The Flipper Zero is like a Swiss Army knife for wireless tech enthusiasts. Today’s guest, Jason Beshara, is teaching a course on the Flipper Zero device at WLPC Phoenix 2025. He discusses its functions, including its ability to send and receive a variety of radio signals including Bluetooth, NFC, and sub-gigahertz frequencies. The conversation covers... Read more »
Nokia’s Event-Driven Automation, or EDA, is a network automation platform that aims to help network engineers achieve predictable, error-free operations so you can keep up with all the change tickets coming your way while ensuring the data center is reliable and performant. On today’s Tech Bytes podcast, sponsored by Nokia, we’ll talk about how EDA... Read more »
Take a Network Break! We start with some Red Alert vulnerabilities to get your blood pumping, and then dive into networking news. Cisco announces new data center switches with AMD Pensando DPUs that let you deploy security and other services directly on to the switch. Cisco ThousandEyes is previewing Traffic Insights, which correlates flow records... Read more »
Can AI and automation create a truly autonomous network, one that’s self-diagnosing and self-healing? Join Vitria CTO and Founder Dale Skeen and industry analyst Charlotte Patrick in this sponsored episode of Heavy Strategy to discuss the challenges–and limitations–of using AI to create autonomous networking. This discussion covers the “intelligence architecture” required to implement automation, and ... Read more »
Connecting your branch to your wide area network used to be simple enough. Call your carrier, get a circuit ordered, wait a long time, then turn it up. A little routing, and there you were. Cloud blew that model apart. Now when we connect branches to our corporate networks, we have to consider not only... Read more »
Collaboration among tech and business teams is crucial to advancing your business. Extreme Networks is introducing Extreme Platform ONE to support this collaboration. In this sponsored episode, we talk about how this product is designed to streamline workflows and enhance user experience through automation and AI integration. Extreme Networks Platform ONE is a centralized platform... Read more »
Spanning tree is a topic so mysterious and complicated that common advice is just to disable it. In today’s episode, we start a mini-series on spanning tree, hoping to better explain what it is and what it does. We begin with basic spanning tree terminology and its role in preventing loops in an Ethernet network.... Read more »
Embracing change is sometimes easier said than done. Today we talk with Monika Machado, who has held significant roles at companies like Microsoft and Oracle. She shares her story of learning and personal growth. Monika highlights the value of mentor-mentee relationships, continuous learning, understanding the difference between leadership and management, and the value of owning... Read more »
The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process... Read more »
AI Large Language Models (LLMs) can be used to generate output that the creators and users of those models didn’t intend; for example, harassment, instructions on how to make a bomb, or facilitating cybercrime. Researchers have created the HarmBench framework to measure how easily an AI can be weaponized. Recently these researchers trumpeted the finding... Read more »
Take a Network Break! We start with some red alerts for Cisco ISE, Zyxel, Microsoft, and a Web manager suite called WeGIA. US senators and security experts sound the alarm about DOGE employees introducing security and stability risks in sensitive US government systems, security researchers demonstrate the effectiveness of supply chain attacks that start with... Read more »
Today on the Tech Bytes podcast we dive into Digital Experience Monitoring and Internet Performance Monitoring with sponsor Catchpoint. As more users rely on SaaS and cloud for applications, the Internet has essentially become a business-critical network. But how can you, a network engineer, be expected to manage the Internet? Enter Internet Performance Monitoring, or... Read more »
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, talk about the trade-offs that come with free software, and how... Read more »
Today’s episode with guest Joan Garcia provides valuable insights into the complexities of modern network operations at a telco, the importance of collaboration across technical domains, and the strategic decisions that drive innovation in the telecom industry. Joan’s experiences and perspectives offer ideas for navigating the challenges of integrating different layers of network architecture while... Read more »
Want to know how an IPv6-only wireless network was deployed at a conference with 18,000 attendees? Join us as we talk through the technical details with Tom Costello, a senior network engineer at Argonne National Laboratory. Tom volunteers at the International Conference for High Performance Computing, Networking, Storage and Analysis (SC for short) to help... Read more »
Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered... Read more »
Serverless is mature enough now to be a mainstream choice for application development. But that doesn’t mean interesting things aren’t happening. Benjamen Pyle joins Kyler and Ned on Day Two DevOps to talk about the potential for small vendors and startups to develop high-quality services purpose-built to solve specific problems. They also discuss the benefits... Read more »
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack... Read more »
Wi-Fi Explorer Pro is a popular wireless scanner. On today’s show we dive into the tool with its creator, Adrian Granados. We also talk about the launch of the new book Wi-Fi Explorer Pro 3 – The Definitive User Guide, written by Granados and co-author Nigel Bowden. We delve into the history and features of... Read more »
Take a Network Break! The US Justice Department blocks the HPE-Juniper merger with a surprise lawsuit, DeepSeek shakes up the AI world, and Broadcom rolls out quantum-safe Fibre Channel controllers. Sweden seizes a vessel suspected of tampering with a subsea cable, a code update could make Linux significantly more power-efficient, and the WLAN market gets... Read more »