Would you give an artificial intelligence responsibility to write your router configurations? You wouldn’t. Not yet. But we’re not as far from that as you might think. On today's Heavy Networking we dig into OpenAI and ChatGPT and what it might mean for networking.
The post Heavy Networking 663: OpenAI For Networking appeared first on Packet Pushers.
This series started by discussing the history of the IETF and some of the tools you might use to build submissions to the IETF process. This, the second, post, will consider document formatting and two of the (sometimes) more difficult sections of an IETF draft to fill in. Formatting Just using one of the acceptable […]
The post Writing An IETF Draft: Formatting, Authorship, And Submissions appeared first on Packet Pushers.
In today's IPv6 Buzz podcast, Ed, Scott, and Tom speak with Jad El Cham about the RIPE NCC IPv6 training program as well as RIPE NCC's role as the European and Middle Eastern Regional Internet Registry providing Internet resources including IPv6 addresses.
The post IPv6 Buzz 118: IPv6 Training At RIPE NCC appeared first on Packet Pushers.
After setting questions and perspectives on What is Enterprise Architecture, the natural sequence is How to Maintain and Operate an Architecture team.
The post HS039 Operating an Enterprise Architecture Function appeared first on Packet Pushers.
On today's Day Two Cloud podcast we talk about Compute Express Link (CXL), a technology for composable infrastructure. The idea is to take all the peripherals in a system---network cards, memory, graphical processing units, and so on---and put them on a bus outside the chassis to share them among multiple hosts. Is this the dream of composable infrastructure coming true?
The post Day Two Cloud 179: Will CXL Make Composable Infrastructure Real? appeared first on Packet Pushers.
Role-Based Access Control, or RBAC, lets you set permissions around who can access a system and at what level. RBAC is basic, but essential, security function. This video looks at RBAC for Kubernetes from two perspectives: in native Kubernetes and in platforms such as Azure Active Directory. Host Michael Levan brings his background in system […]
The post Kubernetes Security And Networking 2: Getting Started With Role-Based Access Control (RBAC) – Video appeared first on Packet Pushers.
On today's Network Break podcast we cover a raft of Juniper vulnerabilities, whether Cisco should patch serious vulnerabilities in end-of-life products, a big T-Mobile breach, Avaya dealing with significant debt, sweeping rounds of layoffs, and more IT news.
The post Network Break 414: 230 Juniper Vulnerabilities, Should Cisco Patch An EOL Router, T-Mobile Takes Weeks To Spot Breach appeared first on Packet Pushers.
On today's Heavy Networking, guest Tom Costello walks us through his personal lab in the cloud. We discuss pros and cons of the cloud vs. a basement, using EVE-NG vs. CML, how automation can help you manage cloud costs, resources for those who might want a cloud lab, and more.
The post Heavy Networking 662: Home Lab In The Cloud Or Your Basement? appeared first on Packet Pushers.
On today's Kubernetes Unpacked podcast, host Michael Levan discusses six big ideas to consider as you build your Kubernetes foundation in 2023. Topics include abstractions, the need to understand what's beneath those abstractions, Kubernetes security, and more.
The post Kubernetes Unpacked 017: Kubernetes In 2023 – 6 Things To Think About appeared first on Packet Pushers.
On today's sponsored Day Two Cloud podcast we talk about zero standing privilege with strongDM. Zero standing privilege goes beyond just-in-time credentials to a model where no credentials pre-exist, but are created in real-time and paired with appropriate permissions built from policy, also created in real-time. Can such a thing be accomplished technically---and without irritating all your end users? StrongDM's Sebastian Mankowski is here to make the case.
The post Day Two Cloud 178: Implementing Zero Standing Privilege (Sponsored) appeared first on Packet Pushers.
This course looks at securing Kubernetes, with an emphasis, though not exclusively, on network security. Topics we’ll cover in the series include: Role-based access control Securing control planes and worker nodes API security and policy management Dealing with vulnerabilities Security capabilities of a service mesh Security-enabled Container Network Interfaces (CNIs) Securing the ingress controller Scanning […]
The post Kubernetes Security And Networking 1: Why Security Matters And Course Overview appeared first on Packet Pushers.
On today's Full Stack Podcast, Scott is joined by Krithika Chandramouli, a software engineer at Meta, to discuss how the lessons she learned while preparing to run her first-ever half-marathon also apply to careers. They dive into the relationship between consistency and one's progress toward a goal, and how understanding the "why" behind a goal can help motivate you.
The post Full Stack Journey 074: Going The Distance – What Running Can Teach Us About Careers appeared first on Packet Pushers.