13-theROOTcause---Our Name Has Changed and NetGen Updates
Explains name change from "The Sniffer Guy" to "The Root Cause" as well as providing some updates...
16:27
13-theROOTcause---Our Name Has Changed and NetGen Updates
Explains name change from "The Sniffer Guy" to "The Root Cause" as well as providing some updates...
16:27
12-theROOTcause---Sniffer-Portable-4-9-Compared-To-Wireshark-1-00
Comparison of relative capabilities of Sniffer Portable 4.9 and Wireshark 1.0.0.
27:18
11-theROOTcause---What's So Great About Packet-Sniffers
Describes a good case study and compares protocol and packet analysis to other tools that are...
11:53
10-theROOTcause---Capture-Filter-Concepts
Describes how Capture Filters work on various Packet-Sniffers and how the hardware and software...
12:01
09-theROOTcause---Mentoring-in-IT
Discusses the critical need for Mentoring Programs within IT organizations in light of the...
15:52
08-theROOTcause---Packet-Sniffer Filtering Concepts-01
Discusses some basic concepts on how to approach packet-sniffer filtering. It is the first of...
14:58
07-theROOTcause---The Missing Link in IT Management
Describes the need for an executive management position that focuses purely on the technical...
16:29
06-theROOTcause---Myths of Utilization and Automated Metrics
Myths are metaphors--and so are automated metrics and utilization metrics. To take them as...
15:21
05-theROOTcause---The NAPA Troubleshooting Team
The components, skill-sets, roles and processes involved in creating and maintaining a Network...
18:22
04-theROOTcause---The 7 Most Common Mistakes Using Packet-Sniffers
The 7 most common mistakes that result in IT professionals failing to get accurate or actionable...
26:15
03-theROOTcause---Why Network Assessments Must Include Application and Protocol Behavior
Describes the Interpath Methodology which is a two-pronged approach to Network Assessments. It...
12:03
02-theROOTcause---How To Create Simple Open-Source Distributed Packet-Sniffers
The in's and out's of building a proper open-source distributed packet-sniffer that addresses the...
11:33
01-theROOTcause---Fundamentals of Network and Application Performance Analysis and Troubleshooting
A 5-Step Process for Troubleshooting long-standing network and application problems. This is our...
34:17
Episode 72: Mission: Impossible - Rogue Nation, Rogue Nation VS. Ghost Protocol, Top 5 Rogues
“Hunt is the living manifestation of destiny and he has made you his...
48:26
In this week's episode the guys from protocol80.com discuss Google's beef with Bing's top result,...
47:07
Trauma Exsanguination Protocols in Trauma
A discussion regarding the evidentiary basis for trauma exsanguination protocols in trauma...
44:58
Episode 10 – Etiquette, Protocol, and Superstitions!
Hosts - Dan, Mack, Steve, Bryan, Tyler Topic - This is a big one. In this episode, we answer(?)...
01:27:05
Do you suffer from panic, anxiety, and fear in your day-to-day life? Do you often avoid social...
54:24
This episode's talk gets a little emotional as we discusss real life health issues -- a new...
54:05