Player FM - Internet Radio Done Right
170 subscribers
Checked 3d ago
تمت الإضافة منذ قبل nine عام
المحتوى المقدم من Packet Pushers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Packet Pushers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية
T
TechSurge: Deep Tech VC Podcast


1 Understanding the Elegant Math Behind Modern Machine Learning 1:14:43
1:14:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:14:43
Artificial intelligence is evolving at an unprecedented pace—what does that mean for the future of technology, venture capital, business, and even our understanding of ourselves? Award-winning journalist and writer Anil Ananthaswamy joins us for our latest episode to discuss his latest book Why Machines Learn: The Elegant Math Behind Modern AI . Anil helps us explore the journey and many breakthroughs that have propelled machine learning from simple perceptrons to the sophisticated algorithms shaping today’s AI revolution, powering GPT and other models. The discussion aims to demystify some of the underlying mathematical concepts that power modern machine learning, to help everyone grasp this technology impacting our lives–even if your last math class was in high school. Anil walks us through the power of scaling laws, the shift from training to inference optimization, and the debate among AI’s pioneers about the road to AGI—should we be concerned, or are we still missing key pieces of the puzzle? The conversation also delves into AI’s philosophical implications—could understanding how machines learn help us better understand ourselves? And what challenges remain before AI systems can truly operate with agency? If you enjoy this episode, please subscribe and leave us a review on your favorite podcast platform. Sign up for our newsletter at techsurgepodcast.com for exclusive insights and updates on upcoming TechSurge Live Summits. Links: Read Why Machines Learn, Anil’s latest book on the math behind AI https://www.amazon.com/Why-Machines-Learn-Elegant-Behind/dp/0593185749 Learn more about Anil Ananthaswamy’s work and writing https://anilananthaswamy.com/ Watch Anil Ananthaswamy’s TED Talk on AI and intelligence https://www.ted.com/speakers/anil_ananthaswamy Discover the MIT Knight Science Journalism Fellowship that shaped Anil’s AI research https://ksj.mit.edu/ Understand the Perceptron, the foundation of neural networks https://en.wikipedia.org/wiki/Perceptron Read about the Perceptron Convergence Theorem and its significance https://www.nature.com/articles/323533a0…
NB510: CISA Says US Tech Inherently Insecure; AI Now Included in Google Workspace
Manage episode 462144935 series 89504
المحتوى المقدم من Packet Pushers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Packet Pushers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Take a Network Break! Guest co-host John Burke joins Drew Conry-Murray for this week’s analysis of tech news. They discuss a string of serious vulnerabilities in Wavlink Wi-Fi routers, Fortinet taking a one-two security punch, and CISA director Jen Easterly calling out US hardware and software companies for being “inherently insecure.” Microsoft and Google put... Read more »
…
continue reading
1456 حلقات
Manage episode 462144935 series 89504
المحتوى المقدم من Packet Pushers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Packet Pushers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Take a Network Break! Guest co-host John Burke joins Drew Conry-Murray for this week’s analysis of tech news. They discuss a string of serious vulnerabilities in Wavlink Wi-Fi routers, Fortinet taking a one-two security punch, and CISA director Jen Easterly calling out US hardware and software companies for being “inherently insecure.” Microsoft and Google put... Read more »
…
continue reading
1456 حلقات
كل الحلقات
×
1 HN771: Is The CCIE Still Worth It In 2025? 55:52
55:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب55:52
The CCIE remains the gold standard for networking certifications. But these days there are lots of other avenues for developing your skills and advancing your networking career, including network automation, cloud networking, and yes, even AI. So is the CCIE still worth it? We chew on this topic with Eman Conde. Eman has been known ... Read more »…

1 TNO019: A Look At NetOps Inside a Colocation Facility 44:13
44:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب44:13
Ever wonder what network operations are like inside a colocation facility? Today we talk with Scott Brookshire, CTO of OpenColo. Scott shares his journey into networking, how OpenColo was founded, and the evolution of the company from a few servers to a significant data center operation. We delve into what it means to run a ... Read more »…

1 N4N016: Routers Are Not Switches…Are They? 51:30
51:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب51:30
The line between switches and routers can get a little blurry. On today’s N Is For Networking, we try to clear things up. We start by defining what a router and switch are, and then provide some historical and technical context to better understand the differences. Then we discuss how modern switches have evolved to ... Read more »…

