Meet the Cisco Deep Network Model: Trained by the Experts, Purpose-Built for the Network

Cisco’s Deep Network Model is a purpose-built large language model (LLM) designed specifically for network operations, leveraging decades of Cisco expertise to deliver highly accurate troubleshooting, configuration, and automation capabilities. The Deep Network Model powers AgenticOps by enabling real-time insights, seamless collaboration across domains, and continuously evolving network management solutions.

N4N031: When Is It Time For a Routing Protocol?

If you need to route in your network, you can program static routes into all your routing-capable devices. And this can work. But at some point, you’re probably going to want to switch to a dynamic routing protocol. On today’s N Is For Networking, Ethan and Holly discuss the differences between static and dynamic routes,…

PP067: Protecting Secrets With Vault and TruffleHog

Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for developers and…

HS106: Planning for the Epochalypse

IT teams deal with technology lifecycle issues all the time–including Y2K, which enterprises across the world grappled with for years. The Epochalypse, or Year 2038 Problem, is similar. Specifically, some Linux systems’ date-time counters will go from positive to negative at a specific date in 2038, potentially wreaking havoc on embedded systems and any other…

Everything you need to know about NIST’s new guidance in “SP 1800-35: Implementing a Zero Trust Architecture”

For decades, the United States National Institute of Standards and Technology (NIST) has been guiding industry efforts through the many publications in its Computer Security Resource Center. NIST has played an especially important role in the adoption of Zero Trust architecture, through its series of publications that began with NIST SP 800-207: Zero Trust Architecture,