Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cisco Systems Podcasts

show episodes
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Yuval Boger, Chief Commercial Officer at QuEra, hosts thought leaders in quantum computing, quantum sensing, and quantum communications to discuss business and technical aspects that impact the quantum ecosystem. Full transcripts are available at podcast.yboger.com
  continue reading
 
Artwork

1
Signal Integrity Journal Podcast

Signal Integrity Journal (SIJ)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast series is hosted by SIJ Technical Editor, Eric Bogatin and includes fireside chats with members from the Signal Integrity Journal community who are experts in their field and have a commitment to providing training and education in SI, PI, and EMC/EMI issues for other engineers. Podcast sponsored by: Rohde & Schwarz.
  continue reading
 
Welcome to Ventev's podcast! Here you can listen to industry and subject matter experts share their knowledge and experiences around wireless network deployment, interoperability with leading network manufacturers, innovative solutions from Ventev, and much more. Hosted by master podcaster, Jonathan Davy, and industry expert, Jared VanAllen, in the United States, follow our podcast for the latest episodes twice a month!
  continue reading
 
Artwork
 
Gamma Electronics presents DAS Talk, hosted by Peter Weyherter and Philip Nicholas aims to increase competency and awareness among integrators, AHJs, builders, and stakeholders involved in ERCES. We strive to inspire more organizations in this field through a blend of technical depth and accessible conversation, positioning our podcast as a go-to resource for professionals and individuals at the intersection of technology, safety, and communication
  continue reading
 
Artwork
 
Techzine Talks on Tour is a podcast series recorded on location at the events Coen and Sander attend all over the world. A spin-off of the successful Dutch series Techzine Talks, this new English series aims to reach new audiences. Each episode is an approximately 30-minute discussion that Coen or Sander has with a high-level executive of a technology company. The episodes are single-take affairs, and we don't (or hardly) edit them afterwards, apart from polishing the audio up a bit of cours ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Watch Nationally Syndicated Car Concerns USA Radio Show Every Week-day Morning Starting at 9:00 A.M. (EST). USA TOLL-FREE: 1-855-CAR-CONCERNS (855-227-2662) @ http://bit.ly/cwAyD7 Car Concerns Is The Fastest Growing Car Talk Radio Show In The USA! Car Concerns is Nationally Syndicated Radio Talk Show That is Heard In Great USA Radio Markets Like Boston, Chicago, Las Vegas, Pittsburgh, Winter Springs, Botell, Hagatna and Other Great Cities Around The Nation. Is Car Concerns Heard In Your Town ...
  continue reading
 
Loading …
show series
 
A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
  continue reading
 
Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
  continue reading
 
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
  continue reading
 
LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. Th…
  continue reading
 
A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
  continue reading
 
A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
  continue reading
 
Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
  continue reading
 
Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. Th…
  continue reading
 
Provides comprehensive guidance on implementing the ISO/IEC 27001:2013 standard for information security management systems (ISMS). The text details requirements for risk assessment, risk treatment, and the creation of a Statement of Applicability (SOA), offering practical methodologies like the event-consequence approach and various control types.…
  continue reading
 
Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »…
  continue reading
 
Provides a detailed guide for network engineers to transition into network automation. It commences with fundamental Python concepts, covering data types, syntax, and error handling through numerous exercises. The book then progresses to Linux administration essentials, emphasizing the creation and management of virtual environments using VMware Wo…
  continue reading
 
Introduces intelligent reliability analysis using MATLAB and AI, focusing on failure analysis and reliability engineering. It covers foundational concepts like reliability fundamentals, measures of reliability such as MTBF and MTTF, and remaining useful lifetime (RUL) estimation techniques. The sources also explore experimental methodologies like a…
  continue reading
 
A comprehensive guide to VMware Dynamic Environment Manager (DEM), a solution for managing end-user desktop experiences. It details the installation and initial configuration of DEM, including setting up Group Policy Objects (GPOs) and understanding the NoAD mode. The text explores various aspects of desktop management, such as user personalization…
  continue reading
 
A practical guide for building intelligent applications using the OpenAI API. The book provides step-by-step instructions on leveraging various OpenAI endpoints, including Chat Completions, Images, and Audio, to create diverse applications like chatbots, virtual assistants, and content generators. It explains how to interact with the API through to…
  continue reading
 
Explores the evolution of DevOps and its contemporary challenges, particularly the issue of fragmented toolchains and the necessity of standardization. It details how cloud-native and data-centric architectures, including microservices, containers, and Infrastructure as Code (IaC), establish a robust foundation for modern software delivery. A signi…
  continue reading
 
