Podcast Episodes
Back to SearchN4N037: IPsec Basics
It’s time to talk crypto. No, not the Bitcoin kind. Ethan and Holly introduce the basics of IPsec, the protocol that authenticates and encrypts traff…
5 months, 4 weeks ago
D2DO280: Architect for Your AI Success With F5 and MinIO (Sponsored)
In the changing landscape of AI data infrastructure, F5 and MinIO are partnering on a solution that brings together the best of each company. This so…
5 months, 4 weeks ago
HW059: Pi to Go: Introducing the WLAN Pi Go
The new WLAN Pi Go is small, lightweight Wi-Fi testing tool. It can sniff Wi-Fi frames, measure signals, decode packets, and more. The tool snaps to …
6 months ago
NB540: PQE In PAN-OS; FBI Warns 7-Year Old Cisco Bug Under Attack
Take a Network Break! We double-dip on red alerts as the FBI warns that Russian state hackers are targeting a seven-year-old vulnerability on Cisco I…
6 months ago
Tech Bytes: Palo Alto Networks Advances DNS Security with ADNSR (Sponsored)
DNS security is our topic on today’s Tech Bytes podcast, sponsored by Palo Alto Networks. Specifically, Palo Alto Networks is here to talk about its …
6 months ago
HN793: A Deep Dive Into High-Performance Switch Memory
Today’s episode is all about high-performance memory in switches. We dig into the differences among TCAM, SRAM, DRAM, and HBM, and all the complex tr…
6 months ago
TNO039: Demystifying AI Adoption for Networkers (Sponsored)
On today’s Total Network Operations we talk through the adoption of AI in network operations with John Capobianco, Head of DevRel at Selector. Select…
6 months ago
NAN098: Democratizing the Learning Environment for Network Engineers
Democratizing the learning environment is a passion for Deepak Ahuja. So much so, he founded CloudMyLab, a company that provides hands-on, cloud-bas…
6 months ago
TCG056: Network Automation Reality Check with Ivan Pepelnjak
In this unplanned and unfiltered conversation, we dive deep into network automation realities with Ivan Pepelnjak, networking’s long standing and ind…
6 months ago
PP075: Kernel Vs. User Mode In Endpoint Security Software
Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security…
6 months, 1 week ago