Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Bgp Podcasts

show episodes
 
Artwork

1
Cables2Clouds

Cables2Clouds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
  continue reading
 
Artwork

1
The Black & Gold Podcast

The Black & Gold Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
If you're passionate about App State football and App State sports then you'll love The Black & Gold Podcast. Your hosts, AJ and Big C, are alumni that are passionate about all things Appalachian State. With a new episode every Wednesday, you'll be able to keep up with App State's on field performance and anything else that's going on off the field that you need to know about. From a recap of the previous game, a preview of the next game and everything in between, for fans of App State, The ...
  continue reading
 
Big Girl Pants Podcast is a podcast that highlights real people, living real life. It's not all the time that we get one on one conversations with our closest friends. BGP offers perspectives from all walks of life. Health, Fitness, Mental Health, Parenting, Entrepreneurship, and all the struggles in between. We are all people trying to figure it out - join me as I try, one conversation at at time!
  continue reading
 
Artwork

1
Business German Podcast

Peter H Bloecker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast BUSINESS GERMAN will teach you more than surviving in a German office or company. My episodes focus on authentic German to keep you motivated and updated. I am introducing information and will link with selected websites of my choice to guide you online into the German Language and Culture and Life from an intercultural approach. My main focus will be sites plus podcasts of GERMAN MEDIA. BGP published by your Coach of German Peter H Bloecker @peblogger https://bloeckerblog.com C ...
  continue reading
 
The Bullock Garden Project, Inc. (or BGP) is a nonprofit organization dedicated to helping schools and organizations grow gardens & garden-based learning programs for children. We’ll be chatting about our journey from non-gardeners to nonprofit and having tons of laughs while we do it! Support this podcast: https://podcasters.spotify.com/pod/show/the-bullock-garden-inc/support
  continue reading
 
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork
 
This is The Internet Report, a podcast uncovering what’s working and what’s breaking on the Internet—and why. Tune in to hear ThousandEyes’ Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more.
  continue reading
 
The Art of Network Engineering blends technical insight with real-world stories from engineers, innovators, and IT pros. From data centers on cruise ships to rockets in space, we explore the people, tools, and trends shaping the future of networking, while keeping it authentic, practical, and human. We tell the human stories behind network engineering so every engineer feels seen, supported, and inspired to grow in a rapidly changing industry. For more information, check out https://linktr.e ...
  continue reading
 
The Blockchain Gaming Podcast is a podcast hosted by "E" with a mission to spread information about games being built on top of blockchains and the streamers who play them. The podcast is brought to you by Rooks and Queens, a fashion and lifestyle brand for gamers by gamers. To learn more visit www.rqcollective.io
  continue reading
 
Artwork

1
Bits And Specs

Bits & Specs Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to Bits and Specs — the podcast that decodes the internet’s building blocks, one protocol at a time. Each week, we take you beyond the jargon and into the real-world stories behind RFCs, standards, and the specs that quietly run our digital lives. Whether you’re a seasoned engineer or just curious how the web actually works, we break down the bits, the bytes, and the brilliance behind the specs shaping our connected world.
  continue reading
 
Bestselling author and bloggers, David de las Morenas (HowToBeast.com) and Dave Perrotta (PostgradCasanova.com) team up each week to share insights on how to get men unstuck and reach their potential in all areas of life. David and Dave interview experts in: self improvement, dating, sex, relationships, fitness and entrepreneurship to help you to “level up” and embrace the beastly gentleman lifestyle. Guests include: James Altucher, Hal Elrod, Andrew Ferebee and Christian McQueen.
  continue reading
 
Loading …
show series
 
Could a single BGP trick really break the internet? A new “BGP Vortex” claim says yes - by abusing route oscillation and BGP communities to trigger endless update loops and exhaust router CPU. So we check what actually holds up in the real world. In this Threat Talks Deep Dive, Rob Maas, Field CTO at ON2IT, sits down with Eric Nghia Nguyen Duy, Net…
  continue reading
 
Offers an extensive guide to implementing VXLAN BGP EVPN fabrics, focusing heavily on the spine-and-leaf architecture in data center networking. It details the logical and physical components necessary for fabric creation, including the configuration of the underlay network using protocols like OSPF and IS-IS, and establishing the overlay network w…
  continue reading
 
A comprehensive guide for developing web, cloud, and microservices applications using Java MVC. It introduces the fundamental Model-View-Controller (MVC) design pattern, tracing its history and adaptation for web applications, especially within the Java EE/Jakarta EE ecosystem utilizing JSR-371. The text covers practical aspects of setting up a dev…
  continue reading
 
Focusing on practical applications of machine learning (ML) within the Amazon Web Services ecosystem. The content systematically covers the exam syllabus, starting with ML fundamentals like modeling pipelines, supervised and unsupervised learning, and data splitting strategies to prevent overfitting and underfitting. It then details various AWS ser…
  continue reading
 