Welcome to a special episode of DAS Talk, presented by DAS University and hosted by Peter (VP of Gamma Electronics). This time, we’re on-site at Motorola’s Fort Lauderdale headquarters for a powerful roundtable conversation with Rich Jimenez (Motorola Solutions) and Rick Rausch (Gamma Electronics). In this extended discussion, we dive into one of t…
  continue reading
 
Welcome back to DAS Talk, the industry podcast dedicated to Distributed Antenna Systems (DAS) and in-building public safety communication. Hosted by Gil Martinez of GAMMA, this episode features a deep-dive conversation with Adam Dutcher of Potter ERCES — a growing force in emergency communication systems. Potter ERCES has emerged as a key player by…
  continue reading
 
In this episode of DAS Talk, Gil from GAMMA steps in to host a powerful conversation with Adam Dunnom (BEST Enterprises) and Andy Major (Mobili-Fi) about real-world DAS implementation strategies, the future of converged wireless networks, and how to better align AHJs, integrators, and building owners. With the DAS University Live Summit coming up A…
  continue reading
 
On this episode of DAS Talk, Gil from GAMMA steps in as host while Peter is on the road and Philip Nicholas is deep in preparations for the upcoming DAS University Live Summit. Gil is joined by returning guest Robin Mitchell, Sales Engineering Manager at iBwave, for a timely and in-depth conversation on the critical role of proper surveying, design…
  continue reading
 
Constanza Bustamante, a research fellow at the Center for a New American Security (CNAS) is interviewed by Yuval Boger to discuss quantum policy at the nexus of national and economic security. Constanza contrasts China’s state-led, scale-oriented model with the U.S.’s science-first, private-sector translation approach; traces bipartisan continuity …
  continue reading
 
A comprehensive guide for Natural Language Processing (NLP) professionals, focusing on advanced techniques and applications using the spaCy library. The text covers various topics, including linguistic feature extraction, rule-based matching, utilizing transformer models like BERT and RoBERTa within spaCy, and integrating Large Language Models (LLM…
  continue reading
 
A comprehensive guide for network professionals transitioning from traditional Multiprotocol Label Switching (MPLS) to Segment Routing MPLS (SR-MPLS). It aims to simplify this complex shift through theoretical explanations and practical lab exercises, using network emulators like EVE-NG and virtual Cisco XRv9k routers. The text explores fundamental…
  continue reading
 
A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implemen…
  continue reading
 
A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (G…
  continue reading
 
Peter Bailis, the new CTO of Workday, discusses the company's ambitious AI agent strategy and recent major acquisitions including Sana, Paradox, and Flowise. He explains Workday's vision to become the "agent system of record" - extending their people and money management platform to govern AI agents across enterprises. Bailis reveals how Workday pl…
  continue reading
 
A powerful technology for programming the Linux kernel to enhance observability, networking, and security. It explains eBPF's fundamentals, including its virtual machine, instruction set, maps, and helper functions, along with the verifier that ensures program safety. The text details how eBPF programs are written in C (and increasingly Rust), comp…
  continue reading
 
Focuses on machine learning for tabular data, covering its fundamental concepts and practical applications. The sources explore various machine learning and deep learning approaches, with a particular emphasis on gradient boosting techniques like XGBoost and LightGBM, highlighting their efficacy with structured data. Readers will learn about data p…
  continue reading
 
In an IT world full of abstraction, overlays, and virtualization, it’s important to remember the physical infrastructure that supports all those things. So let’s get inside Mass IX, the Massachusetts Internet Exchange, to get a holistic view of the logical architecture and protocol mechanics of peering and Internet exchanges, as well as the iron, s…
  continue reading
 
A comprehensive guide for individuals seeking to understand and implement quantum programs using Python and the IBM Quantum platform. It explores fundamental quantum computing principles like superposition, entanglement, and interference, detailing how these concepts underpin the creation of quantum circuits. The text also provides practical instru…
  continue reading
 
A comprehensive guide for developers creating AI and Large Language Model (LLM) applications. The book covers fundamental concepts such as prompt engineering and retrieval-augmented generation (RAG), explaining how to integrate external data and manage conversational memory. It thoroughly explores various cognitive architectures like chains, router…
  continue reading
 
Explores the integration of Cloud Computing and the Internet of Things (IoT), highlighting their combined applications across diverse sectors. It details the fundamental concepts of both cloud computing and IoT, including their architectures, components, advantages, and disadvantages. The source also examines real-world applications such as smart c…
  continue reading
 
