In today’s episode Greg and Johna spar over how, when, and why to regulate AI. Does early regulation lead to bad regulation? Does late regulation lead to a situation beyond democratic control? Comparing nascent regulation efforts in the EU, UK, and US, they analyze socio-legal principles like privacy and distributed liability. Most importantly, Johna drives... Read more »
If your approach to firmware is that you don’t bother it as long as it doesn’t bother you, you might want to listen to this episode. Concerns about supply chain vulnerabilities are on the rise and for good reason: Attackers are targeting firmware because compromising this software can allow attackers to persist on systems after... Read more »
The intersection of Python and network engineering is Kirk Byers’ sweet spot. Today, the creator of the Netmiko library and core maintainer of NAPALM joins the show to tell us about his network automation journey. We also discuss Kirk’s experience on the business side of things, both the ups and downs. This is Part 1... Read more »
Learning cloud security can be daunting for experienced network engineers, much less complete newbies. That’s why Rich Mogull started “Cloud Security Lab A Week,” aka Cloud SLAW. Every Thursday, he emails subscribers a new hands-on lab, building a full enterprise deployment week-by-week, step-by-step. Rich explains all the details to JJ and Drew including the cost... Read more »
Today we talk to Sam Clements, founder of Wi-Fi Pros Slack. This online community has 1,600 members who share information and technical tips, talk shop, and connect with peers. Sam tells us how he developed the community over time, how he structures topics and channels, the ongoing fight against bots and spam, and where it... Read more »
Is WebAssembly (Wasm) here to replace containers? Not really, says guest Matt Butcher. Instead, Wasm is here for a specific kind of workload: One that needs to start super fast (under a millisecond), handle something, and then shutdown. Containers are still best for running very long, I/O intensive multithreaded workloads. Matt, Michael, and Kristina discuss... Read more »
You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mobile phones (check out our news headlines section). So let’s stop trying to disable it whack-a-mole style, and start... Read more »
The Wireless LAN Professionals organization just had its 10th annual conference and who better to break it down than WLPC founder (and Heavy Wireless host) Keith Parsons and friend of the show Ferney Munoz. They review their favorite presentations as well as heartwarming moments. Episode Guest Ferney Munoz | Ekahau and CWNP Certified Wireless Network... Read more »
In this episode of the Kubernetes Unpacked Podcast, Kristina and Michael catch up with Mark from Yellowbrick to talk about all things underlying architecture. Very rarely do we get a vendor to chat about what’s going on underneath the hood and how a particular application stack/tool is running, so this was an awesome episode! Mark... Read more »
Welcome back for Part 2 of Eric’s interview with Roman Dodin, co-creator of containerlab. Roman describes containerlab as a “lab as code” tool that quickly and easily creates virtual networking topologies. With increased automation and containerization in network engineering, the tool’s popularity has exploded. We talk about how folks contribute to containerlab’s development and what... Read more »
What does having a tech strategy actually do for an organization? In today’s episode, Greg and Johna highlight how a good tech strategy benefits a company: creates a foundation of first principles, reduces bias in vendor decisions, better allocates human resources, kills bad ideas, sunsets projects, and makes meetings a little more enjoyable and harmonious.... Read more »
This episode is for IT professionals who work in small- to medium-sized businesses and are expected to handle cybersecurity on top of issues like “my camera isn’t working on Zoom.” Guest Joe Stern has been filling this role for an 80-person company for almost 30 years. We talk about how he prioritizes risks, security tools... Read more »
CI/CD is not a villain. GitOps is not some kind of Kubernetes way of sneaking around it. In fact, GitOps falls under the CI/CD umbrella. Marcus Noble joins the show today to talk about how he uses a Kubernetes-native, open-source CI/CD framework called Tekton to test Kubernetes cluster creation, configuration, and deletion based on changes... Read more »
What if you could eliminate the burdens of networking without losing your control and visibility of the network? That’s the idea behind Nile. With Nile co-managing the network, you don’t have to spend all your time chasing down tickets, running patches, and dealing with CLI syntax. Instead you get to focus on higher level tasks... Read more »
According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security perimeter. That’s why the priority of any IT team should be to identify anomalies and anticipate attack logic. To do this, organizations need to... Read more »
Big risk, big reward: That’s the origin story of both containerlab and its maintainer, Roman Dodin. Roman tells Eric the story behind containerlab, a free software platform for building network labs and testing designs, as well as his own story of taking leaps into the unknown. This is the first episode of Network Automation Nerds... Read more »
Exactly who should be on your technology strategy team? From inside your organization, who should represent the areas that come into play: Business, development, operations, etc? And what about outsiders–what kind of external consultant do you want for your strategy team? Do you even need one? Johna and Greg cover it all in today’s episode.... Read more »
Thinking about a career in Sales Engineering (SE)? In this episode, you’ll hear straight from an experienced SE, Stewart Goumans. Stewart talks about what kind of background you need to be an SE, what the day-to-day looks like, and what it’s like to see a customer’s eyes light up when they realize you have a... Read more »
When you’re picking a penetration tester to poke at your security infrastructure, how do you know if you’re picking a good one? Is pen testing even the right service for your needs? Pen tester, SANS course creator, and OWASP board member Kevin Johnson joins the show to share tips for what to look for in... Read more »
Kubernetes is designed to be highly scalable and highly dynamic… a perfect habitat for cryptominers to terminal shell into and then exploit your workload’s resources to the max. And that’s just one example of security threats Kubernetes users need to prepare against. Nigel Douglas from Sysdig joins Michael Levan and Kristina Devochko to give you... Read more »