Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Server Operating Systems Podcasts

show episodes
 
Artwork

1
Desktop Linux’s New Era

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We’re back just in time for a chat with Canonical’s VP of Engineering, Jon Seager, on Ubuntu 25.10, the new era of desktop Linux that seems to be emerging, and more. Then, we reveal what really happened when we visited the COSMIC desktop team, and the surprises they had waiting for us.
  continue reading
 
Artwork

1
Linux Out Loud

TuxDigital Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Linux Out Loud is a community powered podcast. We take conversations from the Community from places like the Discourse Forums, Telegram group, Discord server and more. We also take topics from other shows around the network to give our takes. Linux Out Loud podcast is brought to you by the TuxDigital Network (https://tuxdigital.com/)!
  continue reading
 
Artwork

1
Linux Matters

Linux Matters

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join 3 experienced Open Source professionals as they discuss the impact Linux has in their daily lives. Upbeat family-friendly banter, conversation and discussion for Linux enthusiasts and casual observers of all ages. A new episode every two weeks covering terminal productivity, desktop experience, development, gaming, hosting, hardware, community, cloud-native and all the Linux Matters that matter.
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Master the CompTIA Server+ exam with Audio Course—your audio companion for server hardware, administration, security, and troubleshooting. Every episode simplifies exam objectives into practical insights you can apply in real-world IT environments. Produced by BareMetalCyber.com, where you’ll find more prepcasts, books, and resources to power your certification success.
  continue reading
 
Android isn’t just phones. It's a complex ecosystem. It’s feature-filled. It’s customizable. Each week, Jason Howell will take a closer look at the Android operating system as well as the unique devices running it worldwide. From feature spotlights, to tips and tricks, and even reviews of apps that make Android so much fun, Hands-On Android will change how you use your smartphone for the better. Screen reader support enabled. Although the show is no longer in production, you can enjoy episod ...
  continue reading
 
Artwork

1
Compiler

Red Hat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
  continue reading
 
Artwork

1
Page it to the Limit

PagerDuty Developer Relations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Page It to the Limit is a podcast that focuses on what it means to operate software in production. Hosted by the PagerDuty Developer Relations Team, we cover the leading practices used in the software industry to improve both system reliability and the lives of the people responsible for supporting it.
  continue reading
 
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
  continue reading
 
Android isn’t just phones. It's a complex ecosystem. It’s feature-filled. It’s customizable. Each week, Jason Howell will take a closer look at the Android operating system as well as the unique devices running it worldwide. From feature spotlights, to tips and tricks, and even reviews of apps that make Android so much fun, Hands-On Android will change how you use your smartphone for the better. Screen reader support enabled. Although the show is no longer in production, you can enjoy episod ...
  continue reading
 
Blueprint Synergy Solutions proudly offers premium Managed IT Services in Denver, CO, designed to help businesses thrive in an increasingly digital world. Whether you're a small business or an enterprise-level organization, our IT solutions are built to scale with your needs while maintaining peak performance, security, and compliance. We provide 24/7 proactive monitoring, real-time threat detection, and seamless system updates to ensure your infrastructure is always secure and operational. ...
  continue reading
 
Loading …
show series
 
This week on Linux Out Loud, we're plugging into the source! We kick things off with a look at the wild world of robotics competitions, from the destructive Norwalk Havoc Robot League to updates on our local FLL and FTC teams. Then, we dive into a heated discussion on the great Endianness debate shaking up the RISC-V community and what the 90-10 ru…
  continue reading
 
Our cross-continent race to Texas Linux Fest culminates into fantastic meat, meetups, and more. Sponsored By: Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution fo…
  continue reading
 
In this episode: Alan has been manifesting Snaps. Martin has snapped and switched from MacOS to Linux with a Framework. Mark used Immich to find family favourite snaps. You can send your feedback via [email protected] or the Contact Form. If you’d like to hang out with other listeners and share your feedback with the community, you can join: The…
  continue reading
 
Join Steve Goodman and Paul Robichaux as they discuss Microsoft’s latest AI updates – from Copilot Chat coming to all Microsoft 365 apps (no license required) to Teams getting AI agents in meetings, channels, and communities. They also warn about the rise of “AI-generated workslop” cluttering our workflows, and dig into why many Copilot pilot proje…
  continue reading
 
