Cover image of show Technically U

Technically U

Podcast by Technically U

English

Technology & science

Limited Offer

2 months for 19 kr.

Then 99 kr. / monthCancel anytime.

  • 20 hours of audiobooks / month
  • Podcasts only on Podimo
  • All free podcasts
Get Started

About Technically U

One podcast keeps IT pros ahead of career-ending surprises. You're in cybersecurity, networking, or IT leadership. You know the feeling—scrambling to explain a breach, outage, or AI disruption you should have seen coming. TechnicallyU give you a 20-minute or more weekly briefing that makes you the smartest person in every meeting. What we actually cover: Why your MFA isn't protecting you like you think AI tools that will replace jobs vs. ones that will save them Cloud architecture mistakes costing companies millions Your competitors are already listening. New episodes every Thursday

All episodes

255 episodes

episode AI Agents Are Replacing Jobs AI Chatbots Never Could: Here's the Difference artwork

AI Agents Are Replacing Jobs AI Chatbots Never Could: Here's the Difference

AI agents are changing the workplace faster than most people realize. Unlike AI assistants such as ChatGPT, Claude, Gemini, or Copilot, AI agents do more than answer questions — they can take action inside business systems, complete workflows, update records, process requests, and make decisions within defined rules. In this episode of Technically U, we break down the real differences between AI assistants and AI agents, why companies are deploying them aggressively in 2026, and which jobs are most at risk of automation. You’ll learn how AI agents are being used in customer service, IT support, sales operations, data entry, finance, scheduling, and business operations. We also explain why the shift from “AI-assisted work” to “AI-executed work” is so important, what employees should do to stay relevant, and how managers should decide what to automate first. Topics covered include: AI assistants vs AI agents How autonomous AI agents work Jobs being automated by AI agents Salesforce AgentForce, Microsoft Copilot Studio, Google Workspace AI, and ServiceNowAI agents Why 2025–2026 became the breakout period for AI agents The economics behind AI automation Skills employees need to protect their careers How managers should roll out AI agents responsibly AI is not replacing every job — but AI agents are replacing specific tasks at scale. The question is no longer whether this technology is coming. It is already here. Subscribe to Technically U for clear, practical breakdowns of enterprise technology, cybersecurity, AI, automation, and the future of work.

21 May 2026 - 10 min
episode DHT Security Explained: Why Distributed Hash Tables Are Fundamentally Vulnerable artwork

DHT Security Explained: Why Distributed Hash Tables Are Fundamentally Vulnerable

What if the technology powering BitTorrent, IPFS, and blockchain networks… is fundamentally insecure? In this episode of Technically U, we take a deep dive into Distributed Hash Table (DHT) security—and uncover why one of the internet’s most important decentralized technologies still faces unsolved security challenges after more than 20 years of research. DHTs enable peer-to-peer networking without central servers, making them powerful for censorship resistance and scalability. But that same openness introduces serious vulnerabilities that attackers can exploit. 🎯 In this episode, you’ll learn: What a Distributed Hash Table (DHT) is and how it works How DHTs power systems like BitTorrent, IPFS, blockchain node discovery, and Tor The three major attack types: Sybil Attacks – fake identities controlling the network Eclipse Attacks – isolating victims from the real network Routing & Storage Attacks – manipulating or corrupting data Real-world examples of DHT attacks, including IPFS and Ethereum vulnerabilities Why attackers can execute large-scale attacks at surprisingly low cost Key defense strategies: Proof-of-Work and Proof-of-Space Routing table diversity and multi-path lookups Cryptographic verification and redundancy Reputation systems and behavioral analysis Why no perfect solution exists (and likely never will) The fundamental tradeoffs between security, decentralization, anonymity, and performance 🚨 Critical Insight: DHTs are designed to be open and permissionless—but that same design makes them inherently vulnerable to Sybil attacks. Without a central authority, there is no way to fully prevent attackers from creating unlimited identities. 💡 Why this matters: DHTs are widely used in modern infrastructure. Understanding their limitations is critical for: Network engineers Cybersecurity professionals Blockchain developers Anyone building or relying on decentralized systems 🎧 Technically U – Tech made simple. One packet at a time. 👉 If you’re building on DHT-based systems, remember: Use multiple layers of defense, monitor for attacks, and never treat DHT data as your only source of truth.

13 May 2026 - 8 min
episode 802.1X Explained: The Technology Controlling Who Gets on Your Network artwork

802.1X Explained: The Technology Controlling Who Gets on Your Network

Who is allowed on your network—and how is that decision made?In this episode of Technically U, we break down IEEE 802.1X, the powerful security framework behind Network Access Control (NAC) that determines whether devices can connect to your wired or wireless network. Whether you're plugging into an Ethernet port or connecting to corporate Wi-Fi, 802.1X is working behind the scenes to authenticate users, validate devices, and enforce security policies—often in just seconds. 🎯 In this session, you'll learn: What 802.1X authentication is and why it matters How RADIUS servers, switches, and endpoints (supplicants) work together The step-by-step 802.1X authentication process Key protocols like EAP, PEAP, and EAP-TLS explained simply The difference between WPA2/WPA3 Enterprise vs PSK Wi-Fi How enterprises use dynamic VLAN assignment for secure segmentation What MAC Authentication Bypass (MAB) is and when it’s used How NAC solutions (Cisco ISE, Aruba ClearPass, FreeRADIUS) enhance security The role of 802.1X in Zero Trust architectures Real-world deployment tips and common challenges 🚀 Why this matters: Modern networks are no longer defined by location—they’re defined by identity. With remote work, IoT devices, and increasing cyber threats, 802.1X is a foundational layer of enterprise security. If you're in IT, networking, cybersecurity—or just want to understand how secure networks actually work—this episode gives you a clear, practical breakdown.

