Packet Pushers
Packet Pushers
  • 639
  • 537 366
Chocolate or Carrots? How Humor Can Foster Good DevOps Relationships
Guests Ashish and Shilpi from the Cloud Security Podcast converse with Ned and Kyler on how humor and relatability can foster an engaging and collaborative environment in DevOps. The conversation also covers the importance of foundational knowledge in technology, the impact of AI on careers, and the value of just being human and learning from mistakes.
Cloud Security Podcast - www.cloudsecuritypodcast.tv/about
Cloud Security Podcast on LinkedIn - www.linkedin.com/company/cloud-security-podcast/
Cloud security podcast - Kelsey Hightower - czcams.com/video/44FW-Kw9ARI/video.html
Day Two DevOps is part of the Packet Pushers network. Visit our website to find more great networking and technology podcasts, along with tutorial videos, the Human Infrastructure newsletter, and loads more resources for building your IT career. packetpushers.net
zhlédnutí: 14

Video

Wi-Fi Security Part 1 - Unpacking Vulnerabilities and Exploits
zhlédnutí 48Před 2 hodinami
From an SSID confusion exploit to a RADIUS attack to a critical vulnerability in a Windows Wi-Fi driver, the past several months have seen multiple attacks and exploits targeting the wireless realm. On today’s Packet Protector podcast we talk with Wi-Fi security expert Stephen Orr to get his take on the severity of these issues, remediation options, and efforts by the wireless industry to balan...
Is It Time To Dump Microsoft?
zhlédnutí 89Před 2 hodinami
Should enterprises ditch Microsoft because of security concerns? Microsoft's numerous vulnerabilities and questionable responses make it a significant risk for continued use. At the same time, Microsoft's strong integration and utility in enterprise environments make it attractive for continued use. Johna Till Johnson and John Burke debate. They also weigh considerations including the challenge...
Prioritizing and Managing IoT/OT Vulnerabilities with Palo Alto Networks (Sponsored)
zhlédnutí 78Před 4 hodinami
Today on the Tech Bytes podcast we discuss vulnerability management for IoT and OTT devices with sponsor Palo Alto Networks. These devices-think video cameras, sensors, medical equipment, industrial control systems, and so on-present unique challenges when it comes to finding, prioritizing, and managing software vulnerabilities. Palo Alto Networks' machine learning-based solutions offer visibil...
The BSODs Strike Back; SolarWinds Sorta Dodges SEC Bullets
zhlédnutí 88Před 4 hodinami
Take a Network Break! This week we cover the CrowdStrike/Microsoft patch debacle, why SolarWinds isn't entirely out of trouble following a judge's dismissal of most but not all of an SEC lawsuit, and why an AT&T breach revelation highlights third-party risk. Juniper announces an AI infrastructure testing lab and enhancements to its capabilities to operate AI infrastructure, AMD acquires an AI l...
TL000: Announcing Technically Leadership, a New Podcast for the Next Phase of Your Career
zhlédnutí 70Před 12 hodinami
Technically Leadership is a brand new podcast on the Packet Pushers network. Host Laura Santamaria explores leadership in the tech industry, with conversations and insights to help you development your management skills. Whether you’re considering your first management role or you’re an experienced manager working your way to the C-suite, this podcast is for you. Episode one will be released Ju...
History of Networking: How Bridging Saved Ethernet
zhlédnutí 184Před dnem
Ready to take a trip back to the 1980’s and learn some networking history? We talk with Alan Kirby, who was there forty years ago when the first Ethernet bridge was created at Digital Equipment Corporation (DEC). He explains the story of why and how it came to be. We discuss how Ethernet compared to competing protocols in use at the time, why Alan and colleagues decided to build a prototype Eth...
Operational Considerations: DHCP vs DHCPv6
zhlédnutí 111Před dnem
What are the operational considerations and differences between DHCP and DHCPv6? In today’s episode we explore the implications for network management, security, and operational models. We also discuss the challenges of DHCPv6 failover, high availability, complex device tracking and identity management in various environments. Scott’s Infoblox IPv6 CoE blog post - blogs.infoblox.com/ipv6-coe/dh...
Is Cloud Networking the Future for Network Engineers?
zhlédnutí 275Před 14 dny
On today's episode, host Eric Chou and guest Kyler Middleton discuss the transition from on-prem network engineering to cloud networking; the importance of adapting to new platforms such as AWS, Azure, and Terraform; and the future of cloud versus on-premises solutions. We also discuss Kyler's background, navigating the journey from a farm upbringing to a career in technology, with an emphasis ...
