POPULARITY
How do all your devices connect and stay safe in the cloud? In this episode, Lois Houston and Nikita Abraham talk with OCI instructors Sergio Castro and Orlando Gentil about the basics of how networks work and the simple steps that help protect them. You'll learn how information gets from one place to another, why tools like switches, routers, and firewalls are important, and what goes into keeping access secure. The discussion also covers how organizations decide who can enter their systems and how they keep track of activity. Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. -------------------------------------------- Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hi everyone! In the last episode, we spoke about local area networks and domain name systems. Today, we'll continue our conversation on the fundamentals of networking, covering a variety of important topics. 00:50 Lois: That's right, Niki. And before we close, we'll also touch on the basics of security. Joining us today are two OCI instructors from Oracle University: Sergio Castro and Orlando Gentil. So glad to have you both with us guys. Sergio, with so many users and devices connecting to the internet, how do we make sure everyone can get online? Can you break down what Network Address Translation, or NAT, does to help with this? Sergio: The world population is bigger than 4.3 billion people. That means that if we were to interconnect every single human into the internet, we will not have enough addresses. And not all of us are connected to the internet, but those of us who are, you know that we have more than one device at our disposal. We might have a computer, a laptop, mobile phones, you name it. And all of them need IP addresses. So that's why Network Address Translation exists because it translates your communication from a private IP to a public IP address. That's the main purpose: translate. 02:05 Nikita: Okay, so with NAT handling the IP translation, how do we ensure that the right data reaches the right device within a network? Or to put it differently, what directs external traffic to specific devices inside a network? Sergio: Port forwarding works in a reverse way to Network Address Translation. So, let's assume that this PC here, you want to turn it into a web server. So, people from the outside, customers from the outside of your local area network, will access your PC web server. Let's say that it's an online store. Now all of these devices are using the same public IP address. So how would the traffic be routed specifically to this PC and not to the camera or to the laptop, which is not a web server, or to your IP TV? So, this is where port forwarding comes into play. Basically, whenever it detects a request coming to port, it will route it and forward that request to your PC. It will allow anybody, any external device that wants to access this particular one, this particular web server, for the session to be established. So, it's a permission that you're allowing to this PC and only to this PC. The other devices will still be isolated from that list. That's what port forwarding is. 03:36 Lois: Sergio, let's talk about networking devices. What are some of the key ones, and what role do they play in connecting everything together? Sergio: There's plenty of devices for interconnectivity. These are devices that are different from the actual compute instances, virtual machines, cameras, and IPTV. These are for interconnecting networks. And they have several functionalities. 03:59 Nikita: Yeah, I often hear about a default gateway. Could you explain what that is and why it's essential for a network to function smoothly? Sergio: A gateway is basically where a web browser goes and asks a service from a web server. We have a gateway in the middle that will take us to that web server. So that's basically is the router. A gateway doesn't necessarily have to be a router. It depends on what device you're addressing at a particular configuration. So, a gateway is a connectivity device that connects two different networks. That's basically the functionality. 04:34 Lois: Ok. And when does one use a default gateway? Sergio: When you do not have a specific route that is targeting a specific router. You might have more than one router in your network, connecting to different other local area networks. You might have a route that will take you to local area network B. And then you might have another router that is connecting you to the internet. So, if you don't have a specific route that will take you to local area network B, then it's going to be utilizing the default gateway. It directs data packets to other networks when no specific route is known. In general terms, the default gateway, again, it doesn't have to be a router. It can be any devices. 