From finely tuned to total config carnage. We review listener homelabs to share what works, and what really doesn't. Sponsored By: Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a dev…
  continue reading
 
Our trust in the internet is the lowest it’s ever been. In spite of our vigilance, we face more threats than ever before. Product security is a vital element in the defense against malicious incursions. This season of Compiler covers the particulars of product security. With some help from Emily Fox, Portfolio Security Architect at Red Hat, our hos…
  continue reading
 
Can't get enough Linux? How about multiple kernels running simultaneously, side by side, not in a VM, all on the same hardware; this week it's finally looking real. Sponsored By: Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Managemen…
  continue reading
 
This week on Linux Out Loud, the gang gets totally rad as they dial into the mainframe and get down to business! Nate and Bill go head-to-head in a network showdown, discussing the merits of building a custom, open-source network versus the "set it and forget it" convenience of prosumer gear. The team also tackles Nate's Framework Laptop firmware w…
  continue reading
 
In this episode: Mark has been retro gaming with an Evercade. Martin replaced the official Dropbox client with Maestral. Alan created an MCP server for Grype. You can send your feedback via [email protected] or the Contact Form. If you’d like to hang out with other listeners and share your feedback with the community, you can join: The Linux Mat…
  continue reading
 
Our first look at KDE Linux, then Chris shares the latest on Hyprvibe, while Wes braves his first install. Sponsored By: Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust …
  continue reading
 
Join Steve Goodman and Paul Robichaux as they unpack Microsoft’s latest Copilot Studio updates, including new licensing terminology, human-in-the-loop features, and real-time protection for AI agents. Plus, hear how Jan can help you test AI agents locally before deploying them in Microsoft 365, and get their take on Microsoft’s quiet reversal of it…
  continue reading
 
Phishing. DDoS attacks. Social engineering. These are not new terms if you know anything about cybersecurity. But emerging technologies are making these well-known methods of attack easier than ever. Bad actors are paying attention—and they are leveling up their skills accordingly. It isn’t just cybersecurity professionals who have to be aware and …
  continue reading
 
Chris managed to turn low bandwidth into a lifestyle, and curated a batch of self-hosted apps that make near-offline living possible. Sponsored By: Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Ma…
  continue reading
 
In this episode: Martin has been running Linux on an iPad using a-Shell, a-Shell mini, and iSH. He also used copyparty. Alan went to a hackathon and used Tessl. If you want to try their closed beta, join their discord and tell them popey sent you. Mark installed GrapheneOS on a Pixel 8a. You can send your feedback via [email protected]. If you’d…
  continue reading
 
Google's sideloading lockdown has us pushing Wes' Pixel further than Google ever dreamed. Sponsored By: Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for comp…
  continue reading
 
Arch is under fire, two weeks and counting. We'll break down the mess, and share a quick fix. Plus, the killer new apps we've just added to our homelabs. Sponsored By: Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Passwor…
  continue reading
 
This episode explains how misconfigured network interface cards (NICs) and VLAN settings can disrupt server connectivity. We cover issues such as incorrect VLAN tagging, mismatched speed and duplex settings, and disabled interfaces. The discussion includes how multi-NIC configurations require careful planning for load balancing, redundancy, or VLAN…
  continue reading
 
This episode focuses on diagnosing network connectivity failures by examining IP assignment, name resolution, and routing paths. We explain how DHCP misconfigurations can lead to incorrect or missing IP addresses, how DNS issues prevent hostname resolution, and how routing problems can block communication between subnets or external networks. We pr…
  continue reading
 
This episode covers how incorrect configurations and missing dependencies can prevent services from starting or functioning correctly. We discuss common causes, such as incorrect file paths, insufficient permissions, or disabled services. Identifying these issues often requires checking configuration files, logs, and service dependencies. Practical…
  continue reading
 
This episode explains how dependency issues and update conflicts can cause application or service failures. We discuss scenarios where software relies on specific versions of libraries, frameworks, or drivers, and how updates can inadvertently break functionality by replacing or removing required components. The importance of maintaining compatibil…
  continue reading
 