A comprehensive guide for mastering shader programming within the Unity 5 game engine. Authored by Alan Zucconi and Kenneth Lammers, it explores various lighting models, rendering techniques, and visual effects, ranging from basic diffuse shading and texture mapping to advanced concepts like Physically Based Rendering (PBR) and screen effects. The …
  continue reading
 
A practical resource for mastering cybersecurity assessments. The text covers Nmap's versatile applications in network security, including penetration testing, red teaming, and purple teaming, detailing fundamental and advanced scanning techniques. It emphasizes setting up a lab environment for hands-on practice, mapping attack surfaces, identifyin…
  continue reading
 
Discuss Radio Frequency Identification (RFID) technology, exploring its evolution and applications across various industries, particularly supply chain management and retail. They examine the technical advancements in RFID, including printed electronics and silicon ink, highlighting their impact on cost reduction and performance. A significant port…
  continue reading
 
Provides an extensive overview of operational security (opsec) and anonymity in the digital and physical realms. It thoroughly explains the use of tools like Tor, Freenet, and various encryption methods (PGP, Truecrypt, Veracrypt) to protect digital footprints, communications, and data. The text also highlights the importance of physical security p…
  continue reading
 
Offers an in-depth look at security concerns surrounding Large Language Models (LLMs), drawing heavily from "The Developer’s Playbook for Large Language Model Security" by Steve Wilson. It presents endorsements highlighting the book's importance for AI developers and security professionals due to the novel risks LLMs introduce. The text outlines va…
  continue reading
 
A technical guide published by Packt Publishing in 2021. It focuses on optimizing Python application performance by integrating Rust code. The book provides practical guidance on creating Python pip modules with Rust, managing dependencies using Cargo, and structuring Rust code for efficient integration. It explores advanced topics like concurrency…
  continue reading
 
A comprehensive overview of ransomware. It details the history and evolution of various malware types, with a specific focus on ransomware families like Ryuk, WannaCry, and Locky. The sources explore the methods of ransomware distribution, such as email phishing and exploit kits, and explain why traditional antivirus software struggles to detect th…
  continue reading
 
A comprehensive overview of networking fundamentals. It covers essential network concepts, including devices, applications, protocols, and services, explaining their roles within the OSI model and discussing routing and switching characteristics. The text further explores IP addressing components, network topologies, and wireless technologies, alon…
  continue reading
 
Provides comprehensive information on deploying, upgrading, customizing, and configuring the Windows 10 operating system. It covers essential topics such as managing local users, groups, and devices, configuring permissions and file access, implementing local policies, and securing data and applications. The text also explores network configuration…
  continue reading
 
A comprehensive guide to securing cloud-native applications and APIs, specifically focusing on OAuth and OpenID Connect standards. The book covers a wide range of topics, including API authorization, token design and management, secure client implementations for various application types (web, mobile, desktop), and the deployment and operational as…
  continue reading
 
A comprehensive guide to leveraging Azure OpenAI. It details the fundamentals of Large Language Models (LLMs), their various applications, and how to integrate them within the Microsoft Azure ecosystem. The book explores advanced topics such as multimodal capabilities, function calling, and Assistants API, along with crucial aspects of privacy, sec…
  continue reading
 
The digital twin is an evolving technology in the networking space. On today’s sponsored episode of Total Network Operations, we dig into details and definitions of the digital twin, how it ties into network automation and autonomy, and the power of abstraction layers. We’ll also talk about how the concepts in today’s show might influence... Read m…
  continue reading
 
A comprehensive guide for IT professionals on utilizing the Cisco ThousandEyes platform. The book covers deploying and configuring various ThousandEyes agents like Enterprise, Cloud, and Endpoint agents, and details different test types for network, DNS, and web layers, including sophisticated Transaction tests. It also explores alerting mechanisms…
  continue reading
 
A comprehensive guide to CompTIA A+ certification, focusing on hardware, networking, operating systems, and security. It details various display technologies like LCD, IPS, and OLED, along with connectivity standards such as USB-C and Thunderbolt. The text also covers printer types, maintenance, and common troubleshooting steps for issues ranging f…
  continue reading
 
A study companion for the Certified Kubernetes Administrator (CKA) exam, offering comprehensive guidance for professionals aiming to master Kubernetes. It covers fundamental concepts, architecture, and installation using tools like KinD and Kubeadm, progressing to advanced topics such as workloads, scheduling, storage, networking, and security. The…
  continue reading
 
A comprehensive guide for developers by Naga Santhosh Reddy Vootukuri, Taiseer Joudeh, and Wael Kdouh, with technical review by Tommaso Stocchi. It details the Azure Container Apps (ACA) platform, comparing it to other Azure services like App Services and Kubernetes Service (AKS), and covers deploying containerized applications. The text also expla…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play