Packet Pushers عمومي
[search 0]
أكثر
تنزيل التطبيق!
show episodes
 
The Packet Pushers Podcast Network offers continuous professional development for IT professionals. Keep up with networking, security, cloud, career, and more. We bring the IT community together--engineers, architects, vendors, developers, educators, etc. In this feed, listen to every conversation we record!
  continue reading
 
Loading …
show series
 
Take a Network Break! This week we discuss what IBM and Palo Alto Networks get out of a deal for Palo Alto Networks to buy the SaaS version of the QRadar SIEM from IBM, why LogRhythm is merging with Exabeam, and how Google is positioning its latest AI chip to take on the Nvidia juggernaut.... Read more »…
  continue reading
 
Welcome to the second part of our interview with friend of the podcast, Russ White. We start our conversation with a listener question about VXLAN/EVPN which acts as a springboard for what Russ really thinks about network engineering these days. He defends network snowflakes, championing their power in business use cases. He questions the merit... …
  continue reading
 
Alexandra Huides didn’t like IPv6 on her first encounter with it. Today she is globally renowned for spreading the IPv6 gospel and helping AWS customers adopt it. Alexandra joins the show today to share what changed her mind about IPv6 and what she sees change the minds of network engineers every day: Greater client traffic... Read more »…
  continue reading
 
Curious about what it takes to write a technical book as a network engineer? You’re in luck. The team behind Nautobot is also the team behind the book “Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking.” Jason, Ken, and John tell us about their writing process, timeline,... Read more »…
  continue reading
 
Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&D of detection engineering. A threat hunter imagines what an attacker might try and, critically, how that behavior would show up in the logs of a particular environment. Then the... Read more »…
  continue reading
 
Loading …

دليل مرجعي سريع