Inside an Equipment Test Lab
zhlédnutí 63Před 14 dny
Third-party test labs can help buyers make decisions about which products to purchase. While a testing lab can’t mimic the conditions of your specific production environment, it can assess a product’s fundamental capabilities and measure throughput, performance, and-in the case of security devices-effectiveness against a test suite of malware or attack techniques. On today’s episode we talk wit...
Wi-Fi Surveys - Past, Present & Future
zhlédnutí 87Před 14 dny
The evolution of wireless surveys is the topic of today’s Heavy Wireless podcast with guest Jussi Kivineimi of Hamina. We cover the transition from traditional on-site assessments to predictive tools, with an emphasis on the importance of a hybrid approach for accurate network design. We also tackle the role of APIs in network design, the potential of AP-to-AP communication for visualizing RF d...
Tech Bytes: High Performance, Scalable Object Storage with MinIO (Sponsored)
zhlédnutí 31Před 14 dny
Today on the Tech Bytes podcast we talk with Jonathan Symonds, Chief Marketing Officer at MinIO about MinIO's object storage offering; a software-defined, Amazon S3-compatible object storage that offers high performance and scale for modern workloads and AI/ML. We discuss how MinIO helps customers across industries drive AI innovation and AI architectures, how object storage is changing the lan...
NB486: Chrome Ditches Entrust Certs; Do AI Stocks Mirror the DotCom Bubble?
zhlédnutí 65Před 14 dny
Take a Network Break! This week we cover why the Google Chrome browser won't trust a set of Entrust digital certificates come November and what you should do about it, an emergency security patch from Juniper, and the reasons why France's Competition Authority is scrutinizing Nvidia. A roaming provider in the EU says a massive outage wasn't its fault, chipmaker SK Hynix pledges billions in AI i...
Can Service Level Objectives (SLOs) Help Keep Users Happy?
zhlédnutí 47Před 21 dnem
Service Level Objectives (SLOs) are a set of reliability measurements for customer or user expectations of services; in other words, are people having a good experience with your application or service? Today’s Day Two Cloud explores SLOs, the relevant metrics, and how to measure them. We also talk about how SLOs are a cross-discipline objective (that is, not just one team’s responsibility), th...
Critical Vulnerabilities, AI-Assisted Scams, Compromised VPNs, and More Security News
zhlédnutí 88Před 21 dnem
It's an all-news episode for this week's Packet Protector podcast. We cover critical vulnerabilities in the MOVEit file transfer software and in thousands of ASUS routers, and a remote code execution vulnerability in a Windows wireless driver that you really should patch. We discuss a Wall Street Journal article about how AI tools are helping scammers get better at scamming, a warning from Dutc...
Should IT Lead Or Follow The Business?
zhlédnutí 81Před 21 dnem
Should IT Lead Or Follow The Business?
Tech Bytes: Why SD-WAN is the Secret to SASE Success (Sponsored)
zhlédnutí 78Před 21 dnem
Tech Bytes: Why SD-WAN is the Secret to SASE Success (Sponsored)
A Final FU for Greg
zhlédnutí 157Před 21 dnem
A Final FU for Greg
Packet Pushers Goes To AutoCon1
zhlédnutí 113Před 21 dnem
Packet Pushers Goes To AutoCon1
Meet Kubenet: Nokia’s Open Source Network Automation Platform
zhlédnutí 419Před 21 dnem
Meet Kubenet: Nokia’s Open Source Network Automation Platform
Itential’s Free torero Is A NetOps Automation Execution Platform
zhlédnutí 111Před 21 dnem
Itential’s Free torero Is A NetOps Automation Execution Platform
IETF’s Network Management Operations (NMOP) Working Group
zhlédnutí 154Před 21 dnem
IETF’s Network Management Operations (NMOP) Working Group
NetBox Labs’ Cloud Free Plan Means Everyone Can Have NetBox-as-a-Service
zhlédnutí 197Před 21 dnem
NetBox Labs’ Cloud Free Plan Means Everyone Can Have NetBox-as-a-Service
IPv6 Basics: Neighbor Discovery
zhlédnutí 224Před 21 dnem
IPv6 Basics: Neighbor Discovery
AI and Total Network Operations with Scott Robohn
zhlédnutí 137Před 28 dny
AI and Total Network Operations with Scott Robohn
Dropping the SBOM: The Software Bill of Materials and Risk Management
zhlédnutí 70Před 28 dny
Dropping the SBOM: The Software Bill of Materials and Risk Management
Down and Dirty with Industrial Wireless
zhlédnutí 67Před 28 dny
Down and Dirty with Industrial Wireless
Greg’s Finale
zhlédnutí 115Před 28 dny
Greg’s Finale
HPE, Nvidia Cozy Up on AI Infrastructure; Norway Uncovers Rare Earth Elements Motherlode
zhlédnutí 125Před měsícem
HPE, Nvidia Cozy Up on AI Infrastructure; Norway Uncovers Rare Earth Elements Motherlode
Performance, Power Efficiency Drive Dutch IXP Upgrade to Nokia Routers, Silicon (Sponsored)
zhlédnutí 35Před měsícem
Performance, Power Efficiency Drive Dutch IXP Upgrade to Nokia Routers, Silicon (Sponsored)