05:22 Nikita: Could you give us a real-world example, maybe comparing a few of these devices in action, so we can see how they work together in a typical network? Sergio: For example, we have the hub. And the hub operates at the physical layer or layer 1. And then we have the switch. And the switch operates at layer 2. And we also have the router. And the router operates at layer 3. So, what's the big difference between these devices and the layers that they operate in? So, hubs work in the physical layer of the OSI model. And basically, it is for connecting multiple devices and making them act as a single network segment. Now, the switch operates at the data link layer and is basically a repeater, and is used for filtering content by reading the addresses of the source and destination. And these are the MAC addresses that I'm talking about. So, it reads where the packet is coming from and where is it going to at the local area network level. It connects multiple network segments. And each port is connected to a different segment. And the router is used for routing outside of your local area network, performs traffic directing functions on the internet. A data packet is typically forwarded from one router to another through different networks until it reaches its destination node. The switch connects multiple network segments. And each port of the switch is connected to a different segment. And the router performs traffic directing functions on the internet. It takes data from one router to another, and it works at the TCP/IP network layer or internet layer. 07:22 Lois: Sergio, what kind of devices help secure a network from external threats? Sergio: The network firewall is used as a security device that acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. The network firewall is the first line of defense for traffic that passes in and out of your network. The firewall examines traffic to ensure that it meets the security requirements set by your organization, or allowing, or blocking traffic based on set criteria. And the main benefit is that it improves security for access management and network visibility. 08:10 Are you keen to stay ahead in today's fast-paced world? We've got your back! Each quarter, Oracle rolls out game-changing updates to its Fusion Cloud Applications. And to make sure you're always in the know, we offer New Features courses that give you an insider's look at all of the latest advancements. Don't miss out! Head over to mylearn.oracle.com to get started. 08:36 Nikita: Welcome back! Sergio, how do networks manage who can and can't enter based on certain permissions and criteria? Sergio: The access control list is like the gatekeeper into your local area network. Think about the access control list as the visa on your passport, assuming that the country is your local area network. Now, when you have a passport, you might get a visa that allows you to go into a certain country. So the access control list is a list of rules that defines which users, groups, or systems have permissions to access specific resources on your networks. It is a gatekeeper, that is going to specify who's allowed and who's denied. If you don't have a visa to go into a specific country, then you are denied. Similar here, if you are not part of the rule, if the service that you're trying to access is not part of the rules, then you cannot get in. 09:37 Lois: That's a great analogy, Sergio. Now, let's turn our attention to one of the core elements of network security: authentication and authorization. Orlando, can you explain why authentication and authorization are such crucial aspects of a secure cloud network? Orlando: Security is one of the most critical pillars in modern IT systems. Whether you are running a small web app or managing global infrastructure, every secure system starts by answering two key questions. Who are you, and what are you allowed to do? This is the essence of authentication and authorization. Authentication is the first step in access control. It's how a system verifies that you are who you claim to be. Think of it like showing your driver's license at a security checkpoint. The guard checks your photo and personal details to confirm your identity. In IT systems, the same process happens using one or more of these factors. It will ask you for something you know, like a password. It will ask you for something that you have, like a security token, or it will ask you for something that you are, like a fingerprint. An identity does not refer to just a person. It's any actor, human or not, that interacts with your systems. Users are straightforward, think employees logging into a dashboard. But services and machines are equally important. A backend API may need to read data from a database, or a virtual machine may need to download updates. Treating these non-human identities with the same rigor as human ones helps prevent unauthorized access and improves visibility and security. After confirming your identity, can the system move on to deciding what you're allowed to access? That's where authorization comes in. Once authentication confirms who you are, authorization determines what you are allowed to do. Sticking with the driver's license analogy, you've shown your license and proven your identity, but that doesn't mean that you can drive anything anywhere. Your license class might let you drive a car, not a motorcycle or a truck. It might be valid in your country, but not in others. Similarly, in IT systems, authorization defines what actions you can take and on which resources. This is usually controlled by policies and roles assigned to your identity. It ensures that users or services only get access to the things they are explicitly allowed to interact with. 12:34 Nikita: How can organizations ensure secure access across their systems, especially when managing multiple users and resources? Orlando: Identity and Access Management governs who can do what in our systems. Individually, authentication verifies identity and authorization grants access. However, managing these processes at scale across countless users and resources becomes a complex challenge. That's where Identity and Access Management, or IAM, comes in. IAM is an overarching framework that centralizes and orchestrates both authentication and authorization, along with other critical functions, to ensure secure and efficient access to resources. 