- 639
- 537 366
Packet Pushers
United States
Registrace 25. 05. 2016
You want real-world, deep-dive, hands-on IT info? You’ll find it on Packet Pushers.
🎧️Listen to our networking & tech podcasts to help grow your IT knowledge-and your career.
📺️Watch our tutorial videos and product demos to take your hands-on skills to the next level.
🗒️ Catch how-to articles, industry news, and career advice on the blog to stay on top of a constantly changing tech industry.
✉️Read our weekly Human Infrastructure newsletter on the human side of working in IT. Why? Because you need maintenance too.
🎧️Listen to our networking & tech podcasts to help grow your IT knowledge-and your career.
📺️Watch our tutorial videos and product demos to take your hands-on skills to the next level.
🗒️ Catch how-to articles, industry news, and career advice on the blog to stay on top of a constantly changing tech industry.
✉️Read our weekly Human Infrastructure newsletter on the human side of working in IT. Why? Because you need maintenance too.
Chocolate or Carrots? How Humor Can Foster Good DevOps Relationships
Guests Ashish and Shilpi from the Cloud Security Podcast converse with Ned and Kyler on how humor and relatability can foster an engaging and collaborative environment in DevOps. The conversation also covers the importance of foundational knowledge in technology, the impact of AI on careers, and the value of just being human and learning from mistakes.
Cloud Security Podcast - www.cloudsecuritypodcast.tv/about
Cloud Security Podcast on LinkedIn - www.linkedin.com/company/cloud-security-podcast/
Cloud security podcast - Kelsey Hightower - czcams.com/video/44FW-Kw9ARI/video.html
Day Two DevOps is part of the Packet Pushers network. Visit our website to find more great networking and technology podcasts, along with tutorial videos, the Human Infrastructure newsletter, and loads more resources for building your IT career. packetpushers.net
Cloud Security Podcast - www.cloudsecuritypodcast.tv/about
Cloud Security Podcast on LinkedIn - www.linkedin.com/company/cloud-security-podcast/
Cloud security podcast - Kelsey Hightower - czcams.com/video/44FW-Kw9ARI/video.html
Day Two DevOps is part of the Packet Pushers network. Visit our website to find more great networking and technology podcasts, along with tutorial videos, the Human Infrastructure newsletter, and loads more resources for building your IT career. packetpushers.net
zhlédnutí: 14
Video
Wi-Fi Security Part 1 - Unpacking Vulnerabilities and Exploits
zhlédnutí 48Před 2 hodinami
From an SSID confusion exploit to a RADIUS attack to a critical vulnerability in a Windows Wi-Fi driver, the past several months have seen multiple attacks and exploits targeting the wireless realm. On today’s Packet Protector podcast we talk with Wi-Fi security expert Stephen Orr to get his take on the severity of these issues, remediation options, and efforts by the wireless industry to balan...
Is It Time To Dump Microsoft?
zhlédnutí 89Před 2 hodinami
Should enterprises ditch Microsoft because of security concerns? Microsoft's numerous vulnerabilities and questionable responses make it a significant risk for continued use. At the same time, Microsoft's strong integration and utility in enterprise environments make it attractive for continued use. Johna Till Johnson and John Burke debate. They also weigh considerations including the challenge...
Prioritizing and Managing IoT/OT Vulnerabilities with Palo Alto Networks (Sponsored)
zhlédnutí 78Před 4 hodinami
Today on the Tech Bytes podcast we discuss vulnerability management for IoT and OTT devices with sponsor Palo Alto Networks. These devices-think video cameras, sensors, medical equipment, industrial control systems, and so on-present unique challenges when it comes to finding, prioritizing, and managing software vulnerabilities. Palo Alto Networks' machine learning-based solutions offer visibil...
The BSODs Strike Back; SolarWinds Sorta Dodges SEC Bullets
zhlédnutí 88Před 4 hodinami
Take a Network Break! This week we cover the CrowdStrike/Microsoft patch debacle, why SolarWinds isn't entirely out of trouble following a judge's dismissal of most but not all of an SEC lawsuit, and why an AT&T breach revelation highlights third-party risk. Juniper announces an AI infrastructure testing lab and enhancements to its capabilities to operate AI infrastructure, AMD acquires an AI l...
TL000: Announcing Technically Leadership, a New Podcast for the Next Phase of Your Career
zhlédnutí 70Před 12 hodinami
Technically Leadership is a brand new podcast on the Packet Pushers network. Host Laura Santamaria explores leadership in the tech industry, with conversations and insights to help you development your management skills. Whether you’re considering your first management role or you’re an experienced manager working your way to the C-suite, this podcast is for you. Episode one will be released Ju...
