Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Cloud Computing Podcasts
Get exam-ready with the BareMetalCyber PrepCast, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
continue reading
Hosted by cloud computing pioneer David Linthicum, the Cloud Computing Insider podcast gets to the bottom of what cloud computing, and generative AI can bring to your enterprise. New content will focus on what's important to you as a user of cloud computing and generative AI, and the ability to find value the first time.
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Welcome to Hot or Hype, the podcast where hosts Olivia Storelli and Andrew Stevens break down the latest trends in cloud computing, data engineering, AI, and cybersecurity - and decide whether they're game-changing innovations or just industry buzz. In each episode, we dive into topics like AI-driven predictive analytics, cloud-native architectures, zero trust security, data mesh, and more, giving you real-world insights from practitioners who know what works and what doesn't. No fluff. No h ...
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
FusionTalk is a dynamic podcast where technology, collaboration, and innovation come to life! Hosted by Anouck Fierens, a Microsoft 365 & Power Platform expert, and Steve Dalby, a SharePoint & Teams specialist with a knack for humor, each episode delivers fresh insights, real-world stories, and engaging discussions with industry leaders. 🚀 Topics include: ✅ Modern workplace & collaboration strategies ✅ Practical case studies & expert insights Join FusionTalk and discover how to work smarter, ...
…
continue reading
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
continue reading
The Tech+ PrepCast is a complete audio study companion for the CompTIA Tech+ (FC0-U71) certification exam, designed to guide learners through every domain and objective. Each episode delivers clear explanations, practical examples, and exam-focused insights to help you build confidence and technical readiness. Whether you are new to IT or preparing for your first certification, this PrepCast provides structured support from start to finish.
…
continue reading
Mrs. Ruiz's middle school students created old time spooky radio broadcasts.
…
continue reading
The IoT For All Podcast is focused on bringing together the smartest and most creative minds in the Internet of Things (IoT) industry to share their knowledge and experiences with the world. The ultimate goal is to help others succeed and educate the world on the benefits and inner workings of the Internet of Things industry.
…
continue reading
Discussion with cloud computing industry leaders on topics including public, private and hybrid clouds and related technologies and services. Moderated by cloud computing expert Paul Burns, president of cloud research firm Neovise.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
IEEE Cloud Computing podcasts
…
continue reading
Each week, Jon Shanks, CEO of cloud-native consultancy and product business Appvia, and tech evangelist Lewis Marshall, senior developer and AI enthusiast, analyse the biggest news stories that week, that are shaping Cloud, Data and AI. Alongside their insight, they invite frontline leaders, Chief Technology Officers and engineering heads from established, cloud-powered organisations to share candid lessons from running real-world workloads at scale. Together, they take the headlines and get ...
…
continue reading
Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform ...
…
continue reading
Podcast series on cloud computing by James Urquhart and Geva Perry
…
continue reading
A comprehensive introduction to cloud computing, covering foundational concepts, service models (IaaS, PaaS, SaaS), infrastructure components, and emerging trends like serverless computing and cloud-native applications.
…
continue reading
Big Ideas. Simplified. Join the OrionX team and guests in lively discussions of trends and products that can impact your investment decisions and change the technology options you consider.
…
continue reading
I’m John. I’m a software engineer living in Bangalore, India. I am a fan of technology, cloud, and cloud computing. I’m also interested in Hybrid Cloud. You can visit my website with a click on the button above.
…
continue reading
Podcast by Friend Software Labs
…
continue reading
Putting new technology to use is an exciting prospect. But going from purchase to production isn’t always smooth—even when it’s something everyone is looking forward to. Code Comments covers the bumps, the hiccups, and the setbacks teams face when adjusting to new technology—and the triumphs they pull off once they really get going.
…
continue reading
A series of informal conversations with thought leaders, researchers, practitioners, and writers on a wide range of topics in technology, science, and of course big data, data science, artificial intelligence, and related applications. Anchored by Ben Lorica (@BigData), the Data Exchange also features a roundup of the most important stories from the worlds of data, machine learning and AI. Detailed show notes for each episode can be found on https://thedataexchange.media/ The Data Exchange p ...
…
continue reading
"The Digital Revolution with Jim Kunkle", is an engaging podcast that delves into the dynamic world of digital transformation. Hosted by Jim Kunkle, this show explores how businesses, industries, and individuals are navigating the ever evolving landscape of technology. On this series, Jim covers: Strategies for Digital Transformation: Learn practical approaches to adopting digital technologies, optimizing processes, and staying competitive. Real-Life Case Studies: Dive into inspiring success ...
…
continue reading
Cloud Gossip is a technology podcast dedicated to discovering the world of cloud computing. Join us as we dive deep into interviews with leading industry experts, taking you on a journey that does not stop at the technology itself, but also explores the people behind the products and tools we all know, use, and love.
…
continue reading

