Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security architectural strategy that’s progressing toward increased observability and trust inferences. Then she breaks it down for the three main... Read more »
Don’t call it remote work. Today Johna and Greg dive into distributed work– the future where there is no office vs. remote, there are just asynchronistic workers and their computer screens. Leaders have to move beyond “management by walking around” or “onboarding by shadowing.” They need to carefully select their ecosystem of tools (and tools... Read more »
Curious about what it takes to write a technical book as a network engineer? You’re in luck. The team behind Nautobot is also the team behind the book “Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking.” Jason, Ken, and John tell us about their writing process, timeline,... Read more »
Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&D of detection engineering. A threat hunter imagines what an attacker might try and, critically, how that behavior would show up in the logs of a particular environment. Then the... Read more »
Evaluating wireless use cases at a nuclear power plant is a little bit different than your average industrial job, starting with the stripdown to put on plant-provided clothing. Ferney Munoz joins us today to talk about his experience working as a wireless consultant at nuclear power plants. Obviously, radiation interference is a heightened issue, as... Read more »
Kristina attended KubeCon EU in March and she’s still trying to process it all. In today’s episode, Michael interviews her about what stood out most to her. They dive into the conference’s heavy emphasis on AI, particularly how Kubernetes can help with more efficient GPU utilization. Kristina also reports back on the United Nations hackathon... Read more »
What’s the difference between cybersecurity “as a service” vs. “managed” vs. “hosted”? And what’s the difference between an MSP and an MSSP? In this episode, JJ helps untangle the terms and concepts in cybersecurity offerings. She explains what questions you should ask vendors to make sure you’re picking the right one for your needs; negotiating... Read more »
Why are some executives still insisting on Return to Office policies? Does it improve culture and productivity like they swear? Or is it more about the devaluing of a massive asset on their books: Commercial real estate. If the value of commercial real estate drops, companies have less to leverage for loans and– perhaps more... Read more »
Today we chat with the maintainers of Nautobot, the open source network source of truth and network automation platform. Jason Edelman, Ken Celenza, John Anderson explain how their day jobs at professional services company, Network to Code, informs their work on Nautobot. They walk us through Nautobot’s core, out-of-the-box capabilities as well as the extensibility... Read more »
The classical encryption algorithms that currently undergird our IT infrastructure will be broken once there’s a powerful and stable enough quantum computer to do the job. Quantum-resistant algorithms are being developed by NIST, but implementation and deployment of these algorithms still have to be addressed. So what does all this mean for busy IT and... Read more »
With the rapid growth of IoT across enterprise and industrial spaces, now is a good time to check in on the wireless training and certification landscape beyond Wi-Fi. Today, Tom Carpenter, the Director of Education for the Certified Wireless Network Professionals joins us to give a lay of the land. He explains how the protocols... Read more »
Observability is foundational to application and infrastructure performance. That’s why it’s fitting that OpenTelemetry is the second most active project in the CNCF after Kubernetes. Today CNCF ambassador Dotan Horovits tells us about the project: OpenTelemetry is a uniform, vendor-agnostic observability framework for generating and collecting telemetry data across both infrastructure and application, across different... Read more »
The expectations for application delivery are higher than ever before, the networks that support those applications are increasingly distributed, and visibility is essential for network operations and troubleshooting. On today’s sponsored episode, Kentik’s Phil Gervasi joins us to discuss how Kentik collects essential performance data to help you monitor and manage all the networks your... Read more »
IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins the show to teach us the basics of how to find and secure IoT devices on your network, specifically focusing... Read more »
Right now we’re in the first generation of edge architecture. We won’t even really know how to define it until we’re past it. Greg and Johna discuss the operational milieu in which the edge is forming: Vast numbers of IoT devices, increased remote computing capabilities, questions around cloud operational costs and efficiency, and vendors jostling... Read more »
Welcome to a crossover episode with the Day Two Cloud podcast! AI has been around forever; AI is emergent. AI is just data analytics; AI hallucinates. AI doesn’t have many business use cases; AI is already being used by your employees. Today, Greg and Johna from the Heavy Strategy podcast join Day Two Cloud to... Read more »
This is Part 2 of Kirk Byers’ interview. We discuss the Git course he’s developing and the need to build bridges between networking and testing so we can move automation forward. This of course leads us to geek out about AutoCon and the talks we’re most excited about. Plus, Kirk shares his wisdom about creating... Read more »
The US government is seeking comment on a new law mandating detailed cyber incident reporting. In this episode, we cover what you need to know about the “Cyber Incident Reporting for Critical Infrastructure Act.” We break down the details, including what kind of companies the law applies to, what it defines as an “incident,” and... Read more »
In 2016, a handful of wireless engineers got together and decided to create the portable tool they all wish existed. Thus the WLAN Pi was born. Jerry Olla, Nick Turner, and Jiri Brejcha join the show today to talk about the evolution of the open source WLAN Pi and its current capabilities. The latest generation... Read more »
Whether you want to migrate legacy applications to Kubernetes in order to save the whales or for any other reason, Konveyor is here to help. Savitha Raghunathan joins us today to walk us through the open source tool. The basics: You input the application’s source code (any language that has a language server) and Konveyor... Read more »