History of Networking: How Bridging Saved Ethernet
zhlédnutí 184Před dnem
Ready to take a trip back to the 1980’s and learn some networking history? We talk with Alan Kirby, who was there forty years ago when the first Ethernet bridge was created at Digital Equipment Corporation (DEC). He explains the story of why and how it came to be. We discuss how Ethernet compared to competing protocols in use at the time, why Alan and colleagues decided to build a prototype Eth...
Operational Considerations: DHCP vs DHCPv6
zhlédnutí 111Před dnem
What are the operational considerations and differences between DHCP and DHCPv6? In today’s episode we explore the implications for network management, security, and operational models. We also discuss the challenges of DHCPv6 failover, high availability, complex device tracking and identity management in various environments. Scott’s Infoblox IPv6 CoE blog post - blogs.infoblox.com/ipv6-coe/dh...
Is Cloud Networking the Future for Network Engineers?
zhlédnutí 275Před 14 dny
On today's episode, host Eric Chou and guest Kyler Middleton discuss the transition from on-prem network engineering to cloud networking; the importance of adapting to new platforms such as AWS, Azure, and Terraform; and the future of cloud versus on-premises solutions. We also discuss Kyler's background, navigating the journey from a farm upbringing to a career in technology, with an emphasis ...
Inside an Equipment Test Lab
zhlédnutí 63Před 14 dny
Third-party test labs can help buyers make decisions about which products to purchase. While a testing lab can’t mimic the conditions of your specific production environment, it can assess a product’s fundamental capabilities and measure throughput, performance, and-in the case of security devices-effectiveness against a test suite of malware or attack techniques. On today’s episode we talk wit...
Wi-Fi Surveys - Past, Present & Future
zhlédnutí 87Před 14 dny
The evolution of wireless surveys is the topic of today’s Heavy Wireless podcast with guest Jussi Kivineimi of Hamina. We cover the transition from traditional on-site assessments to predictive tools, with an emphasis on the importance of a hybrid approach for accurate network design. We also tackle the role of APIs in network design, the potential of AP-to-AP communication for visualizing RF d...
Tech Bytes: High Performance, Scalable Object Storage with MinIO (Sponsored)
zhlédnutí 31Před 14 dny
Today on the Tech Bytes podcast we talk with Jonathan Symonds, Chief Marketing Officer at MinIO about MinIO's object storage offering; a software-defined, Amazon S3-compatible object storage that offers high performance and scale for modern workloads and AI/ML. We discuss how MinIO helps customers across industries drive AI innovation and AI architectures, how object storage is changing the lan...
NB486: Chrome Ditches Entrust Certs; Do AI Stocks Mirror the DotCom Bubble?
zhlédnutí 65Před 14 dny
Take a Network Break! This week we cover why the Google Chrome browser won't trust a set of Entrust digital certificates come November and what you should do about it, an emergency security patch from Juniper, and the reasons why France's Competition Authority is scrutinizing Nvidia. A roaming provider in the EU says a massive outage wasn't its fault, chipmaker SK Hynix pledges billions in AI i...
Can Service Level Objectives (SLOs) Help Keep Users Happy?
zhlédnutí 47Před 21 dnem
Service Level Objectives (SLOs) are a set of reliability measurements for customer or user expectations of services; in other words, are people having a good experience with your application or service? Today’s Day Two Cloud explores SLOs, the relevant metrics, and how to measure them. We also talk about how SLOs are a cross-discipline objective (that is, not just one team’s responsibility), th...
Critical Vulnerabilities, AI-Assisted Scams, Compromised VPNs, and More Security News
zhlédnutí 88Před 21 dnem
It's an all-news episode for this week's Packet Protector podcast. We cover critical vulnerabilities in the MOVEit file transfer software and in thousands of ASUS routers, and a remote code execution vulnerability in a Windows wireless driver that you really should patch. We discuss a Wall Street Journal article about how AI tools are helping scammers get better at scamming, a warning from Dutc...
Should IT Lead Or Follow The Business?
zhlédnutí 81Před 21 dnem
Should IT Lead Or Follow The Business?