13:23 Lois: And what are the key components and methods that make up a robust IAM system? Orlando: User management, a core component of IAM, provides a centralized Identity Management system for all user accounts and their attributes, ensuring consistency across applications. Key functions include user provisioning and deprovisioning, automating account creation for new users, and timely removal upon departure or role changes. It also covers the full user account lifecycle management, including password policies and account recovery. Lastly, user management often involves directory services integration to unify user information. Access management is about defining access permissions, specifically what actions users can perform and which resources they can access. A common approach is role-based access control, or RBAC, where permissions are assigned to roles and users inherit those permissions by being assigned to roles. For more granular control, policy-based access control allows for rules based on specific attributes. Crucially, access management enforces the principle of least privilege, granting only the minimum necessary access, and supports segregation of duties to prevent conflicts of interest. For authentication, IAM systems support various methods. Single-factor authentication, relying on just one piece of evidence like a password, offers basic security. However, multi-factor authentication significantly boosts security by requiring two or more distinct verification types, such as a password, plus a one-time code. We also have biometric authentication, using unique physical traits and token-based authentication, common for API and web services. 15:33 Lois: Orlando, when it comes to security, it's not just about who can access what, but also about keeping track of it all. How does auditing and reporting maintain compliance? Orlando: Auditing and reporting are essential for security and compliance. This involves tracking user activities, logging all access attempts and permission changes. It's vital for meeting compliance and regulatory requirements, allowing you to generate reports for audits. Auditing also aids in security incident detection by identifying unusual activities and providing data for forensic analysis after an incident. Lastly, it offers performance and usage analytics to help optimize your IAM system. 16:22 Nikita: That was an incredibly informative conversation. Thank you, Sergio and Orlando, for sharing your expertise with us. If you'd like to dive deeper into these concepts, head over to mylearn.oracle.com and search for the Cloud Tech Jumpstart course. Lois: I agree! This was such a great conversation! Don't miss next week's episode, where we'll continue exploring key security concepts to help organizations operate in a scalable, secure, and auditable way. Until next time, this is Lois Houston… Nikita: And Nikita Abraham, signing off! 16:56 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
Online game design veteran Raph Koster recently posted a new piece about how he thinks about game design, which got us talking about the history of online multiplayer, so then we figured, why not talk about that subject in a (slightly) more comprehensive way on this podcast? So that's what we did this week, dipping into topics like pre-TCP/IP network gaming, the early video game consoles' various half-baked online solutions, how Ultima Online and Star Wars Galaxies were both way ahead of their time, how much the infrastructure has evolved for facilitating multiplayer -- and how expected it is as a feature these days -- and plenty more.Koster's new piece: https://www.raphkoster.com/2025/11/03/game-design-is-simple-actually/PC Gamer's Everquest history: https://www.pcgamer.com/breaking-the-internet-the-story-of-everquest-the-mmo-that-changed-everything/Dreamcast online functionality and Sega.net history (with links to similar pages for PS2, GameCube etc. at the bottom): https://en.wikipedia.org/wiki/Dreamcast_online_functionality Support the Pod! Contribute to the Tech Pod Patreon and get access to our booming Discord, a monthly bonus episode, your name in the credits, and other great benefits! You can support the show at: https://patreon.com/techpod
What does network testing and validation really mean? How do testing and validation fit within an automation workflow? Is it possible to run meaningful tests without coding skills? Dan Wade from BlueAlly answers these questions and offers practical insights into building trust in automation through test environments, using AI for ideation and problem-solving, and personal... Read more »
What does network testing and validation really mean? How do testing and validation fit within an automation workflow? Is it possible to run meaningful tests without coding skills? Dan Wade from BlueAlly answers these questions and offers practical insights into building trust in automation through test environments, using AI for ideation and problem-solving, and personal... Read more »