1
The Data Center Insiders Podcast: Virtualization | Cloud Computing | Enterprise IT | VMware | EMC
Simon Seagrave
Podcast by Simon Seagrave
…
continue reading
Welcome to Google Cloud Reader, where we read the tech blogs for you, and to you. No matter why you prefer an audio format, we’ve got you covered. Tune in to learn more about a variety of Google Cloud topics. Google Cloud reader: Giving a voice to Google tech blogs.
…
continue reading
Artificial Chaos is hosted by Morgan and Holly. We discuss technology, cybersecurity, cloud computing, and more.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Celebrating innovation in a world of virtually unlimited compute power, one story at a time.
…
continue reading
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
…
continue reading
A weekly podcast on technical topics related to cloud computing including: MLOPs, LLMs, AWS, Azure, GCP, Multi-Cloud and Kubernetes.
…
continue reading
Short educational content about Google Cloud Platform (GCP)
…
continue reading

1
vChat (MP3 VERSION) - The Latest in Virtualization and Cloud Computing
David Davis, Simon Seagrave, Eric Siebert
Covering Virtualization and Cloud Computing News, VMware vSphere How-To, Events, and Interviews
…
continue reading
Cloud Computing Foundation certification program provides you, clear and concise basics of cloud computing platform.Cloud computing is about providing IT-related services through the internet. It allows flexible IT solutions to support the business, based on clear service arrangements. https://www.novelvista.com/exin-cloud-computing-foundation
…
continue reading
When it comes to technology, you may have questions. So do we. Every other week, we demystify the tech industry, one answer at a time. Join us as we bring together a chorus of perspectives from within Red Hat to break down the big, emerging ideas that matter both today and beyond. Compiler is hosted by Angela Andrews and Brent Simoneaux. Learn more about our show at redhat.com/en/compiler-podcast
…
continue reading
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
…
continue reading
Red Hat Kubernetes weekly technology podcast hosted by Brian Gracely (@bgracely) along with friends from the Kubernetes community. Focused on Containers | Kubernetes | Red Hat OpenShift | Cloud Native Applications | Microservices | PaaS | CaaS | DevOps.
…
continue reading
Kieran Gilmurray is a globally recognised authority on Artificial Intelligence, cloud, intelligent automation, data analytics, agentic AI, and digital transformation. He has authored three influential books and hundreds of articles that have shaped industry perspectives on digital transformation, data analytics, intelligent automation, agentic AI and artificial intelligence. 𝗪𝗵𝗮𝘁 does Kieran do❓ When I'm not chairing international conferences, serving as a fractional CTO or Chief AI Officer, ...
…
continue reading
Ingram Micro Cloud Benelux presents a bi-weekly IaaS podcast. In this podcast you’ll get the best, latest, and hottest IaaS updates. In every episode we’ll take a deep dive in one specific infrastructure-as-a-service subject with the best experts in the business.
…
continue reading
AWS Insiders is a fast-paced, entertaining and insightful look behind the scenes of AWS and cloud computing. Hosts Rahul Subramaniam and Hilary Doyle dig into the current state and the future of AWS by talking with the people and companies that know it best. It’s a show full of opinions, takeaways, and untold stories about the challenges, innovations and the mind-blowing promise of cloud computing.
…
continue reading
This podcast features news and information on High Performance Computing
…
continue reading
Interface is a podcast where we connect technology and culture through conversation. Interface is brought to you by EMPOWER at PROS. EMPOWER is dedicated to attracting, developing and retaining Black talent at PROS. PROS helps people and companies outperform by enabling smarter selling in the digital economy.
…
continue reading
In this show, we discuss Technology, Business and Security in the world of Cloud. InfraGuard is globally acclaimed Unified Server Management Software that helps large enterprises and services providers efficient manage, automate and secure their servers. So whether you are on AWS, Azure or GCP - InfraGuard gets all your servers on a single dashboard enabling you to scale up faster.
…
continue reading
Everything that's happening in the rapidly changing world of Artificial Intelligence, OpenAI, Bard, Bing, Midjourney, and more.
…
continue reading

