<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 07 Apr 2026 08:05:50 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Router”</title>
    <link>https://techsnap.systems/tags/router</link>
    <pubDate>Fri, 29 Nov 2019 00:15:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>417: Machine Learning Magic</title>
  <link>https://techsnap.systems/417</link>
  <guid isPermaLink="false">88c620a6-0b1c-4698-aac4-ac757b632286</guid>
  <pubDate>Fri, 29 Nov 2019 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/88c620a6-0b1c-4698-aac4-ac757b632286.mp3" length="19052274" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</itunes:subtitle>
  <itunes:duration>26:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.
Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks. 
</description>
  <itunes:keywords>OFNP,wireless,wifi,On-Off Noise Power Communication,LORA,WiFi 6,Ubiquiti ,Unifi,Amplifi,Amplifi Alien,mesh wifi,router,home networking,networking,wireless,ethernet,ASUS,AiMesh,OFDMA,Orthogonal Frequency-Division Multiple Access,SmallNetBuilder,Tim Higgins,SSD,storage,IEEE,encryption,cryptography,hardware encryption,BitLocker,LUKS,DBAN,hard disk,hard drive,storage,solid state,Secure Erase,ATA,security,machine learning,AI,artificial intelligence,artificial general intelligence,training,neural network,inference,drunkard's walk,Nvidia,Tesla V100,Matrix multiplication,linear algebra,supercomputers,NPU,TPU,Google,Jeffrey Dean,CPU,GPU,Chip Design,Deep Learning,Intel AVX512,Deep Learning Boost,OpenVINO,ResNet,i9-10980XE,Arvind Narayanan,AIExpert, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>403: Keeping Systems Simple</title>
  <link>https://techsnap.systems/403</link>
  <guid isPermaLink="false">e26c9e2a-3e0f-40b9-9875-d72821ee1792</guid>
  <pubDate>Fri, 10 May 2019 21:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e26c9e2a-3e0f-40b9-9875-d72821ee1792.mp3" length="33509482" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</itunes:subtitle>
  <itunes:duration>46:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems. 
</description>
  <itunes:keywords>wireguard, vpn, openvpn, tinc, ipsec, lfnw, tunnel, ssh, mesh network, layer 3, tcp, udp, dhcp, ethernet, vlan, switch, router, firewall, kubernetes, linux, wintun, high availability, reliability, availability, disaster recovery, rto, rpo, security, quantum computers, cryptography, simplicity, SysAdmin podcast, subspace, zinc, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 389: The Future of HTTP</title>
  <link>https://techsnap.systems/389</link>
  <guid isPermaLink="false">a3776de2-0fab-45fc-8d29-dcd0f2e6da03</guid>
  <pubDate>Thu, 15 Nov 2018 15:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a3776de2-0fab-45fc-8d29-dcd0f2e6da03.mp3" length="37053157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</itunes:subtitle>
  <itunes:duration>43:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.
Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router. Special Guest: Jim Salter.
</description>
  <itunes:keywords>BGP, Google, MainOne, China Telecom, BGP Security, RPKI, BGP Leak, BGP Hijack, HTTP, TLS, QUIC, HTTP/3, Encryption, UDP, Spam, Router, UPnP, Botnet, Broadcom, BCMUPnP_Hunter, format string vulnerability, HTTP-over-QUIC, Router Security, WireGuard, Homebrew Router, Wifi, Jim Salter, Ars Technica, Sanoid, Security, Networking, SysAdmin, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
