Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
The Packet Pushers Podcast Network includes a lot of smart listeners. Sometimes, they want to try podcasting. This is where those new podcast ideas hatch! Have a listen to the voice of the IT community.
…
continue reading
IT professional finding your job description changing? More and more tech added to your plate? You're not alone! Have a listen to these IT pros tell their stories about becoming full stack engineers.
…
continue reading
1
HS116: Nth-Party Risk May Put You on the (Block) Chain Gang
32:57
32:57
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:57The evolution of the modern, Internet-driven economy has created the conditions for essentially unbounded Nth-party risks (that is, risks from your suppliers, and risks from your suppliers’ suppliers, and risks from your suppliers’ suppliers’ suppliers, ad infinitum). Nth party risks exist in public clouds, SaaS, software and hardware supply chains…
…
continue reading
1
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
44:39
44:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
44:39Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
…
continue reading
1
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
44:39
44:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
44:39Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
…
continue reading
1
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone
28:59
28:59
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
28:59Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »…
…
continue reading
1
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone
28:59
28:59
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
28:59Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »…
…
continue reading
1
HN804: How Prisma SASE Builds on Public Clouds for Scale, Resiliency (Sponsored)
56:07
56:07
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
56:07How do you architect a Secure Access Service Edge (SASE) to provide critical security services to millions of endpoints distributed across the planet? How do you build such a service for scale, performance, and resiliency? One option is to build your own PoPs or use colocation facilities, run your own infrastructure stack, and connect everything...…
…
continue reading
1
HN804: How Prisma SASE Builds on Public Clouds for Scale, Resiliency (Sponsored)
56:07
56:07
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
56:07How do you architect a Secure Access Service Edge (SASE) to provide critical security services to millions of endpoints distributed across the planet? How do you build such a service for scale, performance, and resiliency? One option is to build your own PoPs or use colocation facilities, run your own infrastructure stack, and connect everything...…
…
continue reading
1
TNO049: Automated Network Testing and Validation
52:50
52:50
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
52:50What does network testing and validation really mean? How do testing and validation fit within an automation workflow? Is it possible to run meaningful tests without coding skills? Dan Wade from BlueAlly answers these questions and offers practical insights into building trust in automation through test environments, using AI for ideation and probl…
…
continue reading
1
TNO049: Automated Network Testing and Validation
52:50
52:50
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
52:50What does network testing and validation really mean? How do testing and validation fit within an automation workflow? Is it possible to run meaningful tests without coding skills? Dan Wade from BlueAlly answers these questions and offers practical insights into building trust in automation through test environments, using AI for ideation and probl…
…
continue reading