Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
In this episode we explore the evolution of identity security, moving beyond traditional Multi-Factor Authentication (MFA) to embrace a full-stack Identity and Access Management (IAM) platform powered by Duo. Learn how Cisco Identity Intelligence (CII) provides crucial, multi-sourced, vendor-agnostic security insights across your entire digital ecosystem, including identity providers like Okta, Azure AD, and cloud platforms like AW...
Are you wrestling with enterprise network complexity? Advanced features like traffic engineering, ultra-fast failover, and network slicing often mean piling on complex protocols. This podcast episode dives deep into Segment Routing over IPv6 (SRv6), a technology that promises to deliver these advanced capabilities while radically simplifying your network. Join us as we cut through the hype to explore how SRv6 works, moving intellig...
This episode takes a deep dive into Cisco Workflows and introduces Cisco's advanced multi-domain automation and orchestration engine, a powerful tool designed to eliminate repetitive tasks and streamline complex IT operations across diverse environments. Cisco Workflows offers an intuitive drag-and-drop interface for creating automated processes, supporting integration with a wide array of Cisco controllers and third-party tools, ...
Think blockchain is just about Bitcoin and crypto? Think again. In this deep dive, we go far beyond the fluctuating prices to explore the true power and potential of this revolutionary technology. We'll demystify key concepts like distributed ledgers, consensus mechanisms, and smart contracts. Discover how blockchain is tackling real-world challenges in everything from AI and supply chains to securing digital art and enabling a new...
This episode delves into the intricate world of machine communication protocols, explaining how different parts of vehicles and machinery "speak" to each other. It begins by exploring the foundational Controller Area Network (CAN bus), highlighting its role as a "nervous system" for Electronic Control Units (ECUs) and its benefits such as simplified wiring, single-point diagnostics, and robustness. The episode also demystifies vari...
Dive into the quantum revolution and its seismic impact on cybersecurity. This episode unpacks how quantum computing threatens to shatter modern encryption (like RSA and ECC) with algorithms like Shor’s and Grover’s. Discover the cutting-edge solutions—Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)—already being deployed by industry giants like Apple, NIST, and the NSA. Learn why "harvest now, decrypt later" is ...
Dive into the intricate world of internet layers and discover how they form the backbone of global connectivity. This podcast episode explores the fundamental layers of the internet, from DNS and IP addresses to TCP and routing, shedding light on the protocols and processes that enable seamless communication across the globe. Join us as we unravel the complexities of the digital landscape and gain a deeper understanding of the tech...
In this exciting episode,we dive into the groundbreaking world of quantum computing! We explore how it stands apart from classical computation, especially through the lens of randomness. Discover the fundamental components of quantum computing—qubits, superposition, and entanglement—and learn how they open doors to extraordinary computational possibilities. We’ll also examine powerful quantum algorithms like Shor's algorithm, which...
Join us as we delve into nearly two decades of data breach trends and analysis from the renowned Verizon Data Breach Investigations Report (DBIR). Each episode, we'll unpack key findings, explore evolving cyber threats, and extract valuable lessons for security professionals and business leaders looking to understand and mitigate the risks of data compromise. Learn from real-world case studies and statistical insights to strengthen...
Join us for an engaging episode where we dive deep into eXtended Detection and Response (XDR) and its transformative role in the cybersecurity landscape. Our discussion highlights how XDR effectively tackles critical challenges like alert fatigue, tool integration, and adapting to increasingly complex cyber threats. With insights from industry experts, we explore the definition of XDR, its key functionalities, benefits, and the pot...
Get the lowdown on Precision Time Protocol (PTP) and why it's crucial for network engineers. Discover how PTP achieves nanosecond-level accuracy, its applications in finance, telecommunications, and more. #PTP #IEEE1588 #NetworkEngineering #TimeSynchronization #PrecisionTiming #Telecom #FinTech #Industry40 #Tech #sdntechforum #sdntech #podcast
Agentic AI represents a significant advancement in artificial intelligence, focusing on creating autonomous agents capable of performing complex tasks, making decisions, and interacting with their environment. This podcast explores the key concepts, architectures, applications, and future directions of Agentic AI, providing insights into its potential to revolutionize various industries. Learn about the different types of agents, t...
Improve your organization's security posture with Cisco Secure Access! Cisco Secure Access safeguards users, data, and devices as they securely connect to the internet, SaaS applications, and all private apps from both on-site and remote locations. This comprehensive guide delves into key features such as Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Remote Browser Isolation (RBI), Auto Tunnels, and more. #Cisco #Cis...
We are witnessing a critical shift in the realm of digital security. The evolution of user and application authentication is paramount to safeguarding our online interactions. This isn’t merely an upgrade; it’s a necessity for individuals and organizations that demand robust security and streamlined access. It’s time to embrace cutting-edge authentication methods that not only fortify protection but also eliminate barriers, enablin...
In this episode, we explore software-defined segmentation and how it aligns with Zero trust.
Join us on the SDN Tech Networking Podcast, the world's first human-curated AI podcast, where we break down complex topics into bite-sized, easy-to-digest pieces. In this episode, we dive into Software Defined Networking (SDN) and explore how it's shaking up enterprise networks. Learn about the basics of SDN, its benefits, and why it's crucial for modern businesses. We'll discuss the concept of decoupling the control, management, a...
This episode explores the fascinating world of LoRaWAN, a revolutionary technology designed for long-range, low-power communication in the Internet of Things (IoT). We will cover key concepts such as: ●Spreading factors: Learn how these parameters balance data rate and range for optimal performance. ●Modulation types: Discover the unique Chirp Spread Spectrum technology used in LoRa, its advantages, and how data is encoded. ●Adapti...
Embark on a journey into the captivating world of wireless communication! This episode unpacks the core principles that govern the transmission of information through the airwaves. From understanding the nature of electromagnetic signals to the concept of channel capacity and the intricate techniques of signal encoding, we'll explore the building blocks of this revolutionary technology. Get ready to discover how enterprise controll...
In this episode, our hosts explore SSH (Secure Shell), a protocol to establish secure connections between computers. We discuss the importance of SSH in modern networking, where secure remote access and file transfers are crucial. It dives into the fundamental concepts of public key cryptography, including RSA and ECDSA algorithms, and discusses their strengths and weaknesses. It explores how SSH leverages public key pairs for pass...
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.
Ding dong! Join your culture consultants, Matt Rogers and Bowen Yang, on an unforgettable journey into the beating heart of CULTURE. Alongside sizzling special guests, they GET INTO the hottest pop-culture moments of the day and the formative cultural experiences that turned them into Culturistas. Produced by the Big Money Players Network and iHeartRadio.
Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.
The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com