Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Bgp Podcasts
Time to put on our Big Girl Panties and deal with the world that we live in. Speak out. Speak up. Stand up.
…
continue reading
If you're passionate about App State football and App State sports then you'll love The Black & Gold Podcast. Your hosts, AJ and Big C, are alumni that are passionate about all things Appalachian State. With a new episode every Wednesday, you'll be able to keep up with App State's on field performance and anything else that's going on off the field that you need to know about. From a recap of the previous game, a preview of the next game and everything in between, for fans of App State, The ...
…
continue reading
A video podcast showing Cisco hands-on training exercises.
…
continue reading
…
continue reading
Big Girl Pants Podcast is a podcast that highlights real people, living real life. It's not all the time that we get one on one conversations with our closest friends. BGP offers perspectives from all walks of life. Health, Fitness, Mental Health, Parenting, Entrepreneurship, and all the struggles in between. We are all people trying to figure it out - join me as I try, one conversation at at time!
…
continue reading
This podcast BUSINESS GERMAN will teach you more than surviving in a German office or company. My episodes focus on authentic German to keep you motivated and updated. I am introducing information and will link with selected websites of my choice to guide you online into the German Language and Culture and Life from an intercultural approach. My main focus will be sites plus podcasts of GERMAN MEDIA. BGP published by your Coach of German Peter H Bloecker @peblogger https://bloeckerblog.com C ...
…
continue reading
The Bullock Garden Project, Inc. (or BGP) is a nonprofit organization dedicated to helping schools and organizations grow gardens & garden-based learning programs for children. We’ll be chatting about our journey from non-gardeners to nonprofit and having tons of laughs while we do it! Support this podcast: https://podcasters.spotify.com/pod/show/the-bullock-garden-inc/support
…
continue reading
A mediocre podcast about family, life, pop culture, guy stuff, or whatever is on my mind at the time.
…
continue reading
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
This is The Internet Report, a podcast uncovering what’s working and what’s breaking on the Internet—and why. Tune in to hear ThousandEyes’ Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more.
…
continue reading
The Art of Network Engineering blends technical insight with real-world stories from engineers, innovators, and IT pros. From data centers on cruise ships to rockets in space, we explore the people, tools, and trends shaping the future of networking, while keeping it authentic, practical, and human. We tell the human stories behind network engineering so every engineer feels seen, supported, and inspired to grow in a rapidly changing industry. For more information, check out https://linktr.e ...
…
continue reading
The Routing Table podcast is hosted by Melchior Aelmans and Rick Mur. We talk about technology and anything related.
…
continue reading
The Blockchain Gaming Podcast is a podcast hosted by "E" with a mission to spread information about games being built on top of blockchains and the streamers who play them. The podcast is brought to you by Rooks and Queens, a fashion and lifestyle brand for gamers by gamers. To learn more visit www.rqcollective.io
…
continue reading
Welcome to Bits and Specs — the podcast that decodes the internet’s building blocks, one protocol at a time. Each week, we take you beyond the jargon and into the real-world stories behind RFCs, standards, and the specs that quietly run our digital lives. Whether you’re a seasoned engineer or just curious how the web actually works, we break down the bits, the bytes, and the brilliance behind the specs shaping our connected world.
…
continue reading
1
Beastly Gentleman: Self-Improvement For Men | Fitness | Dating | Lifestyle | Entrepreneurship
David De Las Morenas and Dave Perrotta
Bestselling author and bloggers, David de las Morenas (HowToBeast.com) and Dave Perrotta (PostgradCasanova.com) team up each week to share insights on how to get men unstuck and reach their potential in all areas of life. David and Dave interview experts in: self improvement, dating, sex, relationships, fitness and entrepreneurship to help you to “level up” and embrace the beastly gentleman lifestyle. Guests include: James Altucher, Hal Elrod, Andrew Ferebee and Christian McQueen.