On today’s show, sponsored by Itential, we talk about automation in the real world. Guest Jesse Ford is an automation architect at Itential. We talk about his career journey, how he got into network automation, how he decides which is the best tool for a job, and why tool diversity isn’t the same as chaos.... Read more »
On today’s show, sponsored by Itential, we talk about automation in the real world. Guest Jesse Ford is an automation architect at Itential. We talk about his career journey, how he got into network automation, how he decides which is the best tool for a job, and why tool diversity isn’t the same as chaos.... Read more »
The Belgian surrealist René Magritte was a smart artist, but could the 20th century futurist really have predicted the end of the Worldwide Web age? Not exactly, of course. But according to That Was The Week publisher, Keith Teare, Magritte's 1929 painting, “The Treachery of Images” (featuring the image of a pipe with the immortal words “Ceci n'est pas une pipe”), is a helpful way of thinking about OpenAI's introduction this week of their new Atlas “browser”. It's not really a browser in the conventional way that we think about web browsers like Chrome, Firefox or Internet Explorer. And yet AI products like Atlas are about to once again revolutionize how we use the internet. They might even represent the end of the web age with its link architecture and advertising economics. So do we have words for what comes next? The not-a-browser age, perhaps. L'ère sans navigateur, to be exact. * The Browser Is Becoming an Agent, Not a Link Map - For thirty years, browsers like Netscape, Internet Explorer, and Chrome were rendering engines for HTML that displayed blue links to web pages. AI products like ChatGPT's Atlas and Google's AI mode in Chrome are transforming browsers into conversational agents that answer questions, summarize content, and even execute tasks like booking flights—pushing the traditional web “down a level” in the user interface hierarchy.* The Web's Trillion-Dollar Advertising Model Must “Reprice Fast” - The web's business model has been largely advertising-based, built on users clicking links that generate revenue. As AI interfaces replace link-based browsing, this nearly trillion-dollar annual revenue stream faces an existential threat. Publishers like Keith Teare and platforms like Google must figure out how to transition their economics to an AI-driven world where links aren't surfaced by default.* Google Deserves Its Stock Price for “Being Brave in Undermining Its Own Business Model” - While AI threatens to upend Google's AdWords cash cow, the company's stock has surged roughly 50% over the past year. Keith argues Google has earned this bullishness by aggressively investing in AI infrastructure (like Anthropic's $10 billion commitment to Google's TPUs) and integrating AI features into Chrome—even though these moves could cannibalize its core search advertising business.* The “Victim Here Is the Publisher, Not the User” - Keith acknowledges that while the shift to AI agents feels like “an absolute change of paradigm,” it's genuinely better for users who get more intuitive, conversational interfaces. Publishers and content creators are the ones facing disruption, as AI may eliminate their distribution channels without yet providing alternatives for reaching audiences or monetizing content. The challenge is that “most of the narrative that doesn't like it is publisher-centric.”* Tim Wu and Antitrust Regulators Are “Fighting Yesterday's War” - Columbia law professor Tim Wu's new book The Age of Extraction focuses on the monopolistic dangers of Google, Amazon, and Facebook—but Keith argues this framing is already obsolete. The real competitive battlefield is AI, where Google is a “laggard” behind OpenAI and Anthropic. The underlying internet architecture (TCP/IP) remains neutral enough to allow challengers to emerge, making heavy-handed government intervention both unnecessary and potentially innovation-killing, as seen in the over-regulated EU.Keen On America is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit keenon.substack.com/subscribe
Senad Palislamovic has held many roles in his time, from engineer to network operator to sales engineer and back again. He’s been around long enough to see trends come and go. Senad visits Total Network Operations to share some of his observations on network automation, AI for NetOps, and the quality of network data. Senad... Read more »
Senad Palislamovic has held many roles in his time, from engineer to network operator to sales engineer and back again. He’s been around long enough to see trends come and go. Senad visits Total Network Operations to share some of his observations on network automation, AI for NetOps, and the quality of network data. Senad... Read more »