1
Episode 156 — Troubleshooting Scaling and Capacity — Compute, Storage, Bandwidth
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22In this episode, we focus on diagnosing issues where scaling configurations fail to meet demand or capacity is exceeded. Compute-related problems may arise when auto-scaling rules are misconfigured, instance limits are reached, or workloads are not properly balanced. Storage issues often occur due to hitting provisioned capacity limits, performance…
…
continue reading

1
Cloud AI Gimmicks Exposed: Why Enterprises Are Saying Enough!
12:36
12:36
Play later
Play later
Lists
Like
Liked
12:36Discover how major cloud providers—AWS, Microsoft, and Google—are turning artificial intelligence into a marketing gimmick, driving up costs without delivering the real value enterprises crave. In this video, David Linthicum breaks down why tech giants are relentlessly hyping generative and agentic AI, but falling short on meaningful innovation tha…
…
continue reading

1
AI Daily Podcast: Transformative AI Integrations in HR and Cloud Computing
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57AI Daily Podcast - Pioneering Innovations in AI Technology AI Daily Podcast: Pioneering Innovations in AI Technology In the latest episode of the AI Daily Podcast, we delve into a significant development in artificial intelligence, focusing on its integration into HR technology. Join us as we explore how Folks, a leading Canadian HR software compan…
…
continue reading

1
Episode 164 — Troubleshooting Automation and Orchestration — Mismatches and Failures
14:19
14:19
Play later
Play later
Lists
Like
Liked
14:19This episode addresses problems in automation and orchestration workflows. Mismatches can occur when scripts or templates are out of sync with infrastructure changes, causing failed deployments or inconsistent configurations. Deprecated API calls or incompatible orchestration sequences can halt processes entirely. Failures may also result from miss…
…
continue reading

1
Episode 163 — Network Tools — Using Ping, Tracert, IP, NSLookup, Netstat, and More
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12In this episode, we explain how to use essential network troubleshooting tools effectively. Ping verifies connectivity and measures latency, while Tracert or Traceroute maps the path packets take through the network. IP or ifconfig commands show network interface configurations. NSLookup or dig queries DNS records directly to diagnose name resoluti…
…
continue reading

1
Episode 162 — DNS, VLAN/VXLAN, Proxies, MTU, QoS, and Time Sync Errors
16:05
16:05
Play later
Play later
Lists
Like
Liked
16:05This episode looks at multi-layered networking issues that can disrupt cloud services. DNS errors may involve incorrect records, propagation delays, or misapplied DNSSEC settings. VLAN or VXLAN misconfigurations can isolate workloads unexpectedly. Proxy issues may break application access or degrade performance. MTU mismatches can cause dropped pac…
…
continue reading

1
Episode 161 — Troubleshooting Load Balancer Behavior — Protocols, Headers, Front/Back Ends
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54In this episode, we cover diagnosing issues with load balancers in cloud environments. Problems can arise when the load balancer is configured with the wrong protocol, causing mismatches between client and server communication methods. Incorrect handling of headers—such as missing X-Forwarded-For or session cookies—can break client tracking or rout…
…
continue reading

1
Episode 160 — Routing and NAT Problems — Static, Dynamic, VPN, Source/Destination
15:55
15:55
Play later
Play later
Lists
Like
Liked
15:55In this episode, we discuss how routing errors and Network Address Translation (NAT) misconfigurations can impact connectivity and data flow. Static routes may be outdated or incorrectly entered, while dynamic routing protocols can fail due to misaligned configurations or missing updates. NAT problems may involve incorrect source or destination map…
…
continue reading

