Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Byte The Cloud public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Kubernetes Bytes

Ryan Wallner & Bhavin Shah

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Kubernetes Bytes is a podcast bringing you the latest from the world of cloud native data management. Hosts Ryan Wallner and Bhavin Shah come to you from Boston, Massachusetts with experienced backgrounds in cloud-native tech. They'll be sharing their thoughts on recent cloud native news and talking to industry experts about their experiences and challenges managing the wealth of data in today's cloud-native ecosystem.
  continue reading
 
Artwork

1
Energy Bytes

Digital Wildcatters

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to Energy Bytes - your essential guide to the intersection of data and energy. Hosted by industry veterans John Kalfayan and Bobby Neelon, this podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unpar ...
  continue reading
 
Artwork

1
Bricks And Bytes

Bricks And Bytes

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
A show about construction technology, business, and entrepreneurship. Welcome to the Bricks and Bytes Podcast, where we bring together the worlds of construction, technology, and entrepreneurship. We explore the innovative ideas and groundbreaking advancements that are shaping the future of the industry.
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Artwork
 
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
  continue reading
 
We've all been there – trapped in the spotlight, grappling with that dreaded question, "Where do you see yourself in ten years?" Even if you know exactly what you want to do, it’s hard to stop the self-doubting thoughts that occasionally creep into your mind. The burden of expectation and the fear of making the wrong decision can cloud our vision. With Pathsetters: No Fear, 10 Years, we turn the confusion into a canvas full of limitless possibilities. Whether you’re curious about a specific ...
  continue reading
 
Loading …
show series
 
How far ahead should you plan, and what things belong in your strategic plan? Conventional wisdom holds that a 3-year planning horizon is “about right”–but in a period of rapid technical and geopolitical change (such as we’re arguably in right now) does that go too far out, particularly when agile methodologies recommend shorter action plans... Rea…
  continue reading
 
Take a Network Break! Guest co-host Tom Hollingsworth steps in for Johna Johnson. We start with Google patching a significant Chrome vulnerability and de-elevating Chrome running with admin rights when it launches on Windows. On the news front, we discuss a report, unconfirmed as of recording time, that Arista is acquiring VeloCloud, then discuss B…
  continue reading
 
AI is no longer on the horizon. It’s part of how people and products work today. And as AI finds its way into more business applications and processes, it can create new risks. On today’s Tech Bytes, sponsored by Palo Alto Networks, we talk about how Palo Alto Networks is addressing those risks so that... Read more »…
  continue reading
 
While studying for the CCIE Service Provider certification, Andrew Ohanian assembled a workbook to help him prepare. It’s packed with lab exercises, and Andrew has turned it into a free Web resource that anyone can access. On today’s Heavy Networking, we talk with Andrew about what’s in the guide, the state of the CCIE SP,... Read more »…
  continue reading
 
Michael Costello shares his career journey on today’s Total Network Operations. Currently on the Board of Directors at NANOG and a Distinguished Engineer at Saviynt, Michael talks about his early days learning the ropes as a junior network engineer, trying to start an ISP, his stint in graduate school, and a very interesting role at... Read more »…
  continue reading
 
Our IPv6 Basics series continues with link-local addresses. Link-local addresses are unicast addresses used for addressing on a single link. The intent of link-local addresses is to let devices that may not have a router or global unicast address allocation mechanism still be able to communicate on a network segment. On today’s show we dig... Read …
  continue reading
 
How do you measure developer performance and productivity? On today’s Day Two DevOps, we look at different methods with guest Laura Tacho, the CTO at DX. We explore industry benchmarks such as the DORA report, SPACE, and DevEx. Laura also introduces us to Core 4, a project she’s been working on that provides a new... Read more »…
  continue reading
 
Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today’s Packet Protector we talk with Gerald Combs of the Wireshark Foundati…
  continue reading
 
"I remember bringing Tracy Young to my job site when PlanGrid was just an MVP. She offered us the software for free - we just needed to provide the iPads. My PM and PX didn't get it. They told me, 'Don't waste my time like that again.'" In today's episode of Bricks & Bytes, we had Tom Feliz share his journey from construction sites to tech leadersh…
  continue reading
 
Today on Heavy Wireless we welcome Francois Verges, who designed a database tool to help Wi-Fi engineers easily find client device capabilities. It provides quick access to key specs like data rates, Wi-Fi versions, and vendor documentation. It’s designed to be a go-to option when looking for Wi-Fi client specifications. We discuss why he developed…
  continue reading
 
