Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cisco Systems Podcasts

show episodes
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Artwork

4
Tech Deep Dive

ITBroker.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Almost $5 trillion dollars are spent on Information Technology (IT) annually. Cut through the hype and learn about the real needs, and problems that IT solves for your enterprise. Join us as we dive deep into case studies with providers and learn how IT can make your business better.
  continue reading
 
Yuval Boger, Chief Commercial Officer at QuEra, hosts thought leaders in quantum computing, quantum sensing, and quantum communications to discuss business and technical aspects that impact the quantum ecosystem. Full transcripts are available at podcast.yboger.com
  continue reading
 
Artwork
 
Welcome to Ventev's podcast! Here you can listen to industry and subject matter experts share their knowledge and experiences around wireless network deployment, interoperability with leading network manufacturers, innovative solutions from Ventev, and much more. Hosted by master podcaster, Jonathan Davy, and industry expert, Jared VanAllen, in the United States, follow our podcast for the latest episodes twice a month!
  continue reading
 
Artwork

1
Signal Integrity Journal Podcast

Signal Integrity Journal (SIJ)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast series is hosted by SIJ Technical Editor, Eric Bogatin and includes fireside chats with members from the Signal Integrity Journal community who are experts in their field and have a commitment to providing training and education in SI, PI, and EMC/EMI issues for other engineers. Podcast sponsored by: Rohde & Schwarz.
  continue reading
 
Artwork

1
Punk CX: Customer Experience Insights with Adrian Swinscoe

Adrian Swinscoe | Customer Experience Strategy Expert

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Adrian Swinscoe discusses customer experience and strategy with industry leaders in this engaging series about how to deliver a standout customer experience and service. Topics covered in the interviews include customer service, customer experience, customer engagement, employee experience, employee engagement, technology, adaptable and responsive organizations, digital transformation, high-performing teams, how to best leverage artificial intelligence to drive better outcomes, other new tec ...
  continue reading
 
Artwork
 
Gamma Electronics presents DAS Talk, hosted by Peter Weyherter and Philip Nicholas aims to increase competency and awareness among integrators, AHJs, builders, and stakeholders involved in ERCES. We strive to inspire more organizations in this field through a blend of technical depth and accessible conversation, positioning our podcast as a go-to resource for professionals and individuals at the intersection of technology, safety, and communication
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

4
AI News Daily

brief.news

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Watch Nationally Syndicated Car Concerns USA Radio Show Every Week-day Morning Starting at 9:00 A.M. (EST). USA TOLL-FREE: 1-855-CAR-CONCERNS (855-227-2662) @ http://bit.ly/cwAyD7 Car Concerns Is The Fastest Growing Car Talk Radio Show In The USA! Car Concerns is Nationally Syndicated Radio Talk Show That is Heard In Great USA Radio Markets Like Boston, Chicago, Las Vegas, Pittsburgh, Winter Springs, Botell, Hagatna and Other Great Cities Around The Nation. Is Car Concerns Heard In Your Town ...
  continue reading
 
Loading …
show series
 
(0:10): Snap Partners with Perplexity AI for In-App Search, Aiming to Outshine TikTok and Meta (2:35): SoftBank and OpenAI Launch Japan-Focused AI Platform 'Cristal Intelligence' to Transform Industries (4:47): Chan Zuckerberg Initiative Shifts Focus to AI-Driven Science, Doubling Biohub Funding in $1 Billion Push (7:11): Alphabet's AI Data Centre …
  continue reading
 
What does network testing and validation really mean? How do testing and validation fit within an automation workflow? Is it possible to run meaningful tests without coding skills? Dan Wade from BlueAlly answers these questions and offers practical insights into building trust in automation through test environments, using AI for ideation and probl…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
You know that moment when the alerts start flooding in, and your entire network goes dark? Systems down. Phones silent. Operations frozen. Now imagine that happening inside a prison. Six hundred of them. One outage away from chaos. In this conversation, Max Clark sits down with Oliver Maxwell from APX Net, Inc who had to build a network that litera…
  continue reading
 
(0:10): India Unveils AI Governance Guidelines: A People-First Framework for Safe, Responsible AI Adoption (2:29): Vitality and Google Launch AI Platform to Revolutionize Personalized Health and Disease Prevention (5:29): Stream Ring: Revolutionary AI Wearable for Effortless Note-Taking and Privacy (7:39): MoEngage Secures New Funding to Expand AI-…
  continue reading
 
Today’s episode of the Punk CX podcast features a chat that I recently had with Matt Healy, Senior Director of Product Marketing at Pega, where we talk about legacy transformation, how big some of the legacy challenges facing firms are, how Pega is responding, why it’s important for organisations to have a real strategy with respect to AI agents in…
  continue reading
 