1
Episode 159 — Troubleshooting Network Configuration — ACLs, Subnets, Peering
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21This episode focuses on resolving connectivity problems caused by incorrect network configurations. Access Control List (ACL) errors can block legitimate traffic, subnet misconfigurations may prevent communication between resources, and peering issues can disrupt cross-network data flows. We also highlight diagnostic approaches such as reviewing AC…
…
continue reading

1
Episode 158 — Vendor and Platform Issues — API Limits, Migration Errors, Cost
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we explore problems that stem from vendor-imposed limitations or platform-specific behaviors. API rate limits can cause integration failures, while migration errors may result from incompatible configurations or unsupported features. Cost-related issues can also arise unexpectedly due to pricing model misunderstandings or resource …
…
continue reading

1
Episode 157 — Troubleshooting Licensing and Subscription Conflicts
12:54
12:54
Play later
Play later
Lists
Like
Liked
12:54This episode examines issues that arise when licensing or subscription entitlements are not aligned with deployed resources. These conflicts can result in service interruptions, feature limitations, or compliance violations. Common causes include expired licenses, mismatched license types, and improper assignment of subscription tiers. We also cove…
…
continue reading

1
Episode 155 — Deployment Config Errors — Templates, Tags, Scripts, and Containers
13:52
13:52
Play later
Play later
Lists
Like
Liked
13:52In this episode, we examine how misconfigured templates, incorrect tags, faulty automation scripts, or improperly built containers can lead to deployment failures or inconsistencies. These errors may prevent resources from being properly provisioned, disrupt workflows, or introduce security gaps. We also outline troubleshooting steps like reviewing…
…
continue reading

1
Episode 154 — Deployment Performance Issues — Latency and Resource Lag
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35This episode focuses on performance degradation that can occur after deployment. Latency may result from suboptimal network routing, overloaded servers, or insufficient bandwidth. Resource lag can be caused by under-provisioned compute, storage bottlenecks, or poor load balancing. We also discuss tools and techniques to measure performance, identif…
…
continue reading

1
Episode 153 — Troubleshooting Deployment — Connectivity Failures and Outages
13:57
13:57
Play later
Play later
Lists
Like
Liked
13:57In this episode, we explore the causes of connectivity failures and outages during cloud deployments. Problems can occur due to misconfigured routing tables, incorrect IP assignments, firewall restrictions, or DNS resolution errors. These issues often disrupt service availability and delay project timelines. We also cover systematic troubleshooting…
…
continue reading

1
Episode 152 — Investigating Internal and External Attack Symptoms
14:18
14:18
Play later
Play later
Lists
Like
Liked
14:18This episode examines how to identify signs of both internal and external threats within cloud environments. Internal attack indicators may include unusual access patterns, privilege escalation, or unauthorized data transfers. External attacks often present as repeated failed login attempts, suspicious IP addresses, or abnormal network traffic volu…
…
continue reading

1
Episode 151 — Troubleshooting Unsupported Protocols and Cipher Use
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10In this episode, we address issues that arise when legacy or insecure protocols and ciphers are still in use within a cloud environment. Unsupported protocols like older SSL versions or weak ciphers can cause compatibility failures with modern systems and expose data to security risks. These problems often appear during integration of legacy system…
…
continue reading

1
Episode 150 — Troubleshooting Security Appliances — WAF, IPS, IDS, NAC
12:53
12:53
Play later
Play later
Lists
Like
Liked
12:53In this episode, we examine problems related to security appliances such as Web Application Firewalls (WAFs), Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), and Network Access Control (NAC) solutions. Misconfigurations, firmware issues, or integration problems can limit their effectiveness or disrupt normal operations. We al…
…
continue reading

1
Episode 149 — Troubleshooting Exposed Endpoints and Insecure Interfaces
12:55
12:55
Play later
Play later
Lists
Like
Liked
12:55This episode focuses on identifying and resolving issues where endpoints or interfaces are unintentionally exposed to the public internet. Common causes include overly permissive firewall rules, default configurations, or lack of authentication. These exposures can allow attackers to probe for vulnerabilities or directly exploit services. We also c…
…
continue reading