professorjrod@gmail.comEver wish the network would just explain itself? We walk through the real language of connectivity—how links come alive, how packets choose their paths, and how a few core ideas unlock routers, firewalls, addressing, and the exam questions that test them. It starts with the wire (and the air): DSL over copper, cable scaling with DOCSIS, fiber to an ONT at your home, and why fixed wireless, satellite, and 5G fill coverage gaps with very different tradeoffs in speed and latency. From there, we draw the line between moving traffic and governing it. Routers forward based on IP and subnets; firewalls enforce policy using IPs, protocols, and ports—think velvet rope, but for packets.We bring the TCP/IP stack down to earth with a clean mental model of layers and encapsulation, then dig into IPv4 addressing, subnet masks, and private ranges that rely on NAT to share a single public IP. You'll learn why static IPs belong on printers and servers, how DHCP's DORA flow keeps clients online, and what APIPA is telling you when a lease fails. We also size up IPv6—128-bit addresses, hexadecimal notation, dual stack—and unpack the practical roadblocks that slow adoption despite the promise of massive address space.Transport choices make or break performance, so we compare TCP's three‑way handshake and delivery guarantees with UDP's low-latency approach favored by streaming and gaming. We highlight the ports every tech should know—22, 53, 80, 443, 67/68, 21/20, 3389—because port literacy speeds troubleshooting. On identity and isolation, we translate DNS records (A, AAAA, CNAME, MX, TXT) into everyday use and show how VLANs reduce broadcast noise while VPNs protect data over untrusted networks. To cement it all, we run live quiz walkthroughs and model how to spot keywords, eliminate distractors, and reason under time pressure—skills you can carry straight into the CompTIA A+ and beyond.If this helped you think more clearly about networks, follow the show, leave a rating, and share it with a friend who's studying. Got a topic you want us to deep-dive next—DHCP, DNS, or VLANs? Drop a note and subscribe so you don't miss the next breakdown.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud networks. We... Read more »
Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud networks. We... Read more »
LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. They discuss the challenges, obstacles... Read more »
LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. They discuss the challenges, obstacles... Read more »
Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »
Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »
In an IT world full of abstraction, overlays, and virtualization, it’s important to remember the physical infrastructure that supports all those things. So let’s get inside Mass IX, the Massachusetts Internet Exchange, to get a holistic view of the logical architecture and protocol mechanics of peering and Internet exchanges, as well as the iron, steel,... Read more »
In an IT world full of abstraction, overlays, and virtualization, it’s important to remember the physical infrastructure that supports all those things. So let’s get inside Mass IX, the Massachusetts Internet Exchange, to get a holistic view of the logical architecture and protocol mechanics of peering and Internet exchanges, as well as the iron, steel,... Read more »
The digital twin is an evolving technology in the networking space. On today’s sponsored episode of Total Network Operations, we dig into details and definitions of the digital twin, how it ties into network automation and autonomy, and the power of abstraction layers. We’ll also talk about how the concepts in today’s show might influence... Read more »
The digital twin is an evolving technology in the networking space. On today’s sponsored episode of Total Network Operations, we dig into details and definitions of the digital twin, how it ties into network automation and autonomy, and the power of abstraction layers. We’ll also talk about how the concepts in today’s show might influence... Read more »
Jeremy Schulman has been working at network automation for much of his professional life. On today’s Total Network Operations, host Scott Robohn talks with Jeremy about his ongoing quest to get the network engineering bottleneck out of production. They discuss the early days of network automation when engineers tried to adopt tools from compute side... Read more »
Jeremy Schulman has been working at network automation for much of his professional life. On today’s Total Network Operations, host Scott Robohn talks with Jeremy about his ongoing quest to get the network engineering bottleneck out of production. They discuss the early days of network automation when engineers tried to adopt tools from compute side... Read more »
My guest today is Vinton G. Cerf, widely regarded as a “father of the Internet.” In the 1970s, Vint co-developed the TCP/IP protocols that define how data is formatted, transmitted, and received across devices. In essence, his work enabled networks to communicate, thus laying the foundation for the Internet as a unified global system. He has received honorary degrees and awards that include the National Medal of Technology, the Turing Award, the Presidential Medal of Freedom, the Marconi Prize, and membership in the National Academy of Engineering. He is currently Chief Internet Evangelist at Google.In this episode, Vint reflects on the Internet's path from ARPANET and TCP/IP to the scaling choices that made global connectivity possible. He explains why decentralization was key, and how fiber optics and data centers underwrote explosive growth. Vint also addresses today's policy anxieties (fragmentation, sovereignty walls, and fragile infrastructures…) before looking upward to the interplanetary Internet now linking spacecraft. Finally, we turn to AI: how LLMs are reshaping learning and software, and why the next leap may be systems that question us back. I hope you enjoy our discussion.You can follow me on X (@ProfSchrepel) and BlueSky (@ProfSchrepel).
