TechSNAP our weekly Systems, Network, and Administration Podcast. Every week TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your…
It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.
It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.
Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.
Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.
We dive deep into the world of RAID, and discuss how to choose the right topology to optimize performance and resilience.
We dive deep into the world of RAID, and discuss how to choose the right topology to optimize performance and resilience.
Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.
Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.
We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.
We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.
We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root.
We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root.
Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.
Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.
We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.
We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.
We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.
We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.
We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family.
We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family.
Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.
Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.
From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.
From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.
As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.
As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.
We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.
We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.
Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage.
Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage.
We share our simple approach to disk benchmarking and explain why you should always test your pain points.
We share our simple approach to disk benchmarking and explain why you should always test your pain points.
We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root.
We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root.
We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.
It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.
We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.
It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.
We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.
We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.
We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC.
We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC.
Wes takes a quick look at a container escape proof-of-concept and reviews Docker security best practices.
Wes takes a quick look at a container escape proof-of-concept and reviews Docker security best practices.
Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.
Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.
A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.