This episode addresses troubleshooting operating system and application problems, including failed logins, service outages, and patch installation errors. We explain how authentication misconfigurations, expired credentials, or corrupted profiles can block user access, while incomplete or incompatible patches can destabilize services. We connect th…
  continue reading
 
This episode examines how partition and file system errors can impact server operations. We explain problems such as partition misalignment reducing performance, corruption preventing access to data, and boot failures caused by damaged boot sectors or missing system files. The discussion includes how these issues can originate from improper setup, …
  continue reading
 
This episode focuses on diagnosing problems with host bus adapters (HBAs) and storage controllers, which are critical for connecting servers to storage devices. We discuss symptoms of adapter failure, such as intermittent connectivity, degraded performance, and device detection errors. Configuration mismatches, outdated firmware, and driver incompa…
  continue reading
 
This episode covers how to identify and resolve storage-related failures in server environments. We explain symptoms such as inability to mount volumes, significantly degraded read/write speeds, and corrupted files. Common causes include failing drives, controller faults, cabling issues, and file system corruption. Real-world and exam-relevant exam…
  continue reading
 
This episode explains how RAID misconfigurations can lead to degraded performance, data loss, or complete array failure. We discuss common causes such as incorrect drive order, mismatched drive sizes, incompatible RAID levels for the workload, and improper rebuild procedures. The importance of verifying configuration settings against vendor guideli…
  continue reading
 
This episode examines how to use visual and auditory indicators to troubleshoot hardware problems. We discuss interpreting status LEDs, reading LCD panel error codes, and recognizing abnormal sounds such as failing fans or clicking drives. The importance of detecting unusual smells, like burnt circuitry, as a sign of component failure is also cover…
  continue reading
 
This episode covers how a failing CMOS battery can cause time drift, loss of BIOS settings, and boot failures. We explain the function of the CMOS battery in maintaining system configuration when power is removed, and how to identify symptoms of failure. Lockup events related to power issues are also discussed, including those caused by unstable po…
  continue reading
 
This episode explains how to diagnose Power-On Self-Test (POST) errors and intermittent system lockups that indicate potential hardware problems. We discuss common beep codes, LED indicators, and error messages displayed during startup, as well as how they map to specific hardware components. Lockups that occur after startup are also examined for p…
  continue reading
 
This episode focuses on troubleshooting server memory problems, from application crashes to full system halts. We explain how to interpret memory dumps, identify faulty DIMMs, and use diagnostic tools to confirm suspected issues. The discussion also includes how improper memory configurations, such as mismatched speeds or unsupported sizes, can lea…
  continue reading
 
This episode explains how predictive failure technologies and monitoring tools can identify hardware issues before they cause outages. We discuss using SMART data for drives, temperature and fan speed sensors for CPUs, and vendor-specific monitoring utilities for servers. These early warnings allow administrators to schedule maintenance or replacem…
  continue reading
 
This episode focuses on documenting troubleshooting activities from the initial problem report to the final resolution. We discuss capturing details about symptoms, diagnostic steps, implemented changes, and verification results. Thorough documentation allows for faster resolution of similar issues in the future and provides a record for compliance…
  continue reading
 
This episode covers how to conduct a root cause analysis (RCA) to determine why a problem occurred and how to prevent its recurrence. We explain how to gather evidence, map the sequence of events, and identify both technical and process-related contributing factors. Documenting the findings is essential for long-term operational improvement. We the…
  continue reading
 
This episode explains the importance of verifying that a system is fully functional after implementing a fix. We discuss running validation tests, confirming service availability, and ensuring performance metrics are within acceptable ranges. Functional verification also involves checking related systems that may have been indirectly affected by th…
  continue reading
 
This episode focuses on executing the planned solution in a controlled environment. We cover making one change at a time, monitoring for its effect, and ensuring each adjustment aligns with the overall remediation strategy. Implementing changes incrementally reduces the risk of introducing new problems and makes it easier to isolate the source of a…
  continue reading
 
