Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

IPv6 Podcasts

show episodes
 
Artwork

1
IPv6 Buzz

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
IPv6 Buzz is for network engineers and infrastructure pros adopting IPv6 or who want to learn more about the protocol. Hosts Ed Horley, Tom Coffeen, and Nick Buraglio demystify IPv6’s intricacies and deliver practical insights in a conversational style that explain the how and why of implementation. They’ve literally written the books about IPv6 and routinely consult on public, private, and federal deployments. IPv6 Buzz is an essential podcast for building your knowledge, confidence, and ex ...
  continue reading
 
Artwork

1
Heavy Networking

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
  continue reading
 
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
  continue reading
 
Hello, world. What is this MODEM podcast all about? Well, we saw a gap emerging in the technical podcast space. That gap was a deeply technical podcast, focused on the protocols, the details, the how-to-demistify-complex things, the unbiased, un-cola of networking that needed to be filled. We’re not interested in the marketing, or the fluff - we want to deconstruct the new shiny things and break them down into comsumable parts. Maybe also some witty banter.
  continue reading
 
Loading …
show series
 
Will Microsoft’s CLAT bring widespread adoption rates for IPv6? Will there be significant advancements in corporate and cloud adoption as well? Will this finally be the year we see the fix for the RFC 6724? Ed Horley, Tom Coffeen, and Nick Buraglio make their predictions for the new year in the first IPv6 Buzz of... Read more »…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel. IPv6 breaks digital ad measurement. Learn how IPinfo’s research-driven, active-measurement model restores accuracy across CTV and all channels. Check more stories related to cybersecurity at: https…
  continue reading
 
Kubernetes is a popular container orchestration platform. Today’s IPv6 Buzz episode explores the benefits of using IPv6 in Kubernetes, and how Kubernetes uses IP addresses in both the control plane and data plane.We also address why the adoption rate is estimated to be so low, from default configurations to issues with non-IPv6-aware applications i…
  continue reading
 
Ethan and Holly discuss the major differences between In-band and Out-of-band (OOB) management and the pros and cons of both. They explore how to implement a proper OOB network and critical use cases where OOB is required. They also explain the differences and roles of the data plane, the control plane, and the management plane.... Read more »…
  continue reading
 
Ethan and Holly discuss the major differences between In-band and Out-of-band (OOB) management and the pros and cons of both. They explore how to implement a proper OOB network and critical use cases where OOB is required. They also explain the differences and roles of the data plane, the control plane, and the management plane.... Read more »…
  continue reading
 
Will Microsoft’s CLAT bring widespread adoption rates for IPv6? Will there be significant advancements in corporate and cloud adoption as well? Will this finally be the year we see the fix for the RFC 6724? Ed Horley, Tom Coffeen, and Nick Buraglio make their predictions for the new year in the first IPv6 Buzz of... Read more »…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025. The myth of a malware-free Mac is a thing of the past. Here’s how Mac threats evolved in 2025 — and what’s coming next. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots. How modern phishing kits use honeypots, cloaking, and adversary-in-the-middle attacks—and how defenders can turn those same tactics against them. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybers…
  continue reading
 
Marina Wyss, Senior Applied Scientist at Twitch, joins Kyler and Ned to discuss her unique path from political science to AI Engineering. Wyss clarifies the difference between AI Engineering and Machine Learning Engineering and offers practical advice for aspiring engineers who want to incorporate data science, AI, and machine learning into their w…
  continue reading
 
Marina Wyss, Senior Applied Scientist at Twitch, joins Kyler and Ned to discuss her unique path from political science to AI Engineering. Wyss clarifies the difference between AI Engineering and Machine Learning Engineering and offers practical advice for aspiring engineers who want to incorporate data science, AI, and machine learning into their w…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now. Broken Object Level Authorization (BOLA) is eating the API economy from the inside out. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You …
  continue reading
 
AI tools continue to evolve - what can we do with them today? Richard chats with Cecilia Wirén about her experiences using the latest AI tools to support DevOps workflows, diagnostics, and the crafting of new scripts. Cecilia focuses on tools that can help admins who occasionally work on scripts, including getting into a GitHub workflow to track pr…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system. IAM isn’t security by default. Learn how common IAM anti-patterns create false confidence, enable breaches, and how to fix them before it’s too late. Check more stories related to cybersecurity at: htt…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing. Security isn't about generating paperwork; it's about finding the cracks before the water gets in. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
  continue reading
 
A new year - and so much to do! To start 2026, Richard flies solo again to discuss the issues he's seen on sysadmins' minds as we head into the new year. Obviously, AI is eating up a lot of the conversation from many different angles: tools that can help us be more productive, security issues in our organizations due to misuse, and now, AI-driven h…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play