Komentáře

  • @TheRealStevenPolley
    @TheRealStevenPolley Před 29 dny

    RIP in peace

  • @NotaUserIam
    @NotaUserIam Před měsícem

    It’s called Telegraf / Prometheus / Elastic. Building your own is crazy.

  • @MrShayjan
    @MrShayjan Před měsícem

    I will miss "Bad" 👮 Greg grilling Cisco

  • @spoz
    @spoz Před měsícem

    thank you Greg.

  • @ryanmartin8954
    @ryanmartin8954 Před měsícem

    Wish you the best Greg in your next chapter!

  • @MichaelVLang
    @MichaelVLang Před měsícem

    Thanks Greg. Been reading for years. Good luck with your future!

  • @Sator810
    @Sator810 Před měsícem

    The end of an era, take care Greg.

  • @burntdawg
    @burntdawg Před měsícem

    All the best Mr Ferro. Your blog and the podcasts helped get me out of the rut I was in at the start of my career, and for that I am extremely grateful.

  • @nurspass
    @nurspass Před měsícem

    Relly good stuff, thanks

  • @Erikre33
    @Erikre33 Před měsícem

    I dont see how paying 5 times more is beneficial for customers

  • @pldvs
    @pldvs Před měsícem

    Dark information is the best information.

  • @pldvs
    @pldvs Před měsícem

    Think outside the box. if you're interesting enough they're using your power supply for egress. How many frequencies can you nest in a laser? Are you monitoring your local airwaves? Am I crazy, or are you just not that interesting? Check your logs on a Monday? lmao

  • @212helpdesk
    @212helpdesk Před měsícem

    Long time listener but i was on google podcasts which didnt have a section for commenting or like-ing I couldnt fint it atleast.

  • @212helpdesk
    @212helpdesk Před měsícem

    Man i luv Heavy Strategy. Im not sure what that says about me. I like conflict with smart people maybe?

  • @dragonballbw3
    @dragonballbw3 Před 2 měsíci

    I think it would be more of LISP-vxlan than EVPN-LISP... (controlplane-encap) I guess using my logic, pure LISP systems would be LISP-LISP...

    • @dragonballbw3
      @dragonballbw3 Před 2 měsíci

      on a re-listen, I realize Ethan said vxlan-LISP. (encap-control)

  • @HulaNetworksSanJose
    @HulaNetworksSanJose Před 2 měsíci

    Great insights from OpenColo on leveraging Nokia's SR Linux network OS for automating BGP peering! It's impressive to see how SR Linux's robust features enable predictable automations and efficient telemetry ingestion for monitoring and operations.

  • @Douglas_Gillette
    @Douglas_Gillette Před 2 měsíci

    ‘Zero trust’ is marketing propaganda. It is total BS. Authentication and re-authentication at the user level and various system component levels has been around for a very long time.

  • @dragonballbw3
    @dragonballbw3 Před 2 měsíci

    NSX 3.x+ uses NSX-T as its base, so Geneve. "NSX-V" is dead.

