In this episode of the Kubernetes Unpacked Podcast, Kristina and Michael catch up with Mark from Yellowbrick to talk about all things underlying architecture. Very rarely do we get a vendor to chat about what’s going on underneath the hood and how a particular application stack/tool is running, so this was an awesome episode! Mark... Read more »
In this podcast episode, Randy Horton from Orthogonal and Ian Sutcliffe from AWS discuss the complexities of supporting regulated medical devices in the cloud. They explore the challenges of adhering to regulations, the importance of security, and the need for robust frameworks. The conversation highlights the non-prescriptive nature of regulations, encouraging best practices rather than... Read more »
Welcome back for Part 2 of Eric’s interview with Roman Dodin, co-creator of containerlab. Roman describes containerlab as a “lab as code” tool that quickly and easily creates virtual networking topologies. With increased automation and containerization in network engineering, the tool’s popularity has exploded. We talk about how folks contribute to containerlab’s development and what... Read more »
What does having a tech strategy actually do for an organization? In today’s episode, Greg and Johna highlight how a good tech strategy benefits a company: creates a foundation of first principles, reduces bias in vendor decisions, better allocates human resources, kills bad ideas, sunsets projects, and makes meetings a little more enjoyable and harmonious.... Read more »
This episode is for IT professionals who work in small- to medium-sized businesses and are expected to handle cybersecurity on top of issues like “my camera isn’t working on Zoom.” Guest Joe Stern has been filling this role for an 80-person company for almost 30 years. We talk about how he prioritizes risks, security tools... Read more »
Medical devices are an essential element of patient care. They’re also network-connected devices that need resilient connectivity and security. On today’s Tech Bytes we examine the challenges of supporting and securing connected medical devices, including threats, vulnerabilities, and regulatory frameworks. We’ll also discuss strategies and best practices to manage medical device risks and ensure the... Read more »
This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network testing space with... Read more »
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and... Read more »
CI/CD is not a villain. GitOps is not some kind of Kubernetes way of sneaking around it. In fact, GitOps falls under the CI/CD umbrella. Marcus Noble joins the show today to talk about how he uses a Kubernetes-native, open-source CI/CD framework called Tekton to test Kubernetes cluster creation, configuration, and deletion based on changes... Read more »
What if you could eliminate the burdens of networking without losing your control and visibility of the network? That’s the idea behind Nile. With Nile co-managing the network, you don’t have to spend all your time chasing down tickets, running patches, and dealing with CLI syntax. Instead you get to focus on higher level tasks... Read more »
According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security perimeter. That’s why the priority of any IT team should be to identify anomalies and anticipate attack logic. To do this, organizations need to... Read more »
SecOps, NetOps, and help desks need integrated data, increased context, and the ability to quickly understand interdependencies in order to take on the complex tasks facing them. That’s why ThousandEyes is now integrated with Cisco Secure Access, Cisco’s SSE solution. Tune in to learn about ThousandEyes’ deeper visibility, system process metrics, streamlined test setup, and... Read more »
This week we discuss a new network observability offering from Arista that integrates network telemetry with application data, why startups such as Groq and Taalas think they can break Nvidia’s grip on the AI chip market, and how Microsoft is hedging its LLM bets. Amazon goes nuclear with the purchase of a reactor-powered data center... Read more »
Today we metaphorically pop open the hood of switches and routers, taking a look at the mechanics of how they work. We cover the three states: configuration, operational, and forwarding. We talk RIB and FIB, along with CAM, TCAM, and MPLS. We also cover line rate, port-to-port latency, and buffers. Whether it’s been awhile since... Read more »
If you’ve been wondering about the double colons and letters you’re seeing in IPv6 addresses, this is the episode for you. Tom and Scott break down IPv6 addressing, starting with the basics of binary and taking you all the way through the etiquette of not using capital letters in Layer 3 addressing (we’re looking at... Read more »
Big risk, big reward: That’s the origin story of both containerlab and its maintainer, Roman Dodin. Roman tells Eric the story behind containerlab, a free software platform for building network labs and testing designs, as well as his own story of taking leaps into the unknown. This is the first episode of Network Automation Nerds... Read more »
Today we welcome a new co-host, Kyler Middleton, to the Day Two Cloud podcast. Kyler grew up in rural Western Nebraska, fixing neighboring farmers’ computers in exchange for brownies and Rice Krispies. Now she’s the newest co-host for Day Two Cloud… perhaps a lateral move, given the lack of baked goods. Kyler will draw on... Read more »
Exactly who should be on your technology strategy team? From inside your organization, who should represent the areas that come into play: Business, development, operations, etc? And what about outsiders–what kind of external consultant do you want for your strategy team? Do you even need one? Johna and Greg cover it all in today’s episode.... Read more »
Thinking about a career in Sales Engineering (SE)? In this episode, you’ll hear straight from an experienced SE, Stewart Goumans. Stewart talks about what kind of background you need to be an SE, what the day-to-day looks like, and what it’s like to see a customer’s eyes light up when they realize you have a... Read more »
When you’re picking a penetration tester to poke at your security infrastructure, how do you know if you’re picking a good one? Is pen testing even the right service for your needs? Pen tester, SANS course creator, and OWASP board member Kevin Johnson joins the show to share tips for what to look for in... Read more »