1 D2DO266: How AI Affects the Developer Experience 43:00
43:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب43:00
Let’s talk about how AI affects the developer experience, particularly for open source tools such as Terraform. We’re joined by guests Welly Siauw and Tyler Lynch to examine a project that leverages AI to automate the generation of documentation and examples for AWS Terraform providers. We delve into the iterative development process with AI, the ... Read more »…

1 PP052: The State of the Network Security Market In 2025 40:38
40:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب40:38
How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He’s Sr. Director, Enterprise Security and Networking at the Dell’Oro Group, a ... Read more »…

1 NB516: Cisco, Nvidia ASIC Deal Chases Enterprise AI; Juniper Welcomes Third-Party LLMs 24:46
24:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب24:46
Take a Network Break! This week we start with a couple of follow-ups and a Red Alert, and then jump into tech news. Cisco and Nvidia team up to put Cisco ASICs and the Nexus NOS into Nvidia Ethernet switches, the market reads tea leaves as Microsoft walks away from data center capacity, and Juniper ... Read more »…

1 HN770: Deploying A Global Network in Minutes With Megaport (Sponsored) 35:53
35:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب35:53
In our conversation today with CTO Cameron Daniel of Megaport, we discuss their global WAN architecture, PoPs, use cases, the Megaport Cloud Router, and more. Megaport is our sponsor today. It’s accurate to describe Megaport as providing Network-as-a-Service. Megaport’s automated connectivity solutions enable rapid provisioning of circuits, contrasting sharply with traditional telcos. The discussion also ... Read more »…

1 N4N015: Spanning Tree Part 3 – Versions, States and Guards 41:58
41:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب41:58
We’re back with the third and last (for now) installment of our spanning tree series. Today’s episode includes an explanation of spanning tree versions, 802.1D, 802.1w, 802.1s, and their practical implications for network design. The discussion then turns to BPDU guard for preventing loops and ensuring rapid connectivity. Bonus material on why you should or ... Read more »…

1 TNO018: The Network Engineer’s Evolution: Thinking Like a Product Owner (Sponsored) 49:15
49:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب49:15
What does it mean for a network engineer to develop a product mindset? And what does a product mindset have to do with network automation? Guest Peter Sprygada connects these concepts in today’s episode of Total Network Operations, sponsored by Itential. Peter says that as an organization advances its network automation capabilities, the impetus shifts ... Read more »…

1 NAN086: A Reality Check On AI for Network Operations 53:24
53:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب53:24
On today’s episode, we get a reality check on all the hype surrounding AI with guest Phil Gervasi. Phil provides background on Large Language Models (LLMs) and their applications, as well as the current state of AI technology. We also delve into practical use cases for AI in network operations, from AI as an assistant ... Read more »…

1 PP051: Security Certifications From Beginner to Advanced 36:53
36:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب36:53
Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan ... Read more »…

1 NB515: Quantum Computing’s Future Looking More Certain; Arista Posts Record 2024 Revenues 27:32
27:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب27:32
Lots of good stuff in this week’s Network Break. Microsoft announces an 8-qubit quantum chip and declares that practical quantum computing is years, not decades, away. D-Wave says its quantum computers are now commercially available for research facilities, academic institutions, and governments. Apple rolls its own 5G modem into its iPhone 16e. Meta announces its ... Read more »…

1 HN769: CI/CD Pipelines and Network Automation 57:40
57:40
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب57:40
Continuous Integration / Continuous Deployment (CI/CD) is a framework that developers use to help them manage and integrate frequent code changes. As network automation evolves, should network engineers adopt CI/CD? Guest Tony Bourke joins us to talk about CI/CD pipelines: what they are, how they’re used, and how they can support network automation efforts. We ... Read more »…

1 TNO017: Lead People, Manage Machines and Processes 43:49
43:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب43:49
Lead people. Manage machines and processes. That’s the the advice from Bill Hunter, today’s guest on Total Network Operations. Bill shares lessons of resilience and adaptability he learned early in his career, including the power of good habits. Bill and Scott discuss how to identify processes that can be automated and when and where to ... Read more »…

1 N4N014: Spanning Tree Part 2 – Root Bridge, Edge Port, Forwarding and Blocking 34:58
34:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب34:58
Welcome to part 2 of our spanning tree series. We start with a quick review and then discuss root bridges, root ports, designated ports, and forwarding and blocked ports. We explain the impact of topology changes on spanning tree and network performance, and discuss how topology changes and convergence events are communicated. Last but not ... Read more »…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.