  • @richardmccann4815
    @richardmccann4815 Před 2 měsíci

    With american nuclear power plants, a safety check by the NRC found over 100 instances where critical parts ( valves, gauges, switches, etc) had been replaced with cheaper off the shelf, untested, un- certified parts, many of which were critical to safety! And this was not an in-depth examination of the reactor systems, but a look at easily accessible, SAFETY CRUCIAL COMPONENTS! Another plant was found to be directing radioactive water leaking from a 12" pipe flange into a floor drain, with plastic sheeting, secured with some duct tape, to a wooden broom handle! Sure, we could make nuclear powerplants safer, but as long as they are operated by corporations with the bottom dollar in mind, there will never be safety first! And all these wireless sensors and systems would have to be tested to the demanding circumstances of nuclear radiation! A neutron goes thru nearly anything, and gamma rays destroy both cellular structures and electronics. Hardwired systems are the most substantial and abuse resistant. Even robots failed in the high radiation levels at chernobyl and the huge levels at Fukushima, a million Sieverts out side the reactor buildings, and 3 sieverts is a lethal dose! Now plutonium is found on every land mass, and cesium137 is found from surface to the ocean floor! Strontium90 was found in every scottish childs teeth tested along the coast and near the dounreay reprocessing plant!! This will kill all life on earth, the ocean of peace is now nearly sterile! Salmon are decimated, none at all returning in many rivers on the pacific coast, anchovies and squid and feeder fish industry's are shut down!

  • @ivansmith4277
    @ivansmith4277 Před 2 měsíci

    thanks for work - previous video about services very informative

  • @ivansmith4277
    @ivansmith4277 Před 2 měsíci

    great video

  • @niyeamerika
    @niyeamerika Před 2 měsíci

    Thanks a lot for the great content! 🙏

  • @niyeamerika
    @niyeamerika Před 2 měsíci

    Thank you Ethan and Ed. Ethan - for asking great questions, Ed- for giving great answers 😁

  • @racerunner2110
    @racerunner2110 Před 2 měsíci

    This fellow also side hustles as an auctioneer.

  • @HappyHollerz138
    @HappyHollerz138 Před 2 měsíci

    ive seen unwanted shadow hosting without approval. i dont like intrusion its remote and a dozen or so operators, i spoke to watchdog , HLS Nisa Icann and 20 in total aspects cause i dont support terrorism how do you relax this?? im terrified and want no Mitm indecency...🎉😮..Thanks for any feedback

  • @niyeamerika
    @niyeamerika Před 2 měsíci

    Thank you for the great interview/tutorial. I liked this format a lot, when someone asks for clarification of specific things. Thanks a lot.

  • @Peanu7butt3r-Garage
    @Peanu7butt3r-Garage Před 3 měsíci

    Thank for for this short series. It's good to hear it clearly laid out like this.

  • @NotaUserIam
    @NotaUserIam Před 3 měsíci

    Because every vendor is trying to lock us in with their own vendor solution which leaves every organization having to develop their own solution

  • @212helpdesk
    @212helpdesk Před 3 měsíci

    My fav show, heavy strategy!

  • @danieltalkstech22
    @danieltalkstech22 Před 3 měsíci

    Super powerful tool 👏

  • @ChitChat
    @ChitChat Před 3 měsíci

    Ironic. Eric, I just bought your python book earlier today.

    • @NetworkAutomationNerds
      @NetworkAutomationNerds Před 2 měsíci

      Thank you @ChitChat for listening and checking out the book. Let me know if you have any feedbacks on any of the content! 😃

  • @MikeColes
    @MikeColes Před 3 měsíci

    CISA, the sister agency to the TSA. Both are theatrics over substance.

  • @biswajitsadhu3607
    @biswajitsadhu3607 Před 3 měsíci

    In type 2 Seq number is used to identify is the latest one incase the same mac updates comes

  • @yawnyame981
    @yawnyame981 Před 3 měsíci

    This is a fantastic BGP series. Please when will the next set of videos be released? Again thanks a lot Russ White and Packet Pushers

  • @sassynatan
    @sassynatan Před 3 měsíci

    beneš network & butterfly are both 5 stages - but what will be the different ? within them?

  • @icantseethis
    @icantseethis Před 3 měsíci

    Checking back on this, Stability AI may have something to say here.