How might we get network traffic from Earth to a lunar base? Or Mars? Or to spaceships carrying astronauts or probes exploring space? And how do we get it back? The problem, among other things, is latency. The answer isn't TCP/IP. The answer is…complicated. On today’s Heavy Networking we explore the challenges of getting packets... Read more »
Vint Cerf, widely recognized as one of the fathers of the Internet, is today’s special guest on Total Network Operations. He currently serves as Vice President and Chief Internet Evangelist at Google. His pioneering work began back in the 1960’s when he was involved in the ARPANET project. Alongside Bob Kahn, Vint co-invented the TCP/IP... Read more »
How might we get network traffic from Earth to a lunar base? Or Mars? Or to spaceships carrying astronauts or probes exploring space? And how do we get it back? The problem, among other things, is latency. The answer isn't TCP/IP. The answer is…complicated. On today’s Heavy Networking we explore the challenges of getting packets... Read more »
Vint Cerf, widely recognized as one of the fathers of the Internet, is today’s special guest on Total Network Operations. He currently serves as Vice President and Chief Internet Evangelist at Google. His pioneering work began back in the 1960’s when he was involved in the ARPANET project. Alongside Bob Kahn, Vint co-invented the TCP/IP... Read more »
How might we get network traffic from Earth to a lunar base? Or Mars? Or to spaceships carrying astronauts or probes exploring space? And how do we get it back? The problem, among other things, is latency. The answer isn't TCP/IP. The answer is…complicated. On today’s Heavy Networking we explore the challenges of getting packets... Read more »
In this episode of Inside the Network, we sit down with Jay Chaudhry, founder and CEO of Zscaler, one of the most valuable cybersecurity companies in the world with a market cap of over $40 billion and $3 billion in ARR.Jay's journey is unlike any other. Raised in a remote Indian village with no electricity, no running water, and a two-and-a-half-mile walk to school, he went on to build five companies and pioneer the modern Zero Trust cloud security model. Zscaler, his most iconic company, was launched in 2007 with $50 million of his own capital and no VC investment - a bold bet in the middle of a market downturn, at a time when few believed enterprise security could move to the cloud.This episode is packed with powerful lessons from a founder who's played the long game. Jay talks about the mindset he carried from his early years farming with oxen, how working alongside his wife Jyoti gave him unmatched focus and alignment, and why startups should be “a foot wide and 20 feet deep.” He explains how Zscaler rewrote not just the playbook for go-to-market in security, but also the TCP/IP stack, and the early challenges of selling Zero Trust well before the term even existed. He also shares his wisdom on why most founders pivot too late when their sales motion fails. Jay provides his view of the future of cybersecurity and the Internet itself, from why the private corporate network is dying to why firewalls will eventually go the way of mainframes.Throughout it all, Jay shares a rare combination of conviction, humility, and self-discipline. Whether you're a first-time founder or running a $10 billion company, this is an absolute masterclass in how to build enduring companies and stay grounded in the process.
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvNetwork security is the cornerstone of modern cybersecurity, and understanding its intricacies is essential for anyone preparing for the CISSP exam. In this comprehensive episode, Sean Gerber delivers a rapid review of Domain 4: Communications and Network Security, which constitutes 13% of the CISSP exam questions.The episode opens with a cautionary tale about a disgruntled Chinese developer who received a four-year prison sentence for deploying a logic bomb that devastated his former employer's network. This real-world example underscores the critical importance of proper employee termination procedures and privilege management—especially for technical staff with elevated access. As Sean emphasizes, "The eyes of Sauron" should be on any high-privilege employee showing signs of discontent.Diving into Domain 4, Sean expertly navigates through foundational concepts like the OSI and TCP/IP models, explaining how they standardize network communications and why security professionals must understand them to implement effective defense strategies. The discussion progresses through IP networking (both IPv4 and IPv6), secure protocols, multi-layer protections, and deep packet inspection—all crucial components of a robust security architecture.Particularly valuable is Sean's breakdown of modern network technologies like micro-segmentation, which divides networks into highly granular security zones. While acknowledging its power to limit lateral movement during breaches, he cautions that implementation requires sophisticated knowledge of software-defined networking (SDN) and careful planning: "It's better to start small than to go out and think of and get too big when you're dealing with deploying these SDN type of capabilities."Wireless security, content delivery networks, and endpoint protection receive thorough examination, with Sean emphasizing that endpoints are "your first line of detection" and advocating for comprehensive endpoint detection and response (EDR) solutions that go beyond traditional antivirus. The episode concludes with insights on voice communication security, contrasting traditional telephone networks with modern