A comprehensive guide for designing and developing enterprise Python code. It covers a vast array of topics, including best practices for code structure and quality (e.g., commenting, naming conventions, and PEP 8), effective use of Python data structures (lists, dictionaries, sets, and tuples), and object-oriented programming concepts (classes, in…
  continue reading
 
Detailing the configuration and use of Traefik as an API gateway in a microservices environment. The text explains the shift from monolithic to microservices architecture and the need for dynamic gateway solutions like Traefik, which offers features such as load balancing (Round Robin, Weighted Round Robin, Mirroring) for HTTP, TCP, and UDP traffic…
  continue reading
 
Dig into recent outages at Cloudflare and Venmo, and the growing challenge of maintaining reliability and resilience in a world of increasingly interdependent Internet infrastructure. ——— CHAPTERS 00:00 Intro 00:50 Cloudflare Outage 06:54 Venmo Outage 12:01 The Challenge of Layered Dependencies 13:36 Outage Trends: By the Numbers 15:28 Get in Touch…
  continue reading
 
An extensive overview of systems analysis and design, primarily focusing on the tenth edition of a textbook on the subject, likely by Kendall and Kendall. The content comprehensively covers the phases of the systems development life cycle (SDLC), including project management techniques such as feasibility analysis, PERT diagrams, and various conver…
  continue reading
 
A detailed overview of the various phases, concepts, and tools involved in the Systems Development Life Cycle (SDLC). The text covers organizational topics such as the role and required skills of a systems analyst, the structure of the IT department, and strategic planning, including cost-benefit analysis and feasibility studies. It extensively exp…
  continue reading
 
Send us a text A bus-powered hackathon, a $100K prize for a gloriously “useless” app, and keynotes that said AI so many times you could turn it into a supercut—re:Invent 2025 brought energy, irony, and real signals hiding in the noise. We’re joined by AWS Hero Chris Williams to unpack what actually matters: where AI is genuinely useful, where it’s …
  continue reading
 
Send us a text Most network engineers know BGP, OSPF, and maybe EIGRP, but far fewer have hands-on experience with ISIS. In this episode of The Art of Network Engineering, Andy Lapteff sits down with Russ White and Mike Bushong for a deep, opinionated, and refreshingly honest discussion about routing protocol design in modern data centers. We explo…
  continue reading
 
An extensive guide to computer hacking for beginners, detailing various types of hackers, including Black Hat, White Hat, and Grey Hat practitioners. It thoroughly explains the most popular hacking technique, social engineering, outlining different forms such as Phishing, Impersonation, Vishing, and Smishing, which exploit human vulnerabilities. Fu…
  continue reading
 
Attackers are abusing a WSUS flaw - Microsoft’s Windows Server Update Services - to detonate PowerCat, spawn reverse shells, and plant ShadowPad. All from the update server your entire Windows estate trusts by default. One weak crypto key and a broken deserialization function let attackers hit your WSUS server with unauthenticated SYSTEM-level code…
  continue reading
 
A comprehensive technical overview of synchronization and timing solutions within telecommunications, with a specific focus on 4G and 5G mobile networks. It explores the historical necessity of synchronization, progressing from frequency alignment for digital networks to the modern requirement for phase and time synchronization driven by mobile bas…
  continue reading
 
An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
  continue reading
 
A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
  continue reading
 
A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
  continue reading
 
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
  continue reading
 
The first IPv6 specs were published in 1995, and yet 30 years later, we still have a pretty active IETF working group focused on “developing guidelines for the deployment and operation of new and existing IPv6 networks.” (taken from the old charter; they updated it in late October 2025). Why is it taking so long, and what problems are they trying t…
  continue reading
 
An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM …
  continue reading
 
An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framework for developing security architectures, and explains how it guides the entire process from contextual business requirements to operational security. The text covers critical concepts like risk manage…
  continue reading
 
It was built to secure service accounts. Instead, it became the cleanest privilege-escalation vector of 2025. They called it Bad Successor (A.K.A. CVE-2025-53779). A new “secure by design” feature in Windows Server 2025 -DMSA -was supposed to fix service account hygiene. Instead, it introduced a loophole where attackers could claim successor status…
  continue reading
 
An extensive overview of digital literacy and technology, covering a broad range of topics from basic computer and smartphone functionality to advanced internet applications. It introduces fundamental concepts of hardware and software, then expands into practical usage of online services like email, social media, digital maps, and e-commerce. The t…
  continue reading
 
A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learning. Published in 2021, it aims to clarify the logic and mechanisms behind these concepts for data scientists, acting as a non-linear reference for both beginners and experienced practitioners. The guid…
  continue reading
 
A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availability), various cybercrime types (phishing, ransomware), and the five phases of a breach (research, intrusion, lateral movement, privilege escalation, exfiltration). It further explores the impact of the…
  continue reading
 
A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers detailed strategies for interview preparation, including how to approach problems, optimize solutions, and understand time and space complexity (Big O notation). The text provides interview-specific ad…
  continue reading
 