1
Episode 148 — Troubleshooting Data Security — Encryption, Classification, and Exposure
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26In this episode, we explore how encryption failures, incorrect data classification, and accidental exposure can create serious security incidents. Encryption problems may involve weak ciphers, improper key management, or unencrypted channels. Misclassification of sensitive data can result in inadequate protection, while exposure often stems from mi…
…
continue reading

1
Episode 147 — Troubleshooting Policies — Misconfigurations and Misapplications
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27This episode addresses problems that arise when security or operational policies are misconfigured or incorrectly applied. Examples include overly restrictive firewall rules, improper access control settings, or conflicting automation policies. These errors can disrupt workflows, block legitimate traffic, or leave resources vulnerable to attack. We…
…
continue reading

1
Episode 146 — Troubleshooting Certificates — Expired, Revoked, or Misconfigured
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59In this episode, we examine common certificate-related issues and how they impact cloud services. Expired certificates can cause service outages, prevent secure connections, and disrupt authentication flows. Revoked certificates, often invalidated due to compromise, require immediate replacement to maintain trust. Misconfigured certificates—such as…
…
continue reading

1
Episode 145 — Troubleshooting Security Groups — Directory and Network
11:48
11:48
Play later
Play later
Lists
Like
Liked
11:48In this episode, we explain how security group misconfigurations can cause connectivity or access problems. Directory security groups manage access to identity resources, while network security groups control traffic to and from specific subnets or instances. Misalignment between these layers can create inconsistent access behavior. We also cover t…
…
continue reading

1
Episode 144 — Troubleshooting Security — Authentication and Authorization Failures
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27This episode focuses on diagnosing and resolving issues with authentication and authorization systems. Authentication failures can stem from incorrect credentials, expired certificates, or mismatched authentication methods. Authorization failures occur when valid users are denied access due to misconfigured policies, roles, or conditional access se…
…
continue reading

1
Episode 143 — Troubleshooting Security — Missing or Incomplete Privileges
12:03
12:03
Play later
Play later
Lists
Like
Liked
12:03In this episode, we explore troubleshooting issues caused by missing or incomplete privileges in a cloud environment. These problems can prevent users or services from accessing necessary resources, executing commands, or integrating with other systems. Common causes include misconfigured role assignments, incomplete policy definitions, or overlook…
…
continue reading

1
Episode 142 — Troubleshooting Step 6 — Documenting Findings and Outcomes
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15This episode emphasizes the importance of documenting every phase of the troubleshooting process. Detailed records should include the problem description, investigation steps, theories tested, actions taken, and final resolution. Documentation not only supports knowledge sharing but also improves efficiency when similar issues arise in the future. …
…
continue reading

1
Episode 141 — Troubleshooting Step 5 — Verifying Functionality and Preventing Recurrence
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43In this episode, we cover the critical step of verifying that the implemented fix has fully resolved the issue. Verification involves functional testing, monitoring affected systems, and confirming with end users that normal operations have been restored. This process should include checking related components or dependent services to ensure no sec…
…
continue reading

1
Episode 140 — Troubleshooting Step 4 — Creating and Implementing the Action Plan
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20In this episode, we outline how to develop and execute an action plan that resolves the confirmed issue. Planning includes defining the specific changes, scheduling them to minimize impact, and ensuring all required resources and approvals are in place. Implementation should follow best practices for change management, including backups and rollbac…
…
continue reading

1
Episode 139 — Troubleshooting Step 3 — Testing the Theory and Re-Evaluating if Needed
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43This episode covers the process of testing your theory to confirm the root cause of a problem. We explain how to perform controlled changes or simulations to verify whether the suspected cause produces or resolves the observed symptoms. Documenting the results of these tests is critical for both operational records and potential escalations. We als…
…
continue reading

1
Episode 138 — Troubleshooting Step 2 — Establishing a Theory and Researching Symptoms
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06In this episode, we explain how to formulate a theory of probable cause based on collected evidence. This involves reviewing system documentation, researching known issues, and comparing current symptoms to baseline performance data. Testing the simplest and most likely causes first can save significant time and reduce disruption. We also address h…
…
continue reading