Tech Bytes: Why SD-WAN is the Secret to SASE Success (Sponsored)
zhlédnutí 78Před 21 dnem
Tech Bytes: Why SD-WAN is the Secret to SASE Success (Sponsored)
Meet Kubenet: Nokia’s Open Source Network Automation Platform
zhlédnutí 419Před 21 dnem
Meet Kubenet: Nokia’s Open Source Network Automation Platform
Itential’s Free torero Is A NetOps Automation Execution Platform
zhlédnutí 111Před 21 dnem
Itential’s Free torero Is A NetOps Automation Execution Platform
IETF’s Network Management Operations (NMOP) Working Group
zhlédnutí 154Před 21 dnem
IETF’s Network Management Operations (NMOP) Working Group
NetBox Labs’ Cloud Free Plan Means Everyone Can Have NetBox-as-a-Service
zhlédnutí 197Před 21 dnem
NetBox Labs’ Cloud Free Plan Means Everyone Can Have NetBox-as-a-Service
AI and Total Network Operations with Scott Robohn
zhlédnutí 137Před 28 dny
AI and Total Network Operations with Scott Robohn
Dropping the SBOM: The Software Bill of Materials and Risk Management
zhlédnutí 70Před 28 dny
Dropping the SBOM: The Software Bill of Materials and Risk Management
Down and Dirty with Industrial Wireless
zhlédnutí 67Před 28 dny
Down and Dirty with Industrial Wireless
HPE, Nvidia Cozy Up on AI Infrastructure; Norway Uncovers Rare Earth Elements Motherlode
zhlédnutí 125Před měsícem
HPE, Nvidia Cozy Up on AI Infrastructure; Norway Uncovers Rare Earth Elements Motherlode
Performance, Power Efficiency Drive Dutch IXP Upgrade to Nokia Routers, Silicon (Sponsored)
zhlédnutí 35Před měsícem
Performance, Power Efficiency Drive Dutch IXP Upgrade to Nokia Routers, Silicon (Sponsored)
RIP in peace
It’s called Telegraf / Prometheus / Elastic. Building your own is crazy.
I will miss "Bad" 👮 Greg grilling Cisco
thank you Greg.
Wish you the best Greg in your next chapter!
Thanks Greg. Been reading for years. Good luck with your future!
The end of an era, take care Greg.
All the best Mr Ferro. Your blog and the podcasts helped get me out of the rut I was in at the start of my career, and for that I am extremely grateful.
Relly good stuff, thanks
I dont see how paying 5 times more is beneficial for customers
Dark information is the best information.
Think outside the box. if you're interesting enough they're using your power supply for egress. How many frequencies can you nest in a laser? Are you monitoring your local airwaves? Am I crazy, or are you just not that interesting? Check your logs on a Monday? lmao
Long time listener but i was on google podcasts which didnt have a section for commenting or like-ing I couldnt fint it atleast.
Man i luv Heavy Strategy. Im not sure what that says about me. I like conflict with smart people maybe?
I think it would be more of LISP-vxlan than EVPN-LISP... (controlplane-encap) I guess using my logic, pure LISP systems would be LISP-LISP...
on a re-listen, I realize Ethan said vxlan-LISP. (encap-control)
Great insights from OpenColo on leveraging Nokia's SR Linux network OS for automating BGP peering! It's impressive to see how SR Linux's robust features enable predictable automations and efficient telemetry ingestion for monitoring and operations.
‘Zero trust’ is marketing propaganda. It is total BS. Authentication and re-authentication at the user level and various system component levels has been around for a very long time.
NSX 3.x+ uses NSX-T as its base, so Geneve. "NSX-V" is dead.
With american nuclear power plants, a safety check by the NRC found over 100 instances where critical parts ( valves, gauges, switches, etc) had been replaced with cheaper off the shelf, untested, un- certified parts, many of which were critical to safety! And this was not an in-depth examination of the reactor systems, but a look at easily accessible, SAFETY CRUCIAL COMPONENTS! Another plant was found to be directing radioactive water leaking from a 12" pipe flange into a floor drain, with plastic sheeting, secured with some duct tape, to a wooden broom handle! Sure, we could make nuclear powerplants safer, but as long as they are operated by corporations with the bottom dollar in mind, there will never be safety first! And all these wireless sensors and systems would have to be tested to the demanding circumstances of nuclear radiation! A neutron goes thru nearly anything, and gamma rays destroy both cellular structures and electronics. Hardwired systems are the most substantial and abuse resistant. Even robots failed in the high radiation levels at chernobyl and the huge levels at Fukushima, a million Sieverts out side the reactor buildings, and 3 sieverts is a lethal dose! Now plutonium is found on every land mass, and cesium137 is found from surface to the ocean floor! Strontium90 was found in every scottish childs teeth tested along the coast and near the dounreay reprocessing plant!! This will kill all life on earth, the ocean of peace is now nearly sterile! Salmon are decimated, none at all returning in many rivers on the pacific coast, anchovies and squid and feeder fish industry's are shut down!
thanks for work - previous video about services very informative
great video
Thanks a lot for the great content! 🙏
Thank you Ethan and Ed. Ethan - for asking great questions, Ed- for giving great answers 😁
This fellow also side hustles as an auctioneer.
ive seen unwanted shadow hosting without approval. i dont like intrusion its remote and a dozen or so operators, i spoke to watchdog , HLS Nisa Icann and 20 in total aspects cause i dont support terrorism how do you relax this?? im terrified and want no Mitm indecency...🎉😮..Thanks for any feedback
Thank you for the great interview/tutorial. I liked this format a lot, when someone asks for clarification of specific things. Thanks a lot.