…
continue reading
Could a single BGP trick really break the internet? A new “BGP Vortex” claim says yes - by abusing route oscillation and BGP communities to trigger endless update loops and exhaust router CPU. So we check what actually holds up in the real world. In this Threat Talks Deep Dive, Rob Maas, Field CTO at ON2IT, sits down with Eric Nghia Nguyen Duy, Net…
…
continue reading
1
The Fast-Track Guide to VXLAN BGP EVPN Fabrics: Implement Today’s Multi-Tenant Software-Defined Networks
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48Offers an extensive guide to implementing VXLAN BGP EVPN fabrics, focusing heavily on the spine-and-leaf architecture in data center networking. It details the logical and physical components necessary for fabric creation, including the configuration of the underlay network using protocols like OSPF and IS-IS, and establishing the overlay network w…
…
continue reading
1
Beginning Java MVC 1.0: Model View Controller Development to Build Web, Cloud, and Microservices Applications
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52A comprehensive guide for developing web, cloud, and microservices applications using Java MVC. It introduces the fundamental Model-View-Controller (MVC) design pattern, tracing its history and adaptation for web applications, especially within the Java EE/Jakarta EE ecosystem utilizing JSR-371. The text covers practical aspects of setting up a dev…
…
continue reading
1
AWS Certified Machine Learning Specialty: MLS-C01 Certification Guide: The definitive guide to passing the MLS-C01 exam on the very first
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17Focusing on practical applications of machine learning (ML) within the Amazon Web Services ecosystem. The content systematically covers the exam syllabus, starting with ML fundamentals like modeling pipelines, supervised and unsupervised learning, and data splitting strategies to prevent overfitting and underfitting. It then details various AWS ser…
…
continue reading
1
The Pythonic Way: An Architect’s Guide to Conventions and Best Practices for the Design, Development, Testing, and Management of Enterprise
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43A comprehensive guide for designing and developing enterprise Python code. It covers a vast array of topics, including best practices for code structure and quality (e.g., commenting, naming conventions, and PEP 8), effective use of Python data structures (lists, dictionaries, sets, and tuples), and object-oriented programming concepts (classes, in…
…
continue reading
1
Traefik API Gateway for Microservices: With Java and Python Microservices Deployed in Kubernetes
16:39
16:39
Play later
Play later
Lists
Like
Liked
16:39Detailing the configuration and use of Traefik as an API gateway in a microservices environment. The text explains the shift from monolithic to microservices architecture and the need for dynamic gateway solutions like Traefik, which offers features such as load balancing (Round Robin, Weighted Round Robin, Mirroring) for HTTP, TCP, and UDP traffic…
…
continue reading
1
Parsing Recent Cloudflare and Venmo Outages
16:05
16:05
Play later
Play later
Lists
Like
Liked
16:05Dig into recent outages at Cloudflare and Venmo, and the growing challenge of maintaining reliability and resilience in a world of increasingly interdependent Internet infrastructure. ——— CHAPTERS 00:00 Intro 00:50 Cloudflare Outage 06:54 Venmo Outage 12:01 The Challenge of Layered Dependencies 13:36 Outage Trends: By the Numbers 15:28 Get in Touch…
…
continue reading
An extensive overview of systems analysis and design, primarily focusing on the tenth edition of a textbook on the subject, likely by Kendall and Kendall. The content comprehensively covers the phases of the systems development life cycle (SDLC), including project management techniques such as feasibility analysis, PERT diagrams, and various conver…
…
continue reading
After a strong three game winning streak, Appalachian men’s hoops look to start strong in conference play.
…
continue reading
1
Loose Leaf for Systems Analysis and Design
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07A detailed overview of the various phases, concepts, and tools involved in the Systems Development Life Cycle (SDLC). The text covers organizational topics such as the role and required skills of a systems analyst, the structure of the IT department, and strategic planning, including cost-benefit analysis and feasibility studies. It extensively exp…
…
continue reading
Send us a text A bus-powered hackathon, a $100K prize for a gloriously “useless” app, and keynotes that said AI so many times you could turn it into a supercut—re:Invent 2025 brought energy, irony, and real signals hiding in the noise. We’re joined by AWS Hero Chris Williams to unpack what actually matters: where AI is genuinely useful, where it’s …
…
continue reading
Send us a text Most network engineers know BGP, OSPF, and maybe EIGRP, but far fewer have hands-on experience with ISIS. In this episode of The Art of Network Engineering, Andy Lapteff sits down with Russ White and Mike Bushong for a deep, opinionated, and refreshingly honest discussion about routing protocol design in modern data centers. We explo…
…
continue reading
1
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04An extensive guide to computer hacking for beginners, detailing various types of hackers, including Black Hat, White Hat, and Grey Hat practitioners. It thoroughly explains the most popular hacking technique, social engineering, outlining different forms such as Phishing, Impersonation, Vishing, and Smishing, which exploit human vulnerabilities. Fu…
…
continue reading
Attackers are abusing a WSUS flaw - Microsoft’s Windows Server Update Services - to detonate PowerCat, spawn reverse shells, and plant ShadowPad. All from the update server your entire Windows estate trusts by default. One weak crypto key and a broken deserialization function let attackers hit your WSUS server with unauthenticated SYSTEM-level code…
…
continue reading
A comprehensive technical overview of synchronization and timing solutions within telecommunications, with a specific focus on 4G and 5G mobile networks. It explores the historical necessity of synchronization, progressing from frequency alignment for digital networks to the modern requirement for phase and time synchronization driven by mobile bas…
…
continue reading
1
Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python
15:00
15:00
Play later
Play later
Lists
Like
Liked
15:00An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
…
continue reading
1
Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
18:00
18:00
Play later
Play later
Lists
Like
Liked
18:00A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
…
continue reading
1
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
…
continue reading
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
…
continue reading
The first IPv6 specs were published in 1995, and yet 30 years later, we still have a pretty active IETF working group focused on “developing guidelines for the deployment and operation of new and existing IPv6 networks.” (taken from the old charter; they updated it in late October 2025). Why is it taking so long, and what problems are they trying t…
…
continue reading
1
Security for Telecommunications Networks (Advances in Information Security Book 40)
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM …
…
continue reading
Appalachian State is going bowling! We talk about the upcoming bowl game, recruiting, basketball, and more.