1
Episode 137 — Troubleshooting Step 1 — Identifying the Problem and Gathering Info
12:44
12:44
Play later
Play later
Lists
Like
Liked
12:44This episode focuses on the first and most critical step in troubleshooting: identifying the problem. We discuss methods for collecting detailed information, including user reports, log analysis, monitoring data, and environmental checks. Asking the right questions and confirming recent changes to the system or environment helps narrow down potenti…
…
continue reading

1
Episode 136 — Domain 5.0 Troubleshooting — Overview
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04In this episode, we introduce Domain 5 of the Cloud+ exam, which focuses on identifying, diagnosing, and resolving issues in cloud environments. We outline the exam’s emphasis on a structured troubleshooting methodology, covering problem identification, theory testing, action planning, verification, and documentation. This domain integrates technic…
…
continue reading

1
Episode 135 — Dashboards and Cloud Reporting — Cost, Usage, Capacity, and Health
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42In this episode, we explain how dashboards consolidate key operational metrics for real-time visibility. Cost dashboards track spending across resources and services, usage dashboards monitor workload activity, capacity dashboards ensure resources remain within safe limits, and health dashboards display performance and availability indicators. Thes…
…
continue reading

1
Episode 134 — Upgrade Methods — Blue-Green, Canary, and Active-Passive
15:19
15:19
Play later
Play later
Lists
Like
Liked
15:19This episode explores upgrade deployment strategies that reduce risk and downtime. Blue-green deployments run two identical environments, switching traffic to the updated one once validated. Canary releases roll out updates to a small subset of users first, monitoring for issues before full deployment. Active-passive upgrades involve switching from…
…
continue reading

1
Episode 133 — Rollbacks and Patch Policy Enforcement (e.g., n-1)
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30In this episode, we cover rollback procedures for reversing patches or updates that cause instability or security issues. Effective rollback planning includes keeping backups, maintaining version histories, and ensuring minimal downtime during reversions. We also discuss patch policy enforcement models like n-1, which keeps systems one version behi…
…
continue reading

1
Episode 132 — Cloud Patching — What, When, and How
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07This episode focuses on patching strategies to keep cloud environments secure and stable. We explain the types of patches—security updates, bug fixes, and feature enhancements—and how to prioritize them based on severity and exposure. Timing is critical, with patch windows scheduled to minimize disruption while addressing vulnerabilities promptly. …
…
continue reading

1
Episode 131 — Asset Management and CMDB Tracking
11:19
11:19
Play later
Play later
Lists
Like
Liked
11:19In this episode, we examine how asset management and Configuration Management Databases (CMDB) work together to provide visibility and control over cloud resources. Asset management tracks hardware, software, licenses, and virtual resources, ensuring accountability and compliance. A CMDB stores detailed configuration information and relationships b…
…
continue reading

1
Episode 130 — Change Management Practices in Cloud Environments
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07In this episode, we explain structured change management processes for cloud deployments. This includes evaluating risks, obtaining approvals, scheduling changes during low-impact windows, and documenting the entire process. Change management ensures modifications are controlled, predictable, and reversible if issues arise. We also cover tools for …
…
continue reading

1
Episode 129 — Life-Cycle Management — Versions, Roadmaps, and Deprecations
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04This episode covers life-cycle management as it applies to cloud services and applications. Version control tracks changes to configurations and code, ensuring rollback capability and documentation. Roadmaps outline planned updates, feature releases, and service improvements, allowing proactive planning for integration or training. Deprecation poli…
…
continue reading

1
Episode 128 — Backup Verification and Cloud Data Protection
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52In this episode, we explore the importance of verifying backups to ensure they are complete, uncorrupted, and restorable. Backup verification includes automated checksum validation, test restores, and scheduled audits to confirm that recovery objectives can be met. Cloud data protection extends beyond backups to include encryption, access controls,…
…
continue reading