10 May 2026 - 9 min
episode Encrypted Wavelength Services: (Part 3) Securing Data at the Optical Layer artwork

Encrypted Wavelength Services: (Part 3) Securing Data at the Optical Layer

🔐 Is your private network actually secure… or just private? In Part 3 of our Wavelength Services series on Technically U, we dive into encrypted Wavelength services—and why security at the optical layer is becoming critical for modern enterprise networks. Even with HTTPS, VPNs, and application-layer encryption, your data still travels across carrier-owned fiber infrastructure. And yes—fiber tapping is rare, but it’s possible. That’s why organizations handling sensitive data are adding encryption at the Wave layer for true defense in depth. 🎯 In this episode, you’ll learn: Why optical layer encryption matters—even if you already use TLS or IPsec The real-world risks of fiber tapping and physical infrastructure exposure The three main encryption approaches: Layer 1 (OTN) Encryption – maximum security at the optical layer MACsec (Layer 2) – the enterprise standard for low-latency encryption IPsec (Layer 3) – familiar but less efficient for high-speed Waves Key tradeoffs in latency, throughput, and packet overhead How MACsec (IEEE 802.1AE) works and why it’s widely adopted The role of AES-256-GCM encryption in securing optical traffic Customer-managed vs Carrier-managed encryption models Best practices for key management, HSMs, and key rotation Emerging risks like quantum computing (“harvest now, decrypt later”) Compliance frameworks driving encryption requirements: FIPS 140-2 / 140-3PCI-DSSHIPAANSA CSfC (Commercial Solutions for Classified) 🚨 Key Insight: A dedicated Wavelength circuit is private—but without encryption, it’s not fully secure. Optical-layer encryption ensures that even if fiber is compromised, your data remains unreadable. 💡 Who should care about encrypted Waves? Financial institutions and trading platforms Healthcare organizations handling patient data Government and defense contractors Enterprises moving sensitive intellectual property Any organization with high-value data in transit 🎧 Technically U – Tech made simple. One packet at a time. 👉 Full Series Recap: Part 1: What Wavelength services are and how they work Part 2: Engineering for resiliency (failover, protection, redundancy) Part 3: Security and encryption at the optical layer

30 Apr 2026 - 7 min
episode Wavelength Engineering Explained: (Part 2) Protection, Failover & Resiliency artwork

Wavelength Engineering Explained: (Part 2) Protection, Failover & Resiliency

⚡ Think your network is redundant? It might not be. In Part 2 of our Wavelength Services series on Technically U, we go beyond the basics and dive into the engineering decisions that determine whether your network survives a failure—or goes down hard. If you’re investing in 100G or 400G Wavelength (Wave) services, understanding protection, failover, and restoration is critical. Many organizations assume they’re protected… only to discover during an outage that both circuits share the same physical path. 🎯 In this episode, you’ll learn: The difference between Protected vs Unprotected Wavelength circuits How 1+1 and 1:1 optical protection actually work Active-Active vs Active-Passive network design strategies How failover happens (Optical switching vs Layer 3 routing) What BFD (Bidirectional Forwarding Detection) does and why it matters The role of sub-50ms optical failover vs sub-second routing convergence Manual vs automatic failover and when each is required Revertive vs Non-Revertive failover behavior (and why it matters) The different types of restoration: Pre-provisioned, GMPLS dynamic, and best-effort Critical design risks like shared conduits, shared regen sites, and OSNR issues Why failover testing is mandatory—not optional 🚨 Common Mistake: Buying two circuits does NOT guarantee redundancy. Without true path diversity and proper failover design, a single fiber cut can take down both connections. 💡 Why this matters: Modern enterprise networks rely on Wavelength services for: Data center interconnect (DCI) Disaster recovery and storage replication Financial trading and ultra-low latency apps Cloud connectivity (AWS Direct Connect, Azure ExpressRoute) If your network can’t fail over instantly, your business could be exposed to downtime, revenue loss, and compliance risks 🎧 Technically U – Tech made simple. One packet at a time. 👉 Up Next (Part 3): We explore Wavelength security, including optical encryption, MACsec vs IPsec, and how enterprises protect data at the fiber layer.

30 Apr 2026 - 7 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Choose your subscription

Most popular

Limited Offer

Premium

20 hours of audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

2 months for 19 kr.
Then 99 kr. / month

Get Started

Premium Plus

Unlimited audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

Start 7 days free trial
Then 129 kr. / month

Start for free

Only on Podimo

Popular audiobooks

Get Started

2 months for 19 kr. Then 99 kr. / month. Cancel anytime.