(0:10): Amazon Secures $38B AWS Deal with OpenAI, Fuels AI Cloud Demand Amid Mixed Market Signals (2:03): UK Court Ruling Favors Stability AI Over Getty Images: AI Training Legal Questions Persist (3:39): Cisco's Unified Edge Revolutionizes AI by Bringing Compute and Security Closer to Data (5:50): €1 Billion AI Cloud Hub in Munich to Boost Europe'…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
(0:10): US Approves Nvidia AI Chip Exports to UAE Amid AI Investment Surge, Sparking Security Concerns (1:42): IIT Madras Unveils AI Framework PURE to Revolutionize Drug Synthesis and Material Discovery (3:45): Cloudian and NVIDIA Forge Sovereign AI Alliance Across Asia-Pacific, Boosting Data Sovereignty and Compliance (6:34): AI Artist Xania Monet…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
On today’s show, sponsored by Itential, we talk about automation in the real world. Guest Jesse Ford is an automation architect at Itential. We talk about his career journey, how he got into network automation, how he decides which is the best tool for a job, and why tool diversity isn’t the same as chaos.... Read more »…
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
Today’s episode of the Punk CX podcast features a chat that I had with Miranda Collard, who is the CEO of the Americas at TP (formerly Teleperformance). Miranda and I talk about Miranda’s career journey from employee #27 to now being the CEO of the Americas, how she still takes customer calls, why the future of CX isn’t about bots versus humans, ho…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
(0:10): China's AI-Powered Military Tech Advances: Robot Dogs, Drone Swarms, and DeepSeek's Rapid Scenario Analysis (3:01): $1 Billion AMD-DOE Partnership Unveils AI Supercomputers Lux and Discovery for Scientific Breakthroughs (5:22): OpenAI Unveils 'Chats for Students' in India: Revolutionizing Study and Skill Development with ChatGPT (8:04): Poo…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
OpenAI's New AI Tool Revolutionizes Music Creation Amid Legal and Ethical Challenges Hyperscale Tech Giants Embrace Hybrid Energy Amid AI-Driven Power Surge Anthropic's AI Triumphs in Enterprise Market, Outshines OpenAI with $9 Billion Revenue Projection Nvidia Becomes First $4 Trillion Company, Eyes $10 Trillion Valuation with AI and GPU Growth ER…
  continue reading
 
Bill joins Yuval Boger to discuss SAS’s vendor-agnostic, hybrid approach to quantum and analytics. Highlights include D-Wave warm-starts that let SAS prove optimal kidney-exchange solutions in seconds, as well as QML pilots for fraud and bankruptcy modeling and disaster response. He shares a pragmatic definition of “quantum advantage”, treating QPU…
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
(0:10): Amazon Unveils AI Shopping Feature 'Help Me Decide' Amid Privacy and Bias Concerns (2:40): AI Revolutionizes Healthcare: Faster, Accurate Diagnostics Transforming Patient Outcomes (4:36): Krafton Embraces 'AI-First' Strategy with $70M Investment to Revolutionize Gaming Development and Operations (7:06): Questel Unveils Sophia Platform: Revo…
  continue reading
 
Senad Palislamovic has held many roles in his time, from engineer to network operator to sales engineer and back again. He’s been around long enough to see trends come and go. Senad visits Total Network Operations to share some of his observations on network automation, AI for NetOps, and the quality of network data. Senad... Read more »…
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
(0:10): Google Eyes $9B AI Revenue with Anthropic Cloud Deal; Stock Soars Amid Growth Optimism (1:55): OpenAI Boosts UK AI Growth with Local Data Residency and Public Service Innovations (4:46): Netflix Leverages AI for Efficiency Amidst Deepfake Concerns and Stock Drop (7:17): Meta and Blue Owl Launch $27B Hyperion Data Center for AI Expansion in …
  continue reading
 
Ever feel trapped in the endless cycle of network refreshes, license renewals, and “surprise” upgrade costs? You’re not alone. One school faced the same uphill battle and decided to break free. The result? A $250K turnaround and a totally new way of thinking about IT infrastructure. In this episode, Max Clark sits down with Francisco Tello, Senior …
  continue reading
 
Today’s episode of the Punk CX podcast features a chat that I had with Tom Eggemeier, the Chief Executive Officer of Zendesk, following the conclusion of Zendesk’s recent AI Summit. We talk about the highlights from the event, what’s different from what they announced at Relate back in March, how they now have 20,000 customers using their AI and wh…
  continue reading
 
(0:10): Napster Returns with $99 Holographic AI Device for MacBooks, Transforming 3D Video Chats and Digital Twins (2:31): Revolutionary Optical System Delivers Quantum-Secure 1.6 Terabit Speed for AI Data Centers (4:24): ESMO Unveils ELCAP: New AI Guidelines for Safe Oncology Practice (6:32): Pittsburgh Hosts Global Innovation Summit, Showcasing L…
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them!
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play