1
Episode 127 — Alert Categorization and Response Policies
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38This episode explains how categorizing alerts by severity, impact, and urgency supports a more efficient incident response process. Categories might range from informational events that require logging only, to critical alerts that demand immediate escalation and resolution. Response policies assign roles, timelines, and communication protocols to …
…
continue reading

1
Episode 126 — Maintenance Mode and Alert Suppression Policies
11:26
11:26
Play later
Play later
Lists
Like
Liked
11:26In this episode, we discuss how maintenance mode and alert suppression policies help prevent unnecessary or false-positive alerts during planned system updates. Maintenance mode temporarily disables monitoring for specific resources, allowing patching, configuration changes, or hardware upgrades without triggering incident responses. Alert suppress…
…
continue reading

1
Episode 125 — Alerting Mechanisms — Email, SMS, Dashboards
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27In this episode, we explain how alerting systems notify administrators of events that require attention. Email alerts provide detailed notifications suitable for review and escalation, SMS alerts deliver immediate attention for critical incidents, and dashboards offer real-time visual monitoring of system health. Effective alerting relies on settin…
…
continue reading

1
Episode 124 — Log Scrubbing and Tagging Strategies for Clean Metrics
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27This episode covers techniques for improving the quality and relevance of log data. Log scrubbing removes sensitive or irrelevant information before storage or analysis, supporting compliance and reducing storage costs. Tagging adds metadata to logs, enabling easier filtering, correlation, and reporting across multiple systems or services. We also …
…
continue reading

1
Episode 123 — Monitoring Tool Integrations and Continuous Verification
12:02
12:02
Play later
Play later
Lists
Like
Liked
12:02In this episode, we explore how integrating monitoring tools across infrastructure, applications, and security layers creates a unified visibility framework. Continuous verification involves automated checks and reporting to confirm that configurations, performance, and security controls remain in the desired state over time. This approach reduces …
…
continue reading

1
Episode 122 — SLA Compliance — Availability Tracking and Guarantees
12:28
12:28
Play later
Play later
Lists
Like
Liked
12:28This episode examines how to measure and ensure compliance with Service Level Agreements (SLAs) in cloud environments. Availability tracking involves monitoring system uptime, performance consistency, and responsiveness against contractual targets. Guarantees may include uptime percentages, latency thresholds, and response times for incident resolu…
…
continue reading

1
Episode 121 — Resource Utilization and Uptime Verification
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04In this episode, we discuss how to monitor and verify that cloud resources are being utilized efficiently while meeting uptime targets. Resource utilization tracking includes CPU, memory, storage, and network usage, ensuring workloads are neither over-provisioned nor under-provisioned. This information supports capacity planning, cost optimization,…
…
continue reading

1
Episode 120 — Monitoring Cloud Performance — Applications and Infrastructure
11:35
11:35
Play later
Play later
Lists
Like
Liked
11:35In this episode, we explain how to monitor both application and infrastructure performance in cloud environments. Application monitoring involves tracking response times, transaction success rates, and error frequencies to ensure optimal user experience. Infrastructure monitoring covers CPU, memory, storage, and network metrics to maintain resource…
…
continue reading

1
Episode 119 — Establishing Baselines and Thresholds for Monitoring
11:33
11:33
Play later
Play later
Lists
Like
Liked
11:33This episode covers how to create baselines representing normal system performance and set thresholds to detect deviations. Baselines are built by collecting data over time under typical operating conditions, while thresholds define acceptable performance ranges for metrics such as CPU usage, memory consumption, and network latency. These benchmark…
…
continue reading

1
Episode 118 — Log Automation, Analysis, and Trending Data
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In this episode, we focus on automating log collection and analysis to reduce manual workload and improve responsiveness. Automation tools aggregate logs, normalize data formats, and apply rules to identify anomalies or threshold breaches. Analysis tools extract insights from log data to detect patterns, troubleshoot issues, and predict future reso…
…
continue reading

1
Episode 117 — Audit Logging and Authentication Logs — What to Track and Why
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45This episode examines the value of audit logging and authentication logs in maintaining a secure and compliant cloud environment. Audit logs record changes to configurations, permissions, and critical resources, helping administrators detect unauthorized or erroneous actions. Authentication logs track login attempts, failures, and user session deta…
…
continue reading