Tune in for a deep dive into the November 18 Cloudflare outage that impacted multiple services including X, OpenAI, and Anthropic—and explore key takeaways for ITOps teams. For insights on the other recent outage that Cloudflare experienced on December 5, see this blog post: https://www.thousandeyes.com/blog/cloudflare-outage-analysis-december-5-20…
  continue reading
 
A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and network layers, alongside detailed examples of various networks like the Internet (including ARPANET's history and evolution of traffic), mobile phone networks (1G-5G), and wireless LANs (IEEE 802.11). …
  continue reading
 
A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text covers a broad range of topics, including the basics of hard drives and storage media, various data hiding techniques like encryption and steganography, and the identification and handling of hostile code …
  continue reading
 
What if your next great cyber defender is a teenager gaming in their bedroom right now? In this Threat Talks episode, Lieuwe Jan Koning and former FBI Supervisory Special Agent William McKean (founder of The Redirect Project) explore how young digital natives go From Hacker to Hero. They chart the journey from gaming and online communities to risky…
  continue reading
 
Send us a text We break down Cloudflare’s outage, why a small config change caused big waves, and what better guardrails could look like. We then unpack AWS and Google’s cross‑cloud link, Megaport’s move into bare metal and GPUs, Webex adding deepfake defenses, and a new startup aiming to tune AI networks at microsecond speed. • Cloudflare outage r…
  continue reading
 
Send us a text In this special on-location episode of The Art of Network Engineering, Andy Lapteff sits down in person with Kevin Myers for a conversation that pulls no punches. Kevin brings decades of service provider and whitebox experience to the table as the two dive deep into one of networking’s most complex decisions: how to choose the right …
  continue reading
 
A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professionals. They detail social engineering techniques like phishing, vishing, smishing, and physical exploits such as dumpster diving and badge cloning. The sources also explore different penetration test scope…
  continue reading
 
Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing, including processes, risk management, business resilience, and security controls, with a focus on preparing candidates for the CISA exam through key concepts and self-assessment questions. The text a…
  continue reading
 
A preparation guide for Certified Ethical Hacker (CEH) certification, focusing on a wide array of cybersecurity topics. It covers fundamental concepts such as ethical hacking, vulnerabilities, and types of attacks, moving into practical methodologies like footprinting, network scanning, and enumeration. The guide also details various malicious soft…
  continue reading
 
Focusing on cybersecurity defense through the lens of offensive security. The material covers the evolution of cybersecurity practices, critiques the traditional passive and reactive defense posture, and advocates for an "Active Defender" mindset, which involves understanding and leveraging attacker methodologies, tools, and the hacker mentality. K…
  continue reading
 
Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, draws on over two decades of experience to argue that success hinges on cultivating strong relationships and ensuring alignment with the company's risk tolerance, as most organizations are indifferent …
  continue reading
 
Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Controls Matrix (CCM), an industry-specific framework developed by the Cloud Security Alliance (CSA), which is used to assess security and compliance across various cloud service models like IaaS, PaaS, and…
  continue reading
 
Explains the nature of cybercrime and the three primary levels of the internet: the Surface Web, Deep Web, and Dark Web. A significant portion of the material details the major criminal activities found on the Dark Web, including drug trafficking, child pornography, human trafficking, and cyberterrorism. Finally, the excerpts examine the various to…
  continue reading
 
Appalachian State legend Jason Hunter has had a storied career in the black and gold. He scored one of the most important touchdowns in program history that led to the first ever national championship for the Mountaineers. He also had a very successful career in the NFL. Jason Hunter a.k.a. Sticks joins us for an episode covering his illustrious ca…
  continue reading
 
Serves as an in-depth textbook resource, outlining the foundational concepts of cybersecurity, beginning with definitions of data, information, and networking. It extensively covers the history and evolution of cybercrime, categorizing various malicious activities like phishing, spoofing, and different types of DDoS attacks. Furthermore, the text e…
  continue reading
 
The world’s biggest open-source ecosystem - npm - faced its first self-spreading worm. They called it Shai Hulud. It didn’t just infect one package. It infected developers themselves. When a maintainer got phished, the worm harvested credentials, hijacked tokens, and created new CI/CD workflows to keep spreading - automatically. No command-and-cont…
  continue reading
 
Focusing on Ad Hoc Networks and utilizing the ns-3 simulator. The material covers both the theoretical and practical aspects of simulation, including the formal definition and characteristics of Mobile Ad Hoc Networks (MANETs), various wireless communication technologies (like IoT and Mobile Clouds), and the methodology for designing and analyzing …
  continue reading
 
A technical resource aimed at IT engineers looking to utilize Zabbix 5 for monitoring their environments. Authored by Nathan Liefting and Brian van Baekel, the book is structured as a recipe-style guide covering a vast array of Zabbix functionalities. Key topics include initial setup and user management, configuring various monitoring types (such a…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play