VoIP systems and their unique vulnerabilities.Whether you're preparing for the CISSP exam or looking to strengthen your organization's network security posture, this episode provides actionable insights backed by real-world experience. Ready to deepen your understanding of cybersecurity fundamentals? Subscribe to the CISSP Cyber Training Podcast and check out the free resources available at cisspybertraining.com to accelerate your certification journey.Support the showGain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Some handy links if you want to start playing with your own virtual Windows 95 machine:https://86box.net/https://winworldpc.com/homehttps://www.vogons.org/ Support the Pod! Contribute to the Tech Pod Patreon and get access to our booming Discord, a monthly bonus episode, your name in the credits, and other great benefits! You can support the show at: https://patreon.com/techpod
On today’s Total Network Operations we talk through the adoption of AI in network operations with John Capobianco, Head of DevRel at Selector. Selector is the sponsor of today’s episode. John walks us through his career journey as a network engineer, and describes the moment where he realized that AI was going to change how... Read more »
On today’s Total Network Operations we talk through the adoption of AI in network operations with John Capobianco, Head of DevRel at Selector. Selector is the sponsor of today’s episode. John walks us through his career journey as a network engineer, and describes the moment where he realized that AI was going to change how... Read more »
Building things for people to use has been our guest’s goal since entering university in the 1960s. Total Network Operations is delighted to welcome Jack Haverty, who’s been instrumental in ARPANET operations and innovation, the development of TCP, and more. He takes us through the history of the internet from the early days of ARPANET,... Read more »
Building things for people to use has been our guest’s goal since entering university in the 1960s. Total Network Operations is delighted to welcome Jack Haverty, who’s been instrumental in ARPANET operations and innovation, the development of TCP, and more. He takes us through the history of the internet from the early days of ARPANET,... Read more »
This week on EYE ON NPI we're working without wires - it's the new RM2 module from Raspberry Pi (https://www.digikey.com/en/product-highlight/r/raspberry-pi/radio-module-2-wireless-connectivity) which will let you add 2.4GHz WiFi / Bluetooth LE and Bluetooth Classic over an SDIO interface at a great price. The RM2 is built on the technology stack that Raspberry Pi has been working on for many years in adding built-in wireless to their microcomputers and microcontrollers. For example, starting with the Raspberry Pi 3 (https://www.digikey.com/short/59j9179b), the trading company has been integrating WiFi/Bluetooth to their single-board computers. With tight integration and onboard antenna, it's easy to bring up a new board with networking and native Linux kernel support. To do that, Pi has used the CYW43438 (https://www.digikey.com/short/8pfmdctc) and CYW43455 (https://www.digikey.com/short/99wr3vbq) which supports 2.4G and 5G. When the RP2040 microcontroller chip (https://www.digikey.com/short/bnh55qj4) was released in 2021 along with the Pico board (https://www.digikey.com/short/0p02nwh2) - a year later they came out with the Pico W (https://www.digikey.com/short/bzjt9bcp) for only a few $ more. Instead of trying to design an all-in-one WiFi microcontroller, Pi decided to go the same route they did with the Pi SBC: have a co-processor that adds wireless and then offer the firmware support to make it easy for folks to make IoT projects with a powerful arm Cortex chip. Not surprisingly, the RP2350's Pico 2 also came out with a Pico 2 W (https://www.digikey.com/short/ph2b4dmn) variant pretty quickly. Both W boards have a tinned radio module at the end, reminiscent of the CYW chipsets on the Pi SBCs - in this case they feature the CYW43439 (https://www.digikey.com/short/2tj7twdc) which can do 2.4 GHz WiFi/BT/BLE but not 5GHz to keep the price low. For folks who wanted to built upon the Pico W or 2W with their own design, integrating the CYW43439 (https://www.digikey.com/short/2tj7twdc) is non-trivial: it's a BGA chip which requires adding an antenna, managing traces and impedances as well as getting emitter certifications. So, it's not surprising that Pi trading has designed a standalone module that folks can solder into their designs to take advantage of the high-integration between the RP2 chipset and the CYW43439. The RM2 module (https://www.digikey.com/short/vp58vnh3) comes with antenna, tin and chunky castellated pads that can be pick-and-place'd or hand soldered. We've already seen this module used in some existing designs like the Pico Plus 2W from Pimoroni (https://www.digikey.com/short/rpjcp849). Communication with the CYW43439 (https://www.digikey.com/short/2tj7twdc) inside the module is done over SPI plus some IRQ and reset lines. Note that while, in theory, you could connect this module to any microcontroller with a TCP/IP stack like lwip, it really is only designed and supported with RP2-series microcontrollers. That's because the Pico SDK (https://www.raspberrypi.com/documentation/pico-sdk/networking.html) which integrates the firmware uploading and WiFi stack is not really portable to other microcontrollers and there's a cyw32-driver (https://github.com/georgerobotics/cyw43-driver) that is not open source. We did notice that there's an 'open source' reverse-engineered driver on github (https://github.com/jbentham/picowi) - experimentation will be required for those interested! Bluetooth is more freely licensed via BTStack (https://github.com/bluekitchen/btstack) If you want to add the new RM2 module from Raspberry Pi (https://www.digikey.com/en/product-highlight/r/raspberry-pi/radio-module-2-wireless-connectivity) to your next RP2xxx microcontroller design, for tried-and-tested wireless with lots of platform support, you can pick up some right now from DigiKey! Order today and your fresh modules will ship instantly so you can start integration by tomorrow afternoon. https://www.digikey.com/short/vp58vnh3