…
continue reading
1
Enterprise Security Architecture: A Business-Driven Approach
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framework for developing security architectures, and explains how it guides the entire process from contextual business requirements to operational security. The text covers critical concepts like risk manage…
…
continue reading
1
Bad Successor: The Service Account Flaw to Watch
17:15
17:15
Play later
Play later
Lists
Like
Liked
17:15It was built to secure service accounts. Instead, it became the cleanest privilege-escalation vector of 2025. They called it Bad Successor (A.K.A. CVE-2025-53779). A new “secure by design” feature in Windows Server 2025 -DMSA -was supposed to fix service account hygiene. Instead, it introduced a loophole where attackers could claim successor status…
…
continue reading
1
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
18:33
18:33
Play later
Play later
Lists
Like
Liked
18:33An extensive overview of digital literacy and technology, covering a broad range of topics from basic computer and smartphone functionality to advanced internet applications. It introduces fundamental concepts of hardware and software, then expands into practical usage of online services like email, social media, digital maps, and e-commerce. The t…
…
continue reading
1
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learning. Published in 2021, it aims to clarify the logic and mechanisms behind these concepts for data scientists, acting as a non-linear reference for both beginners and experienced practitioners. The guid…
…
continue reading
1
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availability), various cybercrime types (phishing, ransomware), and the five phases of a breach (research, intrusion, lateral movement, privilege escalation, exfiltration). It further explores the impact of the…
…
continue reading
1
Cracking the Coding Interview: 189 Programming Questions and Solutions
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers detailed strategies for interview preparation, including how to approach problems, optimize solutions, and understand time and space complexity (Big O notation). The text provides interview-specific ad…
…
continue reading
1
Understanding the November 18 Cloudflare Outage
16:14
16:14
Play later
Play later
Lists
Like
Liked
16:14Tune in for a deep dive into the November 18 Cloudflare outage that impacted multiple services including X, OpenAI, and Anthropic—and explore key takeaways for ITOps teams. For insights on the other recent outage that Cloudflare experienced on December 5, see this blog post: https://www.thousandeyes.com/blog/cloudflare-outage-analysis-december-5-20…
…
continue reading
A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and network layers, alongside detailed examples of various networks like the Internet (including ARPANET's history and evolution of traffic), mobile phone networks (1G-5G), and wireless LANs (IEEE 802.11). …
…
continue reading
1
Computer Forensics: Incident Response Essentials
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text covers a broad range of topics, including the basics of hard drives and storage media, various data hiding techniques like encryption and steganography, and the identification and handling of hostile code …
…
continue reading
What if your next great cyber defender is a teenager gaming in their bedroom right now? In this Threat Talks episode, Lieuwe Jan Koning and former FBI Supervisory Special Agent William McKean (founder of The Redirect Project) explore how young digital natives go From Hacker to Hero. They chart the journey from gaming and online communities to risky…
…
continue reading
Appalachian Women’s Tennis player, Savannah Dada-Mascoll, joins us to discuss her journey to App State and success in Boone!
