break! This week we warn of significant vulnerabilities in WhatsUp Gold and Cisco NX-OS. We also discuss US federal reaction to the penetration of US telco networks by Chinese state actors. These reactions include network and visibility hardening guidelines from CISA, the FBI (reluctantly) recommending the use of encrypted messaging …
  continue reading
 
Loading …

Hurtigreferanseguide

Copyright 2025 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett
Lytt til dette showet mens du utforsker
Spill