Kubernetes Bytes is a podcast bringing you the latest from the world of cloud native data management. Hosts Ryan Wallner and Bhavin Shah come to you from Boston, Massachusetts with experienced backgrounds in cloud-native tech. They'll be sharing their thoughts on recent cloud native news and talking to industry experts about their experiences and challenges managing the wealth of data in today's cloud-native ecosystem.
…
continue reading
Kubernetes Bytes Podcasts
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
…
continue reading
Podcast about the web industry, tools and techniques upcoming and in use today hosted by Adam Listek. Support this podcast: https://podcasters.spotify.com/pod/show/bit-v-byte/support
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
1
D2DO286: Scaling Kubernetes Across Clouds – Identity, DNS, and Security
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39If you think managing Kubernetes clusters is hard, what about managing Kubernetes clusters across three different public clouds? We dive into the challenges that arises from running multi-cloud Kubernetes workloads. These challenges include workload identity, DNS query resolutions, and security. Here to help us navigate this complexity and offer po…
…
continue reading
1
PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corp…
…
continue reading
1
NAN105: Campus Network Automation, Powered by Cisco Agentic Workflows (Sponsored)
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30Cisco Workflows is a new platform that makes network automation easier, smarter, and safer. On today’s episode, sponsored by Cisco, we get introduced to Cisco Workflows by Stephen Orr, Distinguished Solutions Engineer; and Reid Butler, Director of Product Management. They break down how Workflows helps you ditch repetitive tasks, roll out changes f…
…
continue reading
nOversight is a Wi-Fi analysis app from Numerous Networks for iOS and Mac iOS that helps both end users and professionals do a better job of understanding how their Wi-Fi is running and how it’s working on their individual devices. Today we talk to Ben Toner, the creator of nOversight to give us the details... Read more »…
…
continue reading
1
NB550: A Cornucopia of AI Switches; DNS Strikes Again
29:38
29:38
Play later
Play later
Lists
Like
Liked
29:38Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... R…
…
continue reading
1
1031 TNO048: Ops to Orchestrated: An Architect’s Automation Journey
42:09
42:09
Play later
Play later
Lists
Like
Liked
42:09On today’s show, sponsored by Itential, we talk about automation in the real world. Guest Jesse Ford is an automation architect at Itential. We talk about his career journey, how he got into network automation, how he decides which is the best tool for a job, and why tool diversity isn’t the same as chaos.... Read more »…
…
continue reading
On today’s episode, we take a break from one’s and zero’s for a discussion about starting a networking meetup. Our guest is Steinn “Steinzi” Örvar, who recently founded the ISNOG, a network operators’ group in Iceland. We quiz Steinzi about what worked and what didn’t. We also pick his brain for the nitty-gritty details about... Read more »…
…
continue reading
1
LIU003: A Chat With ‘The Cloud Therapist’
44:24
44:24
Play later
Play later
Lists
Like
Liked
44:24Your background and experiences outside of tech can become a significant factor in your tech career. Guest Chris Williams is a good example; he talks about how his undergraduate and graduate studies in psychology influenced his work as a Developer Relations Manger at Hashicorp. Hosts Alexis Bertholf and Kevin Nanns chat with him about how... Read m…
…
continue reading
1
PP084: Inside the CVE Process With Cisco (Sponsored)
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that…
…
continue reading
Join William Collins and Evyonne Sharp as they catch up on all things AI. They discuss the AI bubble and how it relates to venture capital, stock, and company evaluations. They talk about the AI experience for the average person, the adoption rate of AI tools, and how the AI infrastructure buildout might affect the... Read more »…
…
continue reading
1
NAN104: The Art and Science of Writing a Network Automation Book
57:53
57:53
Play later
Play later
Lists
Like
Liked
57:53Host Eric Chou talks with Jeff Kala, co-author of the newly released “Network Automation Cookbook 2nd Edition,” to discuss his book and the experiences that led him from networking to network automation author. They discuss Jeff’s learning style and why it was helpful when working on his book. Lastly, they dig into Jeff’s predictions on... Read mor…
…
continue reading
1
HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You’re (Probably) Doing It Wrong
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »…
…
continue reading
1
NB549: Startups Take on Switch, ASIC Incumbents; Google Claims Quantum Advantage
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »…
…
continue reading