Take a Network Break! We start with follow-up from a listener on the best way to listen to our podcast that helps the most. The answer? Any listen on any platform helps. Even better is to tell a friend! We discuss two critical security issues. First, CISA adds active exploits against known SonicWall vulnerabilities to... Read more »…
  continue reading
 
SharkFest is the twice-yearly conference where Wireshark users and trainers gather to learn, share, and improve their packet and protocol analysis skills. The US version of SharkFest’25 is June 14 -19 in Richmond, VA. Gerald Combs of the Wireshark Foundation is here to tell us about why this live event needs to be on your... Read more »…
  continue reading
 
On today’s Heavy Networking we talk with Dan Wade about testing the network, inspired by Dan’s talk at AutoCon 2: “Step 0: Test the Network.” We discuss why testing is a good idea, and then explore four types of network testing, including unit tests and integration tests. We dig into Yang, RESTCONF, NETCONF and gNMI... Read more »…
  continue reading
 
"53% of the construction workforce is expected to retire by 2036. And that number is going up, not down." In today's episode of Bricks & Bytes, we had Kris from Procore and we got to learn about their just-released Future State of Construction 2025 report, which reveals how technology will transform productivity, design, decision-making, and the wo…
  continue reading
 
Network monitoring, Internet monitoring, and observability are all key components of NetOps. We speak with sponsor Catchpoint to understand how Catchpoint can help network operators proactively identify and resolve issues before they impact customers. We discuss past and current network monitoring strategies and the challenges that operators face w…
  continue reading
 
On this episode of Technically Leadership, we’re joined by Aleksandra Lemańska to learn about the Process Communication Model (PCM), a framework for enhancing communication. Alex calls PCM an algorithm for people, and it can be useful for improving interactions with engineers and technical folks operating in high-stress environments. We talk about …
  continue reading
 
The Dynamic Host Configuration Protocol (DHCP) assigns an IP address to a host that joins a network, along with other information necessary for the host to communicate. DHCP also has more to it, so this week’s episode is meant to be a solid introduction to this essential network protocol. We first discuss what it is... Read more »…
  continue reading
 
Today’s guest is Jeff Doyle, an expert in the networking industry with over 30 years of experience as a consultant, instructor, architect, author, and speaker. Eric chats with Jeff about his background and how he got into networking (spoiler: it was not a computer science degree!). The conversation explores Jeff’s current work and delves into... Re…
  continue reading
 
Send us a text Consulting Engineers (CEs) at networking vendors blend deep technical expertise with customer-facing skills to bridge the gap between account managers and specialized solution design. They operate as specialists who support Sales Engineers when customer requirements demand deeper technical knowledge. • CEs often join from traditional…
  continue reading
 
New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
  continue reading
 
It’s all well and good to develop a technology strategy, articulate and document the strategy, and agree (supposedly) on that strategy. But what do you do when one or more of the tech teams act in apparent opposition to the strategy? John and Johna discuss why this happens and what questions you need to ask... Read more »…
  continue reading
 
"The best salespeople don't need to talk about their successes - they focus on what went wrong and how to improve. At Joist AI, we don't want to hear about past wins, only lessons learned." In today's episode of Bricks and Bytes, We had Anton Marinovich from Joist AI and he shared his construction tech go-to-market journey from my father's masonry …
  continue reading
 
Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read…
  continue reading
 
On today’s Heavy Networking, a roundtable panel considers whether a modern network needs to be built around underlays and overlays. This isn’t just Ethan yelling at clouds. This is a legitimate question pondering the real-world value of an overlay/underlay approach. Is overlay everywhere overkill, or is that the architecture we need to deliver a sa…
  continue reading
 
"The best renewal is no renewal. So closing a three-year agreement, right?" In today's episode of our Go To Market Series from the Bricks & Bytes Podcast, we have Kevin Halter (CRO of OpenSpace) share his journey from scaling PlanGrid from $5M to $100M+ ARR and building high-performing sales teams in construction tech. Tune in to find out about: ✅ …
  continue reading
 
Doug Madory has been called “The Man Who Can See the Internet.” Doug has developed a reputation for identifying significant developments in the global layout of the internet. He joins us today to discuss his role in analyzing internet data to identify trends and insights. He shares his journey from a data QA position to... Read more »…
  continue reading
 
Today we talk with Tommy Jensen, a Senior Technical PM Strategist at Microsoft, about IPv6 support in Windows. Tommy shares what he hears from enterprises that are moving toward IPv6-mostly, strategies for dealing with older applications and devices that expect IPv4, and how the customer conversations he’s having about IPv6 now are more engaged and…
  continue reading
 
Loading …
Listen to this show while you explore
Play