This episode explains how to create a detailed plan of action once the root cause of a problem is identified. We discuss outlining step-by-step remediation tasks, sequencing changes to minimize downtime, and identifying potential risks before implementation. The plan should also include a rollback procedure in case the fix causes unexpected issues.…
  continue reading
 
This episode focuses on testing the theory of probable cause to confirm whether it explains the observed issue. We discuss performing controlled changes, using diagnostic tools, and monitoring system behavior for improvement or recurrence of the problem. If the theory is confirmed, the next step is implementing a permanent fix; if not, the theory m…
  continue reading
 
This episode discusses how to form a theory of probable cause after gathering information about a problem. We explain how to use evidence from logs, performance metrics, and user reports to eliminate unlikely factors and focus on the most probable source of the issue. This step ensures troubleshooting efforts are targeted and efficient. We then exp…
  continue reading
 
This episode explains how replicating an issue helps confirm the root cause and ensures that corrective measures address the actual problem. We discuss how to safely recreate issues in test environments, document exact steps and conditions, and capture relevant logs or screenshots for further analysis. Detailed documentation also aids in escalation…
  continue reading
 
This episode focuses on the first step of the troubleshooting process: accurately identifying and scoping a problem. We discuss gathering user reports, reviewing monitoring data, and determining the affected systems or services. Scoping ensures the issue is clearly defined before any corrective action is taken, preventing wasted time on unrelated a…
  continue reading
 
This episode introduces Domain 4 of the CompTIA Server+ exam, which focuses on structured troubleshooting processes and the tools needed to resolve hardware, software, network, and security issues. We outline the methodology steps—problem identification, theory development, testing, implementation, and documentation—and explain how they ensure cons…
  continue reading
 
This episode covers hardware-level security measures that prevent unauthorized use or modification of server systems. We explain how to disable unused physical ports, set administrative BIOS passwords, and configure boot order to restrict booting from external media. These measures reduce the risk of unauthorized device access or operating system b…
  continue reading
 
This episode explains how to secure individual server hosts and applications through targeted hardening measures. We discuss deploying antivirus and anti-malware tools, ensuring timely application of patches, and disabling unnecessary application features or services. Application configuration best practices, such as enforcing authentication and en…
  continue reading
 
This episode focuses on securing a server operating system by applying hardening techniques that minimize vulnerabilities. We cover the importance of keeping systems fully patched, closing unused network ports, and disabling unneeded services. The discussion also includes reviewing startup processes, removing default accounts, and enforcing secure …
  continue reading
 
This episode reviews the regulatory and legal frameworks that affect server administration, focusing on requirements for protecting personally identifiable information (PII) and complying with industry-specific standards such as the Payment Card Industry Data Security Standard (PCI DSS). We explain how legal retention rules dictate how long certain…
  continue reading
 
This episode explains how security monitoring systems, particularly Security Information and Event Management (SIEM) platforms, collect and correlate logs from multiple sources to detect suspicious activity. We discuss how SIEM tools enable real-time alerting, historical analysis, and compliance reporting. The importance of role separation in monit…
  continue reading
 
This episode covers how to identify potential security breaches through event monitoring, anomaly detection, and forensic investigation. We discuss the signs of compromise, such as unusual network traffic, unauthorized configuration changes, or unexpected data transfers. The importance of timely breach recognition is emphasized, along with the lega…
  continue reading
 
This episode explains the dangers of backdoors—hidden access methods intentionally or unintentionally left in systems—and how they can be exploited by attackers. We also examine social engineering tactics used to manipulate individuals into revealing sensitive information or granting access, including phishing, pretexting, and baiting. Understandin…
  continue reading
 
This episode focuses on data loss prevention (DLP) strategies used to protect sensitive information from unauthorized access, duplication, or disclosure. We explain how DLP technologies monitor data movement across networks, block risky transfers, and enforce encryption requirements. Access controls, role assignments, and policy enforcement are dis…
  continue reading
 
This episode explores two major security risks: malicious software infections and insider threats. We explain how malware types such as ransomware, trojans, and worms can impact servers, along with the indicators of compromise that signal infection. Insider threats are addressed in terms of intentional sabotage, data theft, or accidental security b…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play