1
Tech Bytes: Why Equinix Should Be Part of Your AI Network Strategy (Sponsored)
18:40
18:40
Play later
Play later
Lists
Like
Liked
18:40AI infrastructure conversations tend to be dominated by GPUs, data center buildouts, and power and water consumption. But networks also play a crucial role, whether to support huge file transfers to a compute cluster, stream telemetry from edge locations to feed AI pipelines, or provide high-speed, low latency connectivity for AI agents. On today’s…
…
continue reading
1
HN802: Unifying Networking and Security with Fortinet SASE: Architecture, Reality, and Lessons Learned (Sponsored)
58:39
58:39
Play later
Play later
Lists
Like
Liked
58:39The architecture and tech stack of a Secure Access Service Edge (SASE) solution will influence how the service performs, the robustness of its security controls, and the complexity of its operations. Sponsor Fortinet joins Heavy Networking to make the case that a unified offering, which integrates SD-WAN and SSE from a single vendor, provides a... …
…
continue reading
1
TNO047: Advice From Both Sides of the Network Aisle
49:35
49:35
Play later
Play later
Lists
Like
Liked
49:35Senad Palislamovic has held many roles in his time, from engineer to network operator to sales engineer and back again. He’s been around long enough to see trends come and go. Senad visits Total Network Operations to share some of his observations on network automation, AI for NetOps, and the quality of network data. Senad... Read more »…
…
continue reading
1
IPB186: An Inside Look at RFC 9872 for Discovering v6 Prefixes
20:10
20:10
Play later
Play later
Lists
Like
Liked
20:10RFC 9872 makes recommendations for NAT64 prefix discovery for hosts supporting v4-to-v6 translation. Co-host Nick Buralgio is a co-author of this RFC, so we’re taking the opportunity to talk about it in detail. We discuss the problems RFC 9872 is addressing and why a new RFC was needed for operational guidance, not necessarily defining a... Read mo…
…
continue reading
1
N4N041: Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB)
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58If you’ve ever wondered what the difference is between a Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB), today’s show is for you! Ethan Banks and Holly Metlitzky start with some history and the basics of communication between layer 2 and layer 3 and then explain how the concepts of SVI and IRB... Read more »…
…
continue reading
1
D2DO285: The Death of IaC Has Been Greatly Exaggerated
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52While declaring the death of Infrastructure as Code (IaC) or Terraform may get you clicks on LinkedIn, IaC is alive and kicking. On today’s Day Two DevOps we talk about why IaC still matters. Guest Malcolm Matalka argues that IaC provides the tools and a model for managing infrastructure across its lifecycle in a structured... Read more »…
…
continue reading
1
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
…
continue reading
A wireless-first office is a sensible goal these days when most laptops don’t have an Ethernet port and lots of devices use Wi-Fi. Wireless and network architect Phil Sosaya led the transition to wireless-first offices at sites across the globe. He details his design approach, including why he doesn’t bother with site survey software. He... Read mo…
…
continue reading
1
NB548: Broadcom Brings Chips to Wi-Fi 8 Party; Attorneys General Scrutinize HPE/Juniper Settlement
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16Take a Network Break! On today’s coverage, F5 releases an emergency security update after state-backed threat actors breach internal systems, and North Korean attackers use the blockchain to host and hide malware. Broadcom is shipping an 800G NIC aimed at AI workloads, and Broadcom joins the Wi-Fi 8 party early with a sampling of pre-standard... Re…
…
continue reading
1
HN801: Will a Natural Language Interface (NLI) Replace Your CLI?
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51Could an LLM or some kind of an AI-driven language model, such as a natural language interface, someday replace our beloved CLI? That is, instead of needing to understand the syntax of a specific vendor’s CLI, could a language model allow network operators to use plain language to get the information they need or the... Read more »…
…
continue reading
1
TNO046: Prisma AIRS: Securing the Multi-Cloud and AI Runtime (Sponsored)
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud net…
…
continue reading
1
LIU002: Do You Need a College Degree to Succeed in IT?
1:02:29
1:02:29
Play later
Play later
Lists
Like
Liked
1:02:29A college degree can be a useful stepping stone into a tech career, and it certainly doesn’t hurt to have it on your resume. But do you really need that college degree to succeed in IT? Maybe, maybe not. Today’s guest is Wes Noonan, whose non-traditional path into and through a career in IT has... Read more »…
…
continue reading