  • @shenidan2023
    @shenidan2023 Před 3 měsíci

    The biggest problem is people applying with cvs which claim xperience over a massive range of technologies. Many have exposure and are not actual experts. Companies sifting their resumes then make selection choices based on generic keywords due to the volume. Recruitment agencies have the same problem. In the end people who are capable and have not misled people are shafted. Quite how we get found these scumbags is beyond me. Its dog eat dog.

  • @tumwesigyetomson6154
    @tumwesigyetomson6154 Před 4 měsíci

    Thanks so much Ed. You have simplified everything for me. You are the best trainer i have learned from 🥰

  • @DergEnterprises
    @DergEnterprises Před 4 měsíci

    As a long time network/IT guy, I yelled "yes Grerg!" when he pushed back hard on emotional intelligence. Big thumbs up!

  • @abhirupacharya010
    @abhirupacharya010 Před 4 měsíci

    Beautiful explanation. Cleared a ton of my doubts. This praise doesn't just refer to this video; it actually refers to the entire series. Thanks a lot!!

  • @bluestarwars
    @bluestarwars Před 4 měsíci

    Generally helpful and reasonably clear, but at 21:30 when a butterfly topology is shown to be folded and a different view is shown - WHY, of WHY are different colors used (and it even looks like two groups have the same color)? it would be SO much better to keep the same colors in the transition animation.

  • @ryanmartin8954
    @ryanmartin8954 Před 4 měsíci

    As far as the different feature sets baked in (again only focused on Cisco Nexus) - Microburst detection can be useful in some situations. AFD/ETRAP/DPP are all very unique ways to work around being fair to bursty traffic as well as being fair to elephant and mice flows. As far as the gPB telemetry, I've seen a large uptick in this becoming more important. Primarily with the way this data can be used with no CPU overhead to deliver non-sampled full flow records directly to a collector. Built in tools such as Nexus Dashboard Insights can use this data beyond troubleshooting these days to do things like dependency mapping using connectivity analysis allowing you to stitch together security policy based on what's actually happening versus limited logging capabilities of these switches (they are not firewalls and are limited by control plane policing usually). The main problem with telemetry is scale of the collector and Cisco's NDI app is limited to 20,000 flows/sec.

  • @ryanmartin8954
    @ryanmartin8954 Před 4 měsíci

    Some corrections on Cisco's Cloud Scale ASICs (since that is what I primarily work with in ACI mode) - They do not use that additional ASIC to do VXLAN encap/decap with routing. That was one of the main purposes of them developing their own silicon. Only the Gen 1 N9K switches used the Broadcom dual ASIC hack. Regarding store and forward versus cut through, with the N9300 for example, it depends on speed of ingress/egress. Given it's a fabric, this makes the most sense. i.e egress interface is same speed or faster it uses cut through and if there is a CRC error, it has to "stomp" the CRC by changing the frame FCS letting other egress ports know that it has already been forwarded but it has errors. If the ingress interface is slower than egress, it defaults to store and forward. I imagine this is the opposite of what you described in relation to speed mismatch. In this case it seems they are smoothing out the difference in signal rate on egress by using the buffer. This of course is different than congestion-related speed mismatch.

  • @uendarkarplips7263
    @uendarkarplips7263 Před 4 měsíci

    Companies need penalties when they get breached. Today they sweep it under the rug, and give everyone credit monitoring.

  • @Douglas_Gillette
    @Douglas_Gillette Před 4 měsíci

    Being certified no longer means being capable. SANS can not be trusted because they are in the business of certifying. Their interest is not in growing skills and helping people become capable but being certified.

  • @dragonballbw3
    @dragonballbw3 Před 5 měsíci

    Kubevirt? Obvious advantage is that you get Kubernetes networking (NSX replacement).

  • @jaafarbalaghi9012
    @jaafarbalaghi9012 Před 5 měsíci

    Very useful information. Thanks a lot.

  • @I4get42
    @I4get42 Před 5 měsíci

    Great discussion y'all! Thanks for sharing your insights on what is to come 🙂

  • @ricardovarela8547
    @ricardovarela8547 Před 5 měsíci

    Great explanation!

  • @ricardovarela8547
    @ricardovarela8547 Před 5 měsíci

    Great content and thanks for sharing. I would suggest slow down a little bit, it is difficult to see the result of the playbooks specially when you are new to Ansible