Thank for for this short series. It's good to hear it clearly laid out like this.
Because every vendor is trying to lock us in with their own vendor solution which leaves every organization having to develop their own solution
My fav show, heavy strategy!
Super powerful tool 👏
Ironic. Eric, I just bought your python book earlier today.
Thank you @ChitChat for listening and checking out the book. Let me know if you have any feedbacks on any of the content! 😃
CISA, the sister agency to the TSA. Both are theatrics over substance.
In type 2 Seq number is used to identify is the latest one incase the same mac updates comes
This is a fantastic BGP series. Please when will the next set of videos be released? Again thanks a lot Russ White and Packet Pushers
beneš network & butterfly are both 5 stages - but what will be the different ? within them?
Checking back on this, Stability AI may have something to say here.
The biggest problem is people applying with cvs which claim xperience over a massive range of technologies. Many have exposure and are not actual experts. Companies sifting their resumes then make selection choices based on generic keywords due to the volume. Recruitment agencies have the same problem. In the end people who are capable and have not misled people are shafted. Quite how we get found these scumbags is beyond me. Its dog eat dog.
Thanks so much Ed. You have simplified everything for me. You are the best trainer i have learned from 🥰
As a long time network/IT guy, I yelled "yes Grerg!" when he pushed back hard on emotional intelligence. Big thumbs up!
Beautiful explanation. Cleared a ton of my doubts. This praise doesn't just refer to this video; it actually refers to the entire series. Thanks a lot!!
Generally helpful and reasonably clear, but at 21:30 when a butterfly topology is shown to be folded and a different view is shown - WHY, of WHY are different colors used (and it even looks like two groups have the same color)? it would be SO much better to keep the same colors in the transition animation.
As far as the different feature sets baked in (again only focused on Cisco Nexus) - Microburst detection can be useful in some situations. AFD/ETRAP/DPP are all very unique ways to work around being fair to bursty traffic as well as being fair to elephant and mice flows. As far as the gPB telemetry, I've seen a large uptick in this becoming more important. Primarily with the way this data can be used with no CPU overhead to deliver non-sampled full flow records directly to a collector. Built in tools such as Nexus Dashboard Insights can use this data beyond troubleshooting these days to do things like dependency mapping using connectivity analysis allowing you to stitch together security policy based on what's actually happening versus limited logging capabilities of these switches (they are not firewalls and are limited by control plane policing usually). The main problem with telemetry is scale of the collector and Cisco's NDI app is limited to 20,000 flows/sec.
Some corrections on Cisco's Cloud Scale ASICs (since that is what I primarily work with in ACI mode) - They do not use that additional ASIC to do VXLAN encap/decap with routing. That was one of the main purposes of them developing their own silicon. Only the Gen 1 N9K switches used the Broadcom dual ASIC hack. Regarding store and forward versus cut through, with the N9300 for example, it depends on speed of ingress/egress. Given it's a fabric, this makes the most sense. i.e egress interface is same speed or faster it uses cut through and if there is a CRC error, it has to "stomp" the CRC by changing the frame FCS letting other egress ports know that it has already been forwarded but it has errors. If the ingress interface is slower than egress, it defaults to store and forward. I imagine this is the opposite of what you described in relation to speed mismatch. In this case it seems they are smoothing out the difference in signal rate on egress by using the buffer. This of course is different than congestion-related speed mismatch.
Companies need penalties when they get breached. Today they sweep it under the rug, and give everyone credit monitoring.
Being certified no longer means being capable. SANS can not be trusted because they are in the business of certifying. Their interest is not in growing skills and helping people become capable but being certified.
Kubevirt? Obvious advantage is that you get Kubernetes networking (NSX replacement).
Very useful information. Thanks a lot.
Great discussion y'all! Thanks for sharing your insights on what is to come 🙂
Great explanation!
Great content and thanks for sharing. I would suggest slow down a little bit, it is difficult to see the result of the playbooks specially when you are new to Ansible