…
continue reading
1
Bots, Bursts, And Bare Metal: Because The Internet Wanted Drama
32:56
32:56
Play later
Play later
Lists
Like
Liked
32:56Send us a text We break down Cloudflare’s outage, why a small config change caused big waves, and what better guardrails could look like. We then unpack AWS and Google’s cross‑cloud link, Megaport’s move into bare metal and GPUs, Webex adding deepfake defenses, and a new startup aiming to tune AI networks at microsecond speed. • Cloudflare outage r…
…
continue reading
Send us a text In this special on-location episode of The Art of Network Engineering, Andy Lapteff sits down in person with Kevin Myers for a conversation that pulls no punches. Kevin brings decades of service provider and whitebox experience to the table as the two dive deep into one of networking’s most complex decisions: how to choose the right …
…
continue reading
A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professionals. They detail social engineering techniques like phishing, vishing, smishing, and physical exploits such as dumpster diving and badge cloning. The sources also explore different penetration test scope…
…
continue reading
1
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing, including processes, risk management, business resilience, and security controls, with a focus on preparing candidates for the CISA exam through key concepts and self-assessment questions. The text a…
…
continue reading
1
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
14:29
14:29
Play later
Play later
Lists
Like
Liked
14:29A preparation guide for Certified Ethical Hacker (CEH) certification, focusing on a wide array of cybersecurity topics. It covers fundamental concepts such as ethical hacking, vulnerabilities, and types of attacks, moving into practical methodologies like footprinting, network scanning, and enumeration. The guide also details various malicious soft…
…
continue reading
1
Postgame: Arkansas State - Goodbye, Football
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52Appalachian State football’s season ended on Saturday. We talk about it.
…
continue reading
1
The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Focusing on cybersecurity defense through the lens of offensive security. The material covers the evolution of cybersecurity practices, critiques the traditional passive and reactive defense posture, and advocates for an "Active Defender" mindset, which involves understanding and leveraging attacker methodologies, tools, and the hacker mentality. K…
…
continue reading
1
The Cybersecurity Manager's Guide: The Art of Building Your Security Program
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, draws on over two decades of experience to argue that success hinges on cultivating strong relationships and ensuring alignment with the company's risk tolerance, as most organizations are indifferent …
…
continue reading
1
Certificate of Cloud Auditing Knowledge Study Guide
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Controls Matrix (CCM), an industry-specific framework developed by the Cloud Security Alliance (CSA), which is used to assess security and compliance across various cloud service models like IaaS, PaaS, and…
…
continue reading
This Thanksgiving we’re thankful for you, our listeners, and a chance for bowl eligibility at one last home game at KBS.
…
continue reading
1
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35Explains the nature of cybercrime and the three primary levels of the internet: the Surface Web, Deep Web, and Dark Web. A significant portion of the material details the major criminal activities found on the Dark Web, including drug trafficking, child pornography, human trafficking, and cyberterrorism. Finally, the excerpts examine the various to…
…
continue reading
Appalachian State legend Jason Hunter has had a storied career in the black and gold. He scored one of the most important touchdowns in program history that led to the first ever national championship for the Mountaineers. He also had a very successful career in the NFL. Jason Hunter a.k.a. Sticks joins us for an episode covering his illustrious ca…
…
continue reading
1
Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58Serves as an in-depth textbook resource, outlining the foundational concepts of cybersecurity, beginning with definitions of data, information, and networking. It extensively covers the history and evolution of cybercrime, categorizing various malicious activities like phishing, spoofing, and different types of DDoS attacks. Furthermore, the text e…
…
continue reading
The world’s biggest open-source ecosystem - npm - faced its first self-spreading worm. They called it Shai Hulud. It didn’t just infect one package. It infected developers themselves. When a maintainer got phished, the worm harvested credentials, hijacked tokens, and created new CI/CD workflows to keep spreading - automatically. No command-and-cont…
…
continue reading
1
Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator
16:17
16:17
Play later
Play later
Lists
Like
Liked
16:17Focusing on Ad Hoc Networks and utilizing the ns-3 simulator. The material covers both the theoretical and practical aspects of simulation, including the formal definition and characteristics of Mobile Ad Hoc Networks (MANETs), various wireless communication technologies (like IoT and Mobile Clouds), and the methodology for designing and analyzing …
…
continue reading
1
Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51A technical resource aimed at IT engineers looking to utilize Zabbix 5 for monitoring their environments. Authored by Nathan Liefting and Brian van Baekel, the book is structured as a recipe-style guide covering a vast array of Zabbix functionalities. Key topics include initial setup and user management, configuring various monitoring types (such a…
…
continue reading