Player FM - Internet Radio Done Right
305 subscribers
Checked 5h ago
تمت الإضافة منذ قبل eleven عام
المحتوى المقدم من Packet Pushers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Packet Pushers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
NB509: FCC to Raise Funds for Rip-and-Replace of Chinese Telco Gear; Billionaire Space Race Takes Off
Manage episode 460937804 series 21137
المحتوى المقدم من Packet Pushers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Packet Pushers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Take a Network Break! We start with serious CVEs for Perl and Ivanti. On the news front, the FCC wants to license spectrum to raise money to help US telcos rip out Chinese network equipment–even though there’s no evidence Chinese equipment led to telco intrusions by Chinese attackers. Verizon boasts of 5.5Gbps download speeds on... Read more »
…
continue reading
2190 حلقات
Manage episode 460937804 series 21137
المحتوى المقدم من Packet Pushers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Packet Pushers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Take a Network Break! We start with serious CVEs for Perl and Ivanti. On the news front, the FCC wants to license spectrum to raise money to help US telcos rip out Chinese network equipment–even though there’s no evidence Chinese equipment led to telco intrusions by Chinese attackers. Verizon boasts of 5.5Gbps download speeds on... Read more »
…
continue reading
2190 حلقات
كل الحلقات
×![Artwork](/static/images/128pixel.png)
1 N4N013: Spanning Tree Part 1 – An Introduction and Broadcast Storms 52:33
52:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب52:33![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Spanning tree is a topic so mysterious and complicated that common advice is just to disable it. In today’s episode, we start a mini-series on spanning tree, hoping to better explain what it is and what it does. We begin with basic spanning tree terminology and its role in preventing loops in an Ethernet network. ... Read more »…
![Artwork](/static/images/128pixel.png)
1 NAN085: Embrace Change to Thrive in the Tech Industry 59:54
59:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب59:54![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Embracing change is sometimes easier said than done. Today we talk with Monika Machado, who has held significant roles at companies like Microsoft and Oracle. She shares her story of learning and personal growth. Monika highlights the value of mentor-mentee relationships, continuous learning, understanding the difference between leadership and management, and the value of owning ... Read more »…
![Artwork](/static/images/128pixel.png)
1 PP049: CSMM – A Practical Model for Improving Your Cloud Security 42:55
42:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب42:55![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process ... Read more »…
![Artwork](/static/images/128pixel.png)
1 NB513: UK Demands Apple Backdoor; AI Spending: Can’t Stop, Won’t Stop 39:15
39:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب39:15![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Take a Network Break! We start with some red alerts for Cisco ISE, Zyxel, Microsoft, and a Web manager suite called WeGIA. US senators and security experts sound the alarm about DOGE employees introducing security and stability risks in sensitive US government systems, security researchers demonstrate the effectiveness of supply chain attacks that start with ... Read more »…
![Artwork](/static/images/128pixel.png)
1 HN767: Effective Networking on the Cheap 1:09:58
1:09:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:09:58![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, talk about the trade-offs that come with free software, and how ... Read more »…
![Artwork](/static/images/128pixel.png)
1 TNO015: Revolutionizing Telecom with NetOps Automation and Collaboration 1:00:07
1:00:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:00:07![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Today’s episode with guest Joan Garcia provides valuable insights into the complexities of modern network operations at a telco, the importance of collaboration across technical domains, and the strategic decisions that drive innovation in the telecom industry. Joan’s experiences and perspectives offer ideas for navigating the challenges of integrating different layers of network architecture while ... Read more »…
![Artwork](/static/images/128pixel.png)
1 N4N012: Russ White On Why We Need Network Models 49:21
49:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب49:21![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered ... Read more »…
Serverless is mature enough now to be a mainstream choice for application development. But that doesn’t mean interesting things aren’t happening. Benjamen Pyle joins Kyler and Ned on Day Two DevOps to talk about the potential for small vendors and startups to develop high-quality services purpose-built to solve specific problems. They also discuss the benefits ... Read more »…
![Artwork](/static/images/128pixel.png)
1 PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More 39:08
39:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب39:08![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack ... Read more »…
![Artwork](/static/images/128pixel.png)
1 NB512: US Objects to HPE-Juniper Wedding; Cheeky DeepSeek Freaks VCs 29:55
29:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب29:55![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Take a Network Break! The US Justice Department blocks the HPE-Juniper merger with a surprise lawsuit, DeepSeek shakes up the AI world, and Broadcom rolls out quantum-safe Fibre Channel controllers. Sweden seizes a vessel suspected of tampering with a subsea cable, a code update could make Linux significantly more power-efficient, and the WLAN market gets ... Read more »…
![Artwork](/static/images/128pixel.png)
1 HN 766: Ensuring QoE for Agentic AI With Broadcom VeloRAIN (Sponsored) 55:06
55:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب55:06![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
On today’s show, we’re discussing the complexities of network design for AI computing at the edge. We’re not talking about AIOps, although that might come up in this conversation. Instead, we’re focusing on how to effectively cope with the network traffic patterns happening on your network as a result of AI computing workloads. Our subject ... Read more »…
![Artwork](/static/images/128pixel.png)
1 TNO014: Beneath the Cable Color – A Look at The Siemon Company’s High Speed Cable Assemblies (Sponsored) 43:53
43:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب43:53![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Today we get an education on what a high speed cable assembly really is from guest Ryan Harris from today’s sponsor, The Siemon Company. Ryan shares the evolution of high-speed pluggable cable assemblies from 64kbps ISDN B channels to 800 gigabit connections, and describes how they work. We discuss the Siemon Company’s history and its ... Read more »…
![Artwork](/static/images/128pixel.png)
1 N4N011: What’s the Difference Between LAG, MLAG, MC-LAG, and Stacking? 56:22
56:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب56:22![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
In today’s episode, we address listener Kieren’s question about the differences between LAG, MLAG, MC-LAG, and stacking. We tackle the nuances of Link Aggregation (LAG) and the Link Aggregation Control Protocol (LACP), and explain their roles in redundancy and bandwidth efficiency. We also discuss the complexities and differences among vendors and overall benefits of Multi-Chassis ... Read more »…
Are you ready to go from zero to hero in GitNops? On today’s podcast, we talk with Tom McGonagle, who shares and explains git, CI/CD and DevOps and how that all fits into network engineering. The conversation also covers the evolution of containerization and Kubernetes, highlighting their roles in modern network automation. Tom also encourages ... Read more »…
![Artwork](/static/images/128pixel.png)
1 PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit 43:23
43:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب43:23![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, particularly in threat hunting ... Read more »…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.