What’s the next era of network management and operations? Total Network Operations talks to Mahesh Jethanandani, Chair of NETCONF Working Group and Distinguished Engineer at Arrcus. Mahesh describes a workshop from December of 2024 that sought to investigate the past, present, and future of network management and operations. He talks about the IETF’s role in... Read more »
What’s the next era of network management and operations? Total Network Operations talks to Mahesh Jethanandani, Chair of NETCONF Working Group and Distinguished Engineer at Arrcus. Mahesh describes a workshop from December of 2024 that sought to investigate the past, present, and future of network management and operations. He talks about the IETF’s role in... Read more »
Auvik is network management software that lets users monitor, manage, and troubleshoot their networks. On today’s sponsored episode we talk with Doug Murray, CEO; and John Harden, Director of Strategy & Technology Evangelism, both from Auvik, about the challenges facing today’s network operators. We look at the rise of the IT generalist, workloads and burnout,... Read more »
Auvik is network management software that lets users monitor, manage, and troubleshoot their networks. On today’s sponsored episode we talk with Doug Murray, CEO; and John Harden, Director of Strategy & Technology Evangelism, both from Auvik, about the challenges facing today’s network operators. We look at the rise of the IT generalist, workloads and burnout,... Read more »
Kevin Nanns is today’s guest on Total Network Operations. Kevin describes his “Wizard of Oz” moment when he discovered the world of networking. He talks about how he came up through the ranks working a help desk and then in a NOC, and his climb up the certification ladder. We also discuss how AI is... Read more »
Kevin Nanns is today’s guest on Total Network Operations. Kevin describes his “Wizard of Oz” moment when he discovered the world of networking. He talks about how he came up through the ranks working a help desk and then in a NOC, and his climb up the certification ladder. We also discuss how AI is... Read more »
On today’s show we talk about NetDevOps and AI Ops with Greg Freeman, VP of Network and Customer Transformation at Lumen. Greg spearheads network automation, orchestration ,and AI strategy, guiding the highest technical tier in operations and championing NetDevOps methodologies. We talk about the people and work culture that’s influenced the development of automation and... Read more »
On today’s show we talk about NetDevOps and AI Ops with Greg Freeman, VP of Network and Customer Transformation at Lumen. Greg spearheads network automation, orchestration ,and AI strategy, guiding the highest technical tier in operations and championing NetDevOps methodologies. We talk about the people and work culture that’s influenced the development of automation and... Read more »
At AutoCon 3 in Prague, Scott Robohn sat down with Ernest Lefner from sponsor Gluware to talk about lessons learned throughout his career: from his early days of pulling cable to becoming Chief Product Officer at Gluware and helping to found ONUG. Ernest talks about being a continuous technology learner, and also about the need... Read more »
At AutoCon 3 in Prague, Scott Robohn sat down with Ernest Lefner from sponsor Gluware to talk about lessons learned throughout his career: from his early days of pulling cable to becoming Chief Product Officer at Gluware and helping to found ONUG. Ernest talks about being a continuous technology learner, and also about the need... Read more »
Today we chat with Megaport’s Mitchell Warden, Founding Engineer; and Alexis Bertholf, Global Technical Evangelist, to find out what NetOps is like at Megaport, a company that provides scalable internet connections for all types of organizations. We look at the origins of Megaport and how the company started with the intention of network automation from... Read more »
Today we chat with Megaport’s Mitchell Warden, Founding Engineer; and Alexis Bertholf, Global Technical Evangelist, to find out what NetOps is like at Megaport, a company that provides scalable internet connections for all types of organizations. We look at the origins of Megaport and how the company started with the intention of network automation from... Read more »
Total Networks Operations sits down with Justin Ryburn for a wide-ranging discussion on the state of the networking industry. Topics including how to attract new talent to network engineering and network operations; getting literate in DevOps/infrastructure tools such as GitHub, Terraform, and Python; pairing Dev and NetOps to maximize domain expertise; integrating tools and trying... Read more »
Data Center construction has reached an incredible pace over the last few years with implications on NetOps and operations of all kinds. Today we with talk with sponsor Siemon regarding the state of data centers, past, present and future. We explore legacy data centers and how they are